Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

What can we do about the unnecessary diversity of notation for syntactic definitions?

Published: 01 November 1977 Publication History
  • Get Citation Alerts
  • Abstract

    The population of programming languages is steadily growing, and there is no end of this growth in sight. Many language definitions appear in journals, many are found in technical reports, and perhaps an even greater number remains confined to proprietory circles. After frequent exposure to these definitions, one cannot fail to notice the lack of “common denominators.” The only widely accepted fact is that the language structure is defined by a syntax. But even notation for syntactic description eludes any commonly agreed standard form, although the underlying ancestor is invariably the Backus-Naur Form of the Algol 60 report. As variations are often only slight, they become annoying for their very lack of an apparent motivation.

    Cited By

    View all
    • (2023)General parsing with regular expression matchingJournal of Computer Languages10.1016/j.cola.2022.10117674(101176)Online publication date: Jan-2023
    • (2023)LoVizQL: A Query Language for Visualizing and Analyzing Business Processes from Event LogsService-Oriented Computing10.1007/978-3-031-48424-7_2(13-28)Online publication date: 28-Nov-2023
    • (2022)An Approach for Securing JSON Objects through Chaotic SynchronizationCybernetics and Information Technologies10.2478/cait-2022-003722:4(23-34)Online publication date: 1-Nov-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 20, Issue 11
    Nov. 1977
    107 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/359863
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 November 1977
    Published in CACM Volume 20, Issue 11

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. extended BNF
    2. syntactic description language

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)301
    • Downloads (Last 6 weeks)25

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)General parsing with regular expression matchingJournal of Computer Languages10.1016/j.cola.2022.10117674(101176)Online publication date: Jan-2023
    • (2023)LoVizQL: A Query Language for Visualizing and Analyzing Business Processes from Event LogsService-Oriented Computing10.1007/978-3-031-48424-7_2(13-28)Online publication date: 28-Nov-2023
    • (2022)An Approach for Securing JSON Objects through Chaotic SynchronizationCybernetics and Information Technologies10.2478/cait-2022-003722:4(23-34)Online publication date: 1-Nov-2022
    • (2022)Mathematical Modelling of Malware Intrusion in Computer NetworksCybernetics and Information Technologies10.2478/cait-2022-002622:3(29-47)Online publication date: 1-Sep-2022
    • (2022)A Rule-Generation Model for Class Imbalances to Detect Student Entrepreneurship Based on the Theory of Planned BehaviorCybernetics and Information Technologies10.2478/cait-2022-002322:2(160-178)Online publication date: 1-Jun-2022
    • (2022)Tunnel Parsing with the Token’s LexemeCybernetics and Information Technologies10.2478/cait-2022-002122:2(125-144)Online publication date: 1-Jun-2022
    • (2022)A Scrutiny of Honeyword Generation MethodsCybernetics and Information Technologies10.2478/cait-2022-001322:2(3-25)Online publication date: 1-Jun-2022
    • (2022)The Semantics of PluralsProceedings of the 15th ACM SIGPLAN International Conference on Software Language Engineering10.1145/3567512.3567516(36-54)Online publication date: 29-Nov-2022
    • (2022)The Development and Deployment of Formal Methods in the UKFormal Aspects of Computing10.1145/352257734:1(1-21)Online publication date: 5-Jul-2022
    • (2022)Achieving stepwise construction of cyber physical systems in EX-MAN component modelJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2022.10.02434:10(10319-10338)Online publication date: Nov-2022
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media