HandWiki:Computers
From HandWiki
This portal is dedicated to computer science, computational science and software engineering topics, covering computers, programming languages, software algorithms (numerical and non-numerical), mathematical models, computational models, and computer simulations.
Newest articles
- Categories:Books
- First-fit-decreasing bin packing
- The Linux Programming Interface
- Pappus chain
- Effective Java
- Karmarkar–Karp bin packing algorithms
- The Elements of Programming Style
- Circle packing
- Programming Perl
- Next-fit-decreasing bin packing
- First-fit bin packing
- Circle packing in an equilateral triangle
- Circle packing in an isosceles right triangle
- The Elements of Java Style
- The AWK Programming Language
- The Pragmatic Programmer
- Karmarkar-Karp bin packing algorithms
- The Practice of Programming
- Refined first-fit bin packing
- Coders at work
- High-multiplicity bin packing
- Systematic Programming
- Best-fit bin packing
- Coders at Work
- Next-fit bin packing
- Circle packing in a circle
- Programming the Z80
- Multifit algorithm
- Soddy circles of a triangle
- Real World Haskell
- Circle packing in a square
- Harmonic bin packing
- Converged database
- GHS hazard statement
- Globally Harmonized System of Classification and Labelling of Chemicals
- Ampere WS-1
- Jankov–von Neumann uniformization theorem
- Correlation length
- Spintronics
- Reward hacking
- LoCoS
- Leggett–Garg inequality
- AppImage
- Peano–Jordan measure
- 274 (number)
- Prabhakar function
- Hack-for-hire operation
- Argument of periapsis
- Software patents and free software
- Data-intensive computing
List of categories
Main topics
- 68k architecture
- Abstract machines
- Acid tests
- Ad hoc routing protocols
- Agent-based model
- Aggregation-based digital libraries
- Ajax (programming)
- Ambient intelligence
- Analog computers
- Anti-patterns
- Application layer protocols
- Application programming interfaces
- Application-specific graphs
- Applications of computer vision
- Applied machine learning
- Approximation theory
- Architectural pattern (computer science)
- Areas of computer science
- Argument technology
- Articles with example ALGOL 60 code
- Artificial intelligence
- Artificial life
- Artificial life models
- As a service
- Aspect-oriented programming
- Assemblers
- Associative arrays
- Augmented reality
- Authenticated-encryption schemes
- Authentication methods
- Authentication protocols
- Automata (computation)
- Automated planning and scheduling
- Automatic memory management
- Backward compatibility
- Base-dependent integer sequences
- Binary arithmetic
- Binary sequences
- Blockchains
- Braille patterns
- Brain–computer interfacing
- Broken hash functions
- Capacity-achieving codes
- Capacity-approaching codes
- Cascading Style Sheets
- Cellular automata
- Cellular automaton patterns
- Cellular automaton rules
- Central processing unit
- Certificate authorities
- Character encoding
- Character sets
- Cisco protocols
- Class (computer programming)
- Classes of computers
- Clear text protocols
- Cloud infrastructure
- Cloud platforms
- Cloud robotics
- Cognitive architecture
- Cognitive science
- Collaborative writing
- Color space
- Combinatory logic
- Communications protocols
- Comparison sorts
- Complex systems theory
- Complexity classes
- Computation oracles
- Computational anatomy
- Computational archaeology
- Computational complexity theory
- Computational fields of study
- Computational learning theory
- Computational linguistics
- Computational mathematics
- Computational neuroscience
- Computational phylogenetics
- Computational problems
- Computational resources
- Computational science
- Computer access control
- Computer access control protocols
- Computer accessibility
- Computer algebra
- Computer architecture
- Computer archives
- Computer arithmetic
- Computer configuration
- Computer engineering
- Computer error messages
- Computer errors
- Computer forensics
- Computer hardware
- Computer jargon
- Computer law
- Computer libraries
- Computer logging
- Computer memory
- Computer occupations
- Computer optimization
- Computer performance
- Computer programming
- Computer programming books
- Computer science
- Computer science books
- Computer science journals
- Computer systems
- Computer viruses
- Computer vision
- Computer-aided engineering
- Computer-assisted translation
- Computer-mediated communication
- Computers and the environment
- Concurrency (computer science)
- Concurrency control
- Concurrent programming libraries
- Conditional constructs
- Constraint programming
- Control engineering
- Control flow
- Control theory
- Convex hulls
- Convex optimization
- Cyberinfrastructure
- Cybernetics
- Cyclic redundancy checks
- DNS record types
- DOS memory management
- DOS technology
- Declarative programming
- Deep learning
- Deep packet inspection
- Denotational semantics
- Dependently typed programming
- Descriptive complexity
- Digital humanities
- Digital libraries
- Digital press
- Digital registers
- Digital signal processing
- Digital signature schemes
- Digital typography
- Digital watermarking
- Disk cloning
- Disk encryption
- Disk partitions
- Distributed artificial intelligence
- Distributed stream processing
- Distributed version control systems
- Domain Name System
- Domain name system
- Domain names
- Domain registries
- Dynamic programming
- Dynamic systems development method
- Electronic documents
- Electronic publishing
- Email authentication
- Embedded operating systems
- Embedded systems
- Enactive cognition
- Enterprise application integration
- Error detection and correction
- Evaluation of machine translation
- Evaluation strategy
- Evolutionary computation
- Extendable-output functions
- Extreme programming
- Face recognition
- Fagan inspection
- Fault tolerance
- Fault-tolerant computer systems
- Feature detection (computer vision)
- Federated identity
- Finite model theory
- Floating point
- Floating point types
- Formal methods
- Free content licenses
- Functional programming
- Gate arrays
- Gene expression programming
- Generic programming
- Genetic programming
- Glossaries of computers
- Graph families
- Hard disk drives
- Hardware acceleration
- Hardware partitioning
- Hardware virtualization
- Hash functions
- History of artificial intelligence
- History of human–computer interaction
- Homomorphic encryption
- Human–computer interaction
- Hypercomputation
- Hypertext Transfer Protocol
- IEEE 802.11
- IP addresses
- IPA typefaces
- IPv6 transition technologies
- Identifiers
- Identity management
- Inductive logic programming
- Injection exploits
- Input methods
- Input/output
- Instant messaging protocols
- Instruction processing
- Instruction set architectures
- Integrated hydrologic modelling
- Inter-process communication
- Interactive evolutionary computation
- Internal DOS commands
- Internationalization and localization
- Interoperability
- Interrupts
- Intrusion detection systems
- Iteration in programming
- Iterative methods
- Kernel methods for machine learning
- Key derivation functions
- Lambda calculus
- Lightweight Unix-like systems
- Limits of computation
- Linear programming
- Link access protocols
- Link analysis
- Link protocols
- Literate programming
- Logic families
- Logic in computer science
- Logic programming
- Logical link control
- MIPS architecture
- MIPS implementations
- Mac OS character encodings
- Machine code
- Machine learning
- Machine translation
- Machine vision
- Mainframe computers
- Manycore processors
- Mass digitization
- Massively parallel computers
- Mathematical science occupations
- Mathematical theorems in theoretical computer science
- Mathematics-related lists
- Measures of complexity
- Mechanical calculators
- Mechanical computers
- Media access control
- Memory management
- Message authentication codes
- Metaprogramming
- Microkernels
- Microsoft BASIC
- Middleware
- Mixed reality
- Models of computation
- Monolithic kernels
- Monospaced typefaces
- Multi-agent systems
- Multimodal interaction
- Multiplexing
- NEC supercomputers
- NIST hash function competition
- NP-complete problems
- Nature-inspired metaheuristics
- Net neutrality
- Non-uniform random numbers
- Non-volatile memory
- Nonlinear control
- OSI protocols
- Object (computer science)
- Object recognition and categorization
- Object-oriented operating systems
- Object-oriented programming
- Object-relational mapping
- Online analytical processing
- Online content distribution
- Online encyclopedias
- Open science
- Open-access archives
- Open-source artificial intelligence
- Open-source hardware
- Open-source typefaces
- OpenCL compute devices
- Operating system APIs
- Operating system technology
- Operating systems
- Operations research
- Operators (programming)
- Optical character recognition
- Oriented matroids
- P-complete problems
- POSIX error codes
- Parameterized complexity
- Password authentication
- Patch utilities
- Pattern matching
- Peer-to-peer
- Persistence
- Perspective projection
- Petri nets
- Physical layer protocols
- Polymorphism (computer science)
- Polynomial-time problems
- PostScript
- Presentation layer protocols
- Primitive types
- Printing terminology
- Probabilistic complexity classes
- Probabilistic models
- Process calculi
- Program analysis
- Programmable logic controllers
- Programming constructs
- Programming idioms
- Programming paradigms
- Programming principles
- Protocols by OSI layer
- Prototype-based programming
- Pseudorandomness
- Public key infrastructure
- Push technology
- Quantitative research
- Quantum Monte Carlo
- Quantum gates
- Quantum programming
- Quasirandomness
- Random number generation
- Random text generation
- Ranking functions
- Real-time operating systems
- Real-time simulation
- Records management
- Records management technology
- Register machines
- Regular expressions
- Remote desktop protocols
- Remote procedure call
- Robot kinematics
- Routing protocols
- Run-time systems
- Scientific modeling
- Search engine optimization
- Second-level domains
- Secure communication
- Semantic HTML
- Sequential experiments
- Sequential methods
- Serial buses
- Server hardware
- Signal processing metrics
- Simulation
- Solid-state caching
- Source code
- Source code generation
- Spam filtering
- Speech codecs
- Speech recognition
- Speech synthesis
- Stack machines
- Stack-based virtual machines
- Static program analysis
- Statistical process control
- Statistics-related lists
- Stereoscopy
- Stochastic optimization
- Stochastic simulation
- Streaming media systems
- String (computer science)
- String similarity measures
- Subfields of computer science
- Subroutines
- Substring indices
- Supercomputer benchmarks
- Supercomputers
- Supertasks
- Support vector machines
- Synchronization
- System administration
- System calls
- Systems management
- Systems science
- Systems theory
- Technical communication
- Technology forecasting
- Telecommunication theory
- Teleconferencing
- Telemarketing
- Template engines
- Terms of service
- Ternary computers
- Text editor features
- Text mining
- Text user interface
- Texture compression
- Texture filtering
- Texture mapping
- Theoretical computer science
- Theory of computation
- Time zones
- Time-sharing operating systems
- Transaction processing
- Transactional memory
- Transition systems
- Transmission Control Protocol
- Transport layer protocols
- Triplestores
- Trojan horses
- Tunneling protocols
- Turing machine
- Type systems
- Type theory
- Types of RAM
- Types of malware
- URI schemes
- UTC offsets
- Unicode blocks
- Unified serif and sans-serif typeface families
- Unique identifiers
- Units of temporal rate
- Unix variants
- Unsolved problems in computer science
- Usability inspection
- User interface techniques
- User interfaces
- Variable (computer science)
- Variance reduction
- Vector supercomputers
- Version control
- Version control systems
- Virtual machines
- Virtual memory
- Virtual reality
- VoIP protocols
- Wikipedia-derived encyclopedias
- Windows communication and services
- Wireless access points
- X86 architecture
- X86 instructions
- X86 memory management
- X86 operating modes
- XNS based protocols
Computing
- Advanced RISC Computing
- Applications of distributed computing
- Applicative computing systems
- Benchmarks (computing)
- Cache (computing)
- Clients (computing)
- Clipboard (computing)
- Cloud computing
- Cluster computing
- Computing and society
- Computing commands
- Computing input devices
- Computing output devices
- Computing platforms
- Computing terminology
- Computing timelines
- Computing websites
- Computing-related lists
- Concurrent computing
- Distributed computing
- Distributed computing architecture
- Distributed computing problems
- Distributed computing projects
- Events (computing)
- Grid computing
- Grid computing projects
- High-availability cluster computing
- History of computing
- Industrial computing
- Interpreters (computing)
- Load balancing (computing)
- Parallel computing
- Peer-to-peer computing
- Personal computing
- Physical computing
- Process (computing)
- Quantum computing
- Real-time computing
- Reconfigurable computing
- Reversible computing
- Routers (computing)
- Scheduling (computing)
- Servers (computing)
- Service-oriented (business computing)
- Supercomputing
- Surface computing
- Threads (computing)
- Trusted computing
- Ubiquitous computing
- Virtual Network Computing
File Storage and File Formats
- 3D graphics file formats
- Abstract data types
- Algorithmic information theory
- Amortized data structures
- Archive formats
- Audio file formats
- Automatic identification and data capture
- Bibliography file formats
- Binary-to-text encoding formats
- Bioinformatics algorithms
- CAD file formats
- Chemical file formats
- Cloud databases
- Cloud storage
- Cloud storage gateways
- Composite data types
- Compression file systems
- Computer data storage
- Computer file formats
- Computer file systems
- Computer files
- Computer graphics data structures
- Computer storage devices
- Computer storage media
- Data access technologies
- Data breaches
- Data compression
- Data differencing
- Data erasure
- Data interchange standards
- Data management
- Data mapping
- Data partitioning
- Data protection
- Data quality
- Data recovery
- Data security
- Data serialization formats
- Data storage
- Data structures
- Data synchronization
- Data transmission
- Data types
- Data warehousing
- Data-centric programming languages
- Database access protocols
- Database algorithms
- Database constraints
- Database index techniques
- Database models
- Database normalization
- Database theory
- Digital container formats
- Discontinued media formats
- Disk file systems
- Distributed data storage
- Distributed data stores
- Distributed file systems
- Document-oriented databases
- Earth sciences data formats
- Executable file formats
- File Transfer Protocol
- File archivers
- File hosting
- File sharing
- File sharing networks
- File system management
- File systems supported by the Linux kernel
- File transfer protocols
- Filename extensions
- Flash file systems
- Font formats
- Free digital container formats
- Free special-purpose file systems
- Functional data structures
- GIS file formats
- Graphics file formats
- Hash based data structures
- Heaps (data structures)
- IBM file systems
- Information
- Information assurance standards
- Information governance
- Information retrieval
- Information science
- Information systems
- Information technology
- Information technology management
- Information theory
- Kinetic data structures
- Lexical databases
- Lists of file formats
- Metadata registry
- Metadata standards
- Microformats
- Network file systems
- Network file transfer protocols
- Network-attached storage
- Open formats
- Packets (information technology)
- Peer-to-peer file sharing
- Playlist file formats
- Program transformation
- Quantum information science
- Quantum information theory
- SQL data access
- Shared disk file systems
- Solid-state computer storage media
- Special-purpose file systems
- Statistical data coding
- Storage area networks
- Storage systems
- Storage virtualization
- String data structures
- Structured storage
- Subtitle file formats
- Text file formats
- Transformation languages
- Translation databases
- Unicode Transformation Formats
- Units of information
- Unix file system technology
- Userspace file systems
- Vector graphics file formats
- Video formats
- Web syndication formats
- XML data access
- tz database
Computer Video, Audio and Imaging
- 3D computer graphics
- 3D graphics file formats
- 3D imaging
- 3D rendering
- Animation techniques
- Audio codecs
- Audio file formats
- Audio mixing
- Audio network protocols
- Audio programming languages
- Computer animation
- Computer graphic artifacts
- Computer graphic techniques
- Computer graphics
- Computer graphics algorithms
- Computer graphics data structures
- Cryptographic algorithms
- Cryptographic attacks
- Cryptographic hash functions
- Cryptographic primitives
- Cryptographic protocols
- Digital audio
- Digital audio recording
- Digital geometry
- Digital imaging
- Disk images
- Geometry in computer vision
- Graphical control elements
- Graphical terminals
- Graphical user interface elements
- Graphical user interfaces
- Graphics chips
- Graphics file formats
- Graphics hardware
- Graphics processing units
- Graphics standards
- Hash function (non-cryptographic)
- Image compression
- Image impedance filters
- Image scanning
- Image segmentation
- Infographics
- Mesh generation
- Mesh networking
- Noise (graphics)
- Ray tracing (graphics)
- Scalable Vector Graphics
- Special effects
- Vector graphics
- Vector graphics file formats
- Vector graphics markup languages
- Video codecs
- Video compression
- Video formats
- Video hosting
- Video on demand services
- Video signal
- Visualization (graphic)
Internet and Network
- Anonymity networks
- Archive networks
- Audio network protocols
- Computer network analysis
- Computer network security
- Computer networking
- Computer networks
- Computing websites
- File sharing networks
- Interbank networks
- Internet Protocol
- Internet Standards
- Internet access
- Internet architecture
- Internet censorship
- Internet governance
- Internet layer protocols
- Internet mail protocols
- Internet privacy
- Internet protocols
- Internet safety
- Internet search algorithms
- Internet security
- Internet television
- Internet terminology
- Local area networks
- Markov networks
- Mesh networking
- Network acceleration
- Network access
- Network addressing
- Network analysis
- Network architecture
- Network file systems
- Network file transfer protocols
- Network layer protocols
- Network management
- Network performance
- Network protocols
- Network scheduling algorithms
- Network socket
- Network topology
- Network-attached storage
- Networking algorithms
- Networking hardware
- Networking standards
- Personal area networks
- Responsive web design
- Semantic Web
- Storage area networks
- Virtual Network Computing
- Virtual private networks
- Web analytics
- Web caching protocol
- Web conferencing
- Web design
- Web development
- Web fiction
- Web programming
- Web security exploits
- Web service specifications
- Web shells
- Web standards
- Web syndication formats
- Web technology
- Website management
- Wide area networks
- Wireless sensor network
- World Wide Web
- World Wide Web Consortium standards
Security and Privacy
- Applications of cryptography
- Broken cryptography algorithms
- Computer network security
- Computer security
- Computer security books
- Computer security exploits
- Computer security models
- Computer security procedures
- Computer security qualifications
- Computer security standards
- Crypto-anarchism
- Cryptographic algorithms
- Cryptographic attacks
- Cryptographic hash functions
- Cryptographic primitives
- Cryptographic protocols
- Cryptography
- Cryptography standards
- Cyberattacks
- Cyberspace
- Cyberwarfare
- Data security
- Denial-of-service attacks
- Elliptic curve cryptography
- Hacking (computer security)
- Hash function (non-cryptographic)
- Hash-based cryptography
- Identity-based cryptography
- Internet privacy
- Internet security
- Mobile security
- Operating system security
- Pairing-based cryptography
- Post-quantum cryptography
- Public-key cryptography
- Quantum cryptography
- Quantum cryptography protocols
- Security breaches
- Security compliance
- Security identifier types
- Social engineering (computer security)
- Theory of cryptography
- Transport Layer Security
- Transport Layer Security implementation
- Types of cyberattacks
- Web security exploits
Software technologies
- Copyright infringement of software
- Free Software Foundation
- Free and open-source software licenses
- Free software culture and documents
- Free software movement
- Permissive software licenses
- Software analysis patterns
- Software architecture
- Software bugs
- Software by type
- Software cracking
- Software delivery methods
- Software design
- Software design patterns
- Software development
- Software development philosophies
- Software development process
- Software distribution
- Software engineering
- Software engineering terminology
- Software features
- Software industry
- Software licenses
- Software maintenance
- Software metrics
- Software modeling language
- Software optimization
- Software project management
- Software quality
- Software release
- Software requirements
- Software review
- Software testing
- Software using the BSD license
- Software-defined radio
- Utility software types
Algorithms
- Algorithmic information theory
- Algorithms on strings
- Analysis of parallel algorithms
- Anti-aliasing algorithms
- Asymmetric-key algorithms
- Bioinformatics algorithms
- Broken cryptography algorithms
- Checksum algorithms
- Compiler optimizations
- Computer arithmetic algorithms
- Computer graphics algorithms
- Computer optimization
- Concurrency control algorithms
- Concurrent algorithms
- Convex optimization
- Cryptographic algorithms
- Database algorithms
- Distributed algorithms
- Evolutionary algorithms
- External memory algorithms
- Fingerprinting algorithms
- Genetic algorithms
- Geometric algorithms
- Global illumination algorithms
- Image impedance filters
- Internet search algorithms
- Lossless compression algorithms
- Lossy compression algorithms
- Machine learning algorithms
- Memory management algorithms
- Network scheduling algorithms
- Networking algorithms
- Padding algorithms
- Parsing algorithms
- Pseudo-polynomial time algorithms
- Quantum algorithms
- Routing algorithms
- Scheduling algorithms
- Search algorithms
- Search engine optimization
- Sequence alignment algorithms
- Software optimization
- Sorting algorithms
- Spam filtering
- Stochastic optimization
- Texture filtering
- Unicode algorithms
Standards
- 3GPP standards
- Advanced Encryption Standard
- Atom (standard)
- C standard library headers
- Cloud standards
- Computer display standards
- Computer security standards
- Computer standards
- Cryptography standards
- Data interchange standards
- Digital Signature Standard
- Ecma standards
- Ethernet standards
- Graphics standards
- IEC standards
- IEEE standards
- ISO standards
- Information assurance standards
- International Standard Book Number
- Internet Standards
- Metadata standards
- Networking standards
- Open Group standards
- Programming language standards
- Programming languages with an ISO standard
- Unix standards
- Web standards
- World Wide Web Consortium standards
- XML-based standards
Computer Languages and Compilers
- APL programming language family
- Academic programming languages
- Ada (programming language)
- Ada programming language family
- Agent-based programming languages
- Agent-oriented programming languages
- Algebraic modeling languages
- Algol programming language family
- Array programming languages
- Assembly languages
- Audio programming languages
- BASIC compilers
- BASIC programming language
- BASIC programming language family
- C (programming language)
- C Sharp programming language family
- C compilers
- C programming language family
- C++ compilers
- C++ programming language family
- CFML programming language
- Class-based programming languages
- Compiler construction
- Compiler optimizations
- Compiler theory
- Computer languages
- Concatenative programming languages
- Concurrent programming languages
- Constraint programming languages
- Constructed languages
- Criticisms of programming languages
- Cross-compilers
- Data-centric programming languages
- Declarative markup languages
- Declarative programming languages
- Delphi (programming language)
- Dependently typed languages
- Discontinued programming languages
- Domain-specific knowledge representation languages
- Domain-specific programming languages
- Dylan (programming language)
- Dynamic programming languages
- Dynamically typed programming languages
- Educational programming languages
- Erlang (programming language)
- Experimental programming languages
- Extensible syntax programming languages
- Formal languages
- Formal specification languages
- Forth programming language family
- Fortran compilers
- Fortran programming language family
- Fourth-generation programming languages
- Free compilers and interpreters
- Function-level languages
- Functional languages
- Functional logic programming languages
- Go (programming language)
- Graph description languages
- Hardware description languages
- Haskell programming language family
- High-level programming languages
- Homoiconic programming languages
- ICL programming languages
- Icon programming language family
- Implementation of functional programming languages
- JOSS programming language family
- JVM programming languages
- Java (programming language)
- Java compilers
- Java device platform
- Java platform
- Java programming language family
- Java specification requests
- Java virtual machine
- JavaScript
- JavaScript dialect engines
- JavaScript programming language family
- Knowledge representation languages
- Language modeling
- Lightweight markup languages
- Lisp (programming language)
- Lisp programming language family
- Lists of programming languages
- Logic programming languages
- Logo programming language family
- ML programming language family
- MUMPS programming language family
- Macro programming languages
- Markup language comparisons
- Markup languages
- Modeling languages
- Modula programming language family
- Multi-paradigm programming languages
- Natural language generation
- Natural language parsing
- Natural language processing
- Nondeterministic programming languages
- Numerical programming languages
- Oberon programming language family
- Object-based programming languages
- Object-oriented programming languages
- Objective-C
- Page description markup languages
- Pascal (programming language)
- Pascal compilers
- Pascal programming language family
- Pattern matching programming languages
- Playlist markup languages
- Procedural programming languages
- Programming language classification
- Programming language comparisons
- Programming language concepts
- Programming language design
- Programming language implementation
- Programming language semantics
- Programming language standards
- Programming language syntax
- Programming language theory
- Programming language topics
- Programming languages
- Programming languages with an ISO standard
- Prolog programming language family
- Prototype-based programming languages
- Python (programming language)
- Query languages
- R (programming language)
- Rexx (programming language)
- Robot programming languages
- Ruby (programming language)
- Rust (programming language)
- SNOBOL programming language family
- Scala (programming language)
- Scheme (programming language)
- Scheme (programming language) implementations
- Scheme (programming language) interpreters
- Scripting languages
- Shading languages
- Simulation programming languages
- Smalltalk programming language family
- Software modeling language
- Specification languages
- Stack-oriented programming languages
- Statically typed programming languages
- Statistical natural language processing
- Statistical programming languages
- Structured programming languages
- Stylesheet languages
- Synchronous programming languages
- Systems Modeling Language
- Systems programming languages
- Tcl programming language family
- Term-rewriting programming languages
- Text-oriented programming languages
- Transformation languages
- Unified Modeling Language
- Unified Modeling Language diagrams
- User interface markup languages
- Vector graphics markup languages
- Visual programming languages
- Workflow languages
- XBase programming language family
- XML markup languages
- XML-based programming languages