{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:18:29Z","timestamp":1745986709944,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":75,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642359910"},{"type":"electronic","value":"9783642359927"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35992-7_1","type":"book-chapter","created":{"date-parts":[[2013,1,2]],"date-time":"2013-01-02T06:22:16Z","timestamp":1357107736000},"page":"1-54","source":"Crossref","is-referenced-by-count":0,"title":["Compilation of Legacy Languages in the 21st Century"],"prefix":"10.1007","author":[{"given":"Darius","family":"Blasband","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"ASIS Working Group (ASISWG), http:\/\/www.sigada.org\/WG\/asiswg\/ (last visited: June 1, 2012)"},{"key":"1_CR2","unstructured":"CICS, http:\/\/en.wikipedia.org\/wiki\/CICS (last visited: June 1, 2012)"},{"key":"1_CR3","unstructured":"Clerity Solutions\u2019 website, http:\/\/www.clerity.com (last visited: June 1, 2012)"},{"key":"1_CR4","unstructured":"The cocolab website, http:\/\/www.cocolab.com (last visited: June 1, 2012)"},{"key":"1_CR5","unstructured":"Conversions from scaled FIXED BINARY, http:\/\/publib.boulder.ibm.com\/infocenter\/ratdevz\/v7r5\/index.jsp?topic=\/com.ibm.ent.pl1.zos.doc\/topics\/ibmm2mst195.html (last visited: December 6, 2011)"},{"key":"1_CR6","unstructured":"Eclipse Java development tools (JDT), http:\/\/www.eclipse.org\/jdt\/ (last visited: June 1, 2012)"},{"key":"1_CR7","unstructured":"Enterprise java beans, http:\/\/jcp.org\/en\/jsr\/detail?id=318 (last visited: June 1, 2012)"},{"key":"1_CR8","unstructured":"Fujitsu NetCOBOL for .NET, http:\/\/www.netcobol.com\/products\/Fujitsu-NetCOBOL-for-.NET\/overview"},{"key":"1_CR9","unstructured":"Hierarchical Visitor Pattern, http:\/\/c2.com\/cgi\/wiki?HierarchicalVisitorPattern (last visited: June 1, 2012)"},{"key":"1_CR10","unstructured":"HTWC\u2019s website, http:\/\/www.htwc.com (last visited: June 1, 2012)"},{"key":"1_CR11","unstructured":"ILASM, http:\/\/msdn.microsoft.com\/en-us\/library\/496e4ekx.aspx (last visited: June 1, 2012)"},{"key":"1_CR12","unstructured":"Internet Information Services, http:\/\/www.microsoft.com\/windowsserver2008\/en\/us\/internet-information-services.aspx (last visited: June 1, 2012)"},{"key":"1_CR13","unstructured":"MicroFocus COBOL SQL Option Preprocessor, http:\/\/supportline.microfocus.com\/documentation\/books\/sx40sp2\/spsqlp.htm"},{"key":"1_CR14","unstructured":"Multics, http:\/\/en.wikipedia.org\/wiki\/Multics (last visited: June 1, 2012)"},{"key":"1_CR15","unstructured":"PEVerify Tool, http:\/\/msdn.microsoft.com\/en-us\/library\/62bwd2yd.aspx (last visited: June 1, 2012)"},{"key":"1_CR16","unstructured":"PL\/M, http:\/\/en.wikipedia.org\/wiki\/PL\/M (last visited: June 1, 2012)"},{"key":"1_CR17","unstructured":"PL\/S, http:\/\/en.wikipedia.org\/wiki\/PL\/S (last visited: June 1, 2012)"},{"key":"1_CR18","unstructured":"Tuxedo ART, http:\/\/www.oracle.com\/us\/products\/middleware\/tuxedo\/tuxedo-11g-feature-066057.html (last visited: June 1, 2012)"},{"key":"1_CR19","unstructured":"The Multics PL\/1 Compiler (1969), http:\/\/www.multicians.org\/pl1-raf.html (last visited: June 1, 2012)"},{"key":"1_CR20","unstructured":"z\/OS V1R7.0 MVS JCL Reference, International Business Machines, 1988 (2006) (last visited: June 1, 2012)"},{"key":"1_CR21","unstructured":"Decimal structure (2010), http:\/\/msdn.microsoft.com\/en-us\/library\/system.decimal.aspx (last visited: June 1, 2012)"},{"key":"1_CR22","unstructured":"Point structure (2010), http:\/\/msdn.microsoft.com\/en-us\/library\/system.windows.point.aspx (last visited: June 1, 2012)"},{"key":"1_CR23","unstructured":"Ada. Reference Manual for the Ada Programming Language, ANSI\/MIL-std 1815-a. U.S. Department of Defense (1983)"},{"key":"1_CR24","unstructured":"Blasband, D.: The YAFL Programming Language, 2nd edn., PhiDaNi Software (1994)"},{"key":"1_CR25","unstructured":"Blasband, D.: Automatic analysis of ancient languages. PhD thesis, Universit\u00e9 Libre de Bruxelles (2000)"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Blasband, D.: Parsing in a hostile world. In: WCRE, pp. 291\u2013300 (2001)","DOI":"10.1109\/WCRE.2001.957834"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Blasband, D.: Hard facts vs soft facts. In: Hassan, A.E., Zaidman, A., Penta, M.D. (eds.) WCRE, pp. 301\u2013304. IEEE (2008)","DOI":"10.1109\/WCRE.2008.24"},{"key":"1_CR28","unstructured":"Blasband, D., Real, J.-C.: All-purpose quantifiers in an OO language. In: Proceedings of TOOLS Asia 1998 (1998)"},{"issue":"1-2","key":"1_CR29","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.scico.2007.11.003","volume":"72","author":"M. Bravenboer","year":"2008","unstructured":"Bravenboer, M., Kalleberg, K.T., Vermaas, R., Visser, E.: Stratego\/xt 0.17. a language and toolset for program transformation. Sci. Comput. Program.\u00a072(1-2), 52\u201370 (2008)","journal-title":"Sci. Comput. Program."},{"key":"1_CR30","unstructured":"Kernighan, B.W., Ritchie, D.M.: The C programming language. Prentice-Hall (1989)"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Burke, M., Fisher Jr., G.A.: A practical method for syntactic error diagnosis and recovery. In: Proceedings of the SIGPLAN 1982 Symposium on Compiler Construction, pp. 67\u201378. ACM (1982)","DOI":"10.1145\/872726.806981"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Corbato, F.J., Vyssotsky, V.A.: Introduction and overview of the multics system. In: AFIPS Conf. Proc., vol.\u00a027, pp. 185\u2013196 (1965)","DOI":"10.1145\/1463891.1463912"},{"issue":"3","key":"1_CR33","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.scico.2006.04.002","volume":"61","author":"J.R. Cordy","year":"2006","unstructured":"Cordy, J.R.: The TXL source transformation language. Sci. Comput. Program\u00a061(3), 190\u2013210 (2006)","journal-title":"Sci. Comput. Program"},{"key":"1_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-642-12107-4_16","volume-title":"Software Language Engineering","author":"M. Jonge de","year":"2010","unstructured":"de Jonge, M., Nilsson-Nyman, E., Kats, L.C.L., Visser, E.: Natural and Flexible Error Recovery for Generated Parsers. In: van den Brand, M., Ga\u0161evi\u0107, D., Gray, J. (eds.) SLE 2009. LNCS, vol.\u00a05969, pp. 204\u2013223. Springer, Heidelberg (2010)"},{"issue":"7","key":"1_CR35","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1145\/362619.362625","volume":"14","author":"F. DeRemer","year":"1971","unstructured":"DeRemer, F.: Simple LR(k) grammars. Communications of the ACM\u00a014(7), 453\u2013460 (1971)","journal-title":"Communications of the ACM"},{"issue":"4","key":"1_CR36","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1145\/69622.357187","volume":"4","author":"F. DeRemer","year":"1982","unstructured":"DeRemer, F., Pennello, T.J.: Efficient computation of LALR(1) lookahead sets. ACM Transactions on Programming Languages and Systems\u00a04(4), 615\u2013649 (1982)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"10","key":"1_CR37","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1145\/355604.361591","volume":"15","author":"E.W. Dijkstra","year":"1972","unstructured":"Dijkstra, E.W.: The humble programmer. Commun. ACM\u00a015(10), 859\u2013866 (1972)","journal-title":"Commun. ACM"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Earley, J.: An efficient context-free parsing algorithm. Communications of the ACM\u00a013(2) (1970)","DOI":"10.1145\/362007.362035"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Ekman, T., Hedin, G.: The jastadd extensible java compiler. In: Gabriel, R.P., Bacon, D.F., Lopes, C.V., Jr, G.L.S. (eds.) OOPSLA, pp. 1\u201318. ACM (2007)","DOI":"10.1145\/1297105.1297029"},{"key":"1_CR40","volume-title":"The Annotated C++ Reference Manual","author":"M.A. Ellis","year":"1990","unstructured":"Ellis, M.A., Stroustrup, B.: The Annotated C++ Reference Manual. Addison-Wesley, Reading (1990) ISBN 0-201-51459-1"},{"key":"1_CR41","unstructured":"Grosch, J.: Lark - An LR(1) Parser Generator With Backtracking. Technical report, CoCoLab - Datenverarbeitung (April 1998)"},{"key":"1_CR42","unstructured":"Grosch, J.: Personal communication (2012)"},{"key":"1_CR43","unstructured":"Herman, D.: The C Typedef Parsing Problem (2009), http:\/\/calculist.blogspot.com\/2009\/02\/c-typedef-parsing-problem.html (last visited: June 1st, 2012)"},{"key":"1_CR44","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/986948.986950","volume":"8","author":"R.C. Holt","year":"1973","unstructured":"Holt, R.C.: Teaching the fatal disease: (or) introductory computer programming using pl\/i. SIGPLAN Not.\u00a08, 8\u201323 (1973)","journal-title":"SIGPLAN Not."},{"key":"1_CR45","unstructured":"Hopcroft, J., Ullman, J.: Introduction to Automata Theory, Languages, and Computation. Addison-Wesley (1979)"},{"key":"1_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-662-21549-4_20","volume-title":"Compiler Construction","author":"J.J. Horning","year":"1974","unstructured":"Horning, J.J.: What the Compiler Should Tell the User. In: Bauer, F.L., Griffiths, M., Hornig, J.J., McKeeman, W.M., Waite, W.M., DeRemer, F.L., Hill, U., Koster, C.H.A., Poole, P.C. (eds.) CC 1974. LNCS, vol.\u00a021, pp. 525\u2013548. Springer, Heidelberg (1974)"},{"issue":"3","key":"1_CR47","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1017\/S0956796800001805","volume":"6","author":"P. Hudak","year":"1996","unstructured":"Hudak, P., Makucevich, T., Gadde, S., Whong, B.: Haskore music notation - an algebra of music. J. of Functional Programming\u00a06(3), 465\u2013483 (1996)","journal-title":"J. of Functional Programming"},{"key":"1_CR48","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813672","volume-title":"Programming in Haskell","author":"G. Hutton","year":"2007","unstructured":"Hutton, G.: Programming in Haskell. Cambridge Univ. Press, Cambridge (2007)"},{"key":"1_CR49","unstructured":"International Business Machines. CICS, http:\/\/www-4.ibm.com\/software\/ts\/cics\/ (last visited: June 1st, 2012)"},{"key":"1_CR50","unstructured":"International Business Machines Corp., OS and DOS PL\/1 Language Reference Manual (1981)"},{"key":"1_CR51","unstructured":"Johnson, S.C.: YACC \u2014 Yet another compiler - compiler. Computing Science Technical Report No. 32, Bell Laboratories, Murray Hill, N.J. (1975)"},{"key":"1_CR52","unstructured":"Jones, C.: The Year 2000 Software Problem - Quantifying the Costs and Assessing the Consequences. Addison-Wesley (1998) ISBN 978-0201309645"},{"key":"1_CR53","unstructured":"Kadhim, B.M.: Debugger generation in a compiler generation system. PhD thesis, University of Colorado (1998)"},{"key":"1_CR54","unstructured":"Klint, P., Visser, E.: Using Filters for the Disambiguation of Context-free Grammars. Technical Report P9426, Programming Research Group, University of Amsterdam (December 1994)"},{"key":"1_CR55","unstructured":"Klint, P., Visser, E.: Using filters for the disambiguation of context-free grammars (March 16, 1994)"},{"key":"1_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-06841-4_65","volume-title":"Proceedings of the Second Colloquium on Automata, Language and Programming","author":"B. Lang","year":"1974","unstructured":"Lang, B.: Deterministic Techniques for Efficient Non-Deterministic Parsers. In: Loeckx, J. (ed.) ICALP 1974. LNCS, vol.\u00a014, pp. 255\u2013269. Springer, Heidelberg (1974)"},{"key":"1_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-24723-4_6","volume-title":"Compiler Construction","author":"S. McPeak","year":"2004","unstructured":"McPeak, S., Necula, G.C.: Elkhound: A Fast, Practical GLR Parser Generator. In: Duesterwald, E. (ed.) CC 2004. LNCS, vol.\u00a02985, pp. 73\u201388. Springer, Heidelberg (2004)"},{"key":"1_CR58","unstructured":"Meyer, B.: Eiffel: The Language. Prentice-Hall (1992) ISBN 0-13-247925-7"},{"key":"1_CR59","doi-asserted-by":"crossref","unstructured":"Moonen, L.: Generating robust parsers using island grammars. In: WCRE, pp. 13\u201322 (2001)","DOI":"10.1109\/WCRE.2001.957806"},{"issue":"5","key":"1_CR60","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/367236.367262","volume":"3","author":"P. Naur","year":"1960","unstructured":"Naur, P., et al.: Report on the algorithmic language ALGOL 60. Communications of the ACM\u00a03(5), 299\u2013314 (1960)","journal-title":"Communications of the ACM"},{"key":"1_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-00434-6_7","volume-title":"Software Language Engineering","author":"E. Nilsson-Nyman","year":"2009","unstructured":"Nilsson-Nyman, E., Ekman, T., Hedin, G.: Practical Scope Recovery Using Bridge Parsing. In: Ga\u0161evi\u0107, D., L\u00e4mmel, R., Van Wyk, E. (eds.) SLE 2008. LNCS, vol.\u00a05452, pp. 95\u2013113. Springer, Heidelberg (2009)"},{"issue":"7","key":"1_CR62","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1002\/spe.4380250705","volume":"25","author":"T.J. Parr","year":"1995","unstructured":"Parr, T.J., Quong, R.W.: ANTLR: A Predicated- LL(k) Parser Generator. Software - Practice and Experience\u00a025(7), 789\u2013810 (1995)","journal-title":"Software - Practice and Experience"},{"key":"1_CR63","unstructured":"Ramsey, N.: Eliminating spurious error messages using exceptions, polymorphism, and higher-order functions. Dept of Computer Science, University of Virginia (1996)"},{"key":"1_CR64","unstructured":"Sloane, A.M.: Post-design domain-specific language embedding: A case study in the software engineering domain. In: HICSS, p. 281 (2002)"},{"key":"1_CR65","unstructured":"Smith, B.C.: Reflection and semantics in a procedural language. Technical Report TR-272. MIT, Cambridge, MA (1982)"},{"key":"1_CR66","unstructured":"Synytskyy, N., Cordy, J.R., Dean, T.R.: Robust multilingual parsing using island grammars. In: CASCON, pp. 266\u2013278. IBM (2003)"},{"key":"1_CR67","first-page":"756","volume":"2","author":"M. Tomita","year":"1985","unstructured":"Tomita, M.: An efficient context-free parsing algorithm for natural languages. IJCAI\u00a02, 756\u2013764 (1985)","journal-title":"IJCAI"},{"key":"1_CR68","unstructured":"Vadim Maslov, C.D.: BTYacc \u2013 Backtracking yacc \u2013 home page, http:\/\/www.siber.com\/btyacc\/ (last visited: June 1, 2012)"},{"key":"1_CR69","doi-asserted-by":"crossref","unstructured":"van den Brand, M., Sellink, M.P.A., Verhoef, C.: Current parsing techniques in software renovation considered harmful. In: IWPC, p. 108. IEEE Computer Society (1998)","DOI":"10.1109\/WPC.1998.693325"},{"key":"1_CR70","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/978-3-540-73589-2_27","volume-title":"ECOOP 2007 \u2013 Object-Oriented Programming","author":"E. Wyk Van","year":"2007","unstructured":"Van Wyk, E., Krishnan, L., Bodin, D., Schwerdfeger, A.: Attribute Grammar-Based Language Extensions for Java. In: Bateni, M. (ed.) ECOOP 2007. LNCS, vol.\u00a04609, pp. 575\u2013599. Springer, Heidelberg (2007)"},{"key":"1_CR71","unstructured":"Visser, E.: Scannerless generalized-LR parsing. Technical Report P9707, Programming Research Group, University of Amsterdam (July 1997)"},{"key":"1_CR72","doi-asserted-by":"crossref","unstructured":"Wagner, T.A., Graham, S.L.: Incremental analysis of real programming languages. In: PLDI, pp. 31\u201343 (1997)","DOI":"10.1145\/258916.258920"},{"key":"1_CR73","doi-asserted-by":"crossref","unstructured":"Clocksin, W.F., Mellish, C.S.: Programming in Prolog, 4th edn. Springer (1994) ISBN 3-540-58350-5","DOI":"10.1007\/978-3-642-97596-7"},{"issue":"4","key":"1_CR74","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1002\/spe.4380010403","volume":"1","author":"N. Wirth","year":"1971","unstructured":"Wirth, N.: The design of a PASCAL compiler. Software\u2013Practice and Experience\u00a01(4), 309\u2013333 (1971)","journal-title":"Software\u2013Practice and Experience"},{"key":"1_CR75","unstructured":"Wirth, N.: Programming in Modula II, 4th edn. Springer (1988) ISBN 3-540-50150-9"}],"container-title":["Lecture Notes in Computer Science","Generative and Transformational Techniques in Software Engineering IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35992-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T15:33:59Z","timestamp":1745940839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35992-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642359910","9783642359927"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35992-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}