Abstract:
A method, operative at a web server, for generating an HTML table having dynamic data, wherein the table can be oriented in any horizontal or vertical orientation. The method preferably utilizes a table format page object to format the table. To facilitate selective rotation of the dynamic table, the method begins by associating together given attribute characteristics of each individual cell in the table. The page developer then sets a table style rotation property on the table format page object. In response to a client request, the table format page object is then instantiated with the dynamic data. The table style rotation property is applied to the table to control the table's orientation. The resulting table is then served back to the requesting client browser.
Abstract:
A method for processing a Document Object Model (DOM) tree to verify context between multiple related XML tags. One or more of these related XML tags are custom tags. According to the invention, contextual relationships between the related XML tags are verified using the DOM itself to indicate state. In a preferred embodiment, the inventive method begins during the processing of the DOM tree with a current element being processed replacing itself with a placeholder element. The placeholder element includes attributes indicating its state. If a clean-up element does not already exist for the element being processed, the current element creates a clean-up element and adds it to the DOM, for example, as a child node to the root position. When the clean-up element is later encountered, this element scans the entire DOM for all the related tags (now placeholders) of interest. The clean-up element loads the state information from each and processes the state information accordingly. When complete, the clean-up element removes itself from the DOM.
Abstract:
The claimed subject matter provides for systems and/or methods for debugging a computer-executable file. The computer-executable file may be executing in a first runtime environment and located in a first process. The file may further comprise on object having a proxy in that first runtime environment. One method embodiment comprises the steps of debugging said computer-executable file; detecting a proxy for an object called by said file; decoding said proxy to obtain physical information regarding said object; returning said physical object information; and transforming said physical object information into logical object information. In addition, one embodiment of a system is provided that comprising a debugger, said debugger debugging client code; a proxy decoder, said proxy decoder providing information to said debugger about the object pointed by said proxy; and an abstraction transformation, said abstraction transformation transforming physical expressions of a proxy into higher level logical expressions.
Abstract:
Provided is a copolymer rubber, comprising a copolymer having a star-shaped block structure (SIB-PA)n-X, wherein SIB is a block comprising styrene, butadiene, and isoprene as constituent monomers; PA is a block comprising butadiene or isoprene as a constituent monomer; X is the residue of at least one coupling agent; and n=2-4. Also provided is a process for preparing the copolymer rubber and use thereof.
Abstract:
Compounds of formula (I), wherein A1 represents —O—, —S— or —CH2—; A2 represents —CH2— or —O—; A3 represents C3-C8-cycloalkylene; saturated or unsaturated 4 to 8-membered heterocyclodiyl with 1, 2 or 3 heteroatoms selected from nitrogen or oxygen, which group A3 is unsubstituted or substituted; A4 represents C1-C4alkylene, —C(=0)-; G represents aryl or heteroaryl, which is unsubstituted or substituted; X1 represents a nitrogen atom or CR1; R1 represents a hydrogen atom or a halogen atom; R1 represents a hydrogen atom; m is 0 or 1; n is 1; the —(CH2)n— group is unsubstituted or substituted; p is 0 or 1; or pharmaceutically acceptable salts thereof are valuable for use as a medicament for the treatment of bacterial infections.
Abstract:
A computerized data protection method prevents data of an electronic device from being compromised through e-mail. A digital certificate is installed in the electronic device, and one or more safe e-mail addresses are configured and stored in the digital certificate. Predetermined data stored in the electronic device are correlated with the one or more safe e-mail addresses. When the predetermined data need to be sent to a target e-mail address, whether the target e-mail address matches with one of the safe e-mail addresses is verified. If the target e-mail address matches with one of the safe e-mail addresses, the predetermined data is sent to the target e-mail address.
Abstract:
A method for text editing is provided. The method includes steps: displaying a text file on a touch display screen; displaying a clipboard alongside of the displayed text file; determining selected text in response to a text selection touch operation; generating parameters representative of the selected text in response to the text selection touch operation; copying the parameters to the clipboard and displaying the parameters on the displayed clipboard in response to a use's first loading operation; finding the text in the text file according to the selected parameters displayed on the displayed clipboard in response to a user's parameter selection operation; and copying the found text from the text file to an intended location in response to a user's second loading operation. A related text editing system is also provided.
Abstract:
A computerized method manages prepaid fees of a communication device having a first prepaid account. The first prepaid account is bound with one or more second prepaid accounts of one or more third-party terminals. Residual prepaid fees of the first prepaid account, and whether the prepaid fees of the first prepaid account are less than a predetermined value is determined. When the residual prepaid fees of the first prepaid account are less than the predetermined value, one of the second prepaid accounts is determined as a fee transferring account. A request message is sent to a communication server to request transferring a predetermined amount of prepaid fees from the fee transferring account to the first prepaid account of the communication device.
Abstract:
A computerized method protects data stored in a data storage device. One or more safe destinations are set and correlated with predetermined data of the data storage device. When target data correlated with the safe destinations is needed to be transmitted to a target destination, whether the target destination matches with one of the safe destinations is determined. A data transmission program of the data storage device is executed, and the target data is transmitted to the target destination using the data transmission program, when the target destination matches with one of the safe destinations. If the target destination does not match with any of the safe destinations, a user is notified to input a password and the target data is transmitted to the target destination when the user has input a valid password within a predetermined time period.
Abstract:
In a message management method of a communication device, a plurality of keywords relating to different commercial activities are preset and stored into a keyword database. Whether a received message of the communication device is an advertisement of a commercial activity is determined by comparing content of the message with each keyword of the keyword database. A starting time of the commercial activity is extracted from the message if the message is an advertisement. An pre-activity alarm time is determined according to the extracted starting time, and an alarm is given to a user when the alarm time is reached.