摘要:
A system, method, and computer program product for computing a digest value of a document, one or more schemas, and a validation report. The validation report indicates a validation status of the document based on the schema or schemas. The digest value is encrypted to produce a digital signature of the document, the schema or schemas, and the validation report.
摘要:
A system, method, and computer program product for computing a digest value of a document, one or more schemas, and a validation report. The validation report indicates a validation status of the document based on the schema or schemas. The digest value is encrypted to produce a digital signature of the document, the schema or schemas, and the validation report.
摘要:
A method for supervising text includes receiving input text in a natural language, the input text including at least one source sentence. The input text is analyzed, which includes, for a source sentence in the input text, generating a syntacetic representation. A target sentence is generated in the same natural language, based on the syntacetic representation. The source sentence is compared with the target sentence to determine whether there is a match. A decision is output, based on the comparison.
摘要:
Source code is compiled using a multi-stage compiler that includes a tokenizer, a type checker, and a composer. The tokenizer segments source code into a sequence of tagged segments. The source code includes at least one instruction that composes a first abstraction and a second abstraction with a selected composition operator. The parser builds a tree using the sequence of tagged segments. The type checker performs a first pass of the tree to determine whether abstractions on the tree are well typed. The composer reduces the at least one instruction composing the first and the second abstractions on the tree to a third abstraction. The composer substitutes the first and the second abstractions on the tree with the third abstraction, wherein the type checker performs a second pass of the tree to determine whether the third abstraction is well typed.
摘要:
A system and method for encrypting/decrypting a document is provided. The encryption method includes encrypting portions within the document containing structural information with an asymmetric public key, encrypting portions within the document containing content information with a symmetric private key, and outputting the document, whereby a service provider provided with a public key is able to access and process only the structural information.
摘要:
A computer-based method and system for processing links in a markup language document are provided. The method includes providing a specification in computer memory, the specification including at least one link description rule and at least one link processing rule for processing links which satisfy the link description rule. A markup language document is input to computer memory and links in the markup language document are processed in accordance with the link description rule(s) and link processing rule(s) of the specification to generate processed data. The processed data includes at least one of a modified markup language document and data derived from the markup language document.
摘要:
In a method for identifying cells, line graphics are converted into vectors (12) having a canonical form without vector overlaps or crossings. Connecting vectors (22, 24, 26, 30, 32) are associated, including (i) forking vectors (22) having common starting points, and (ii) meeting vectors (24) having common ending points. A set of vectors is identified including at least two forking vectors and two meeting vectors cooperatively defining a cell.
摘要:
A statement evaluation technique is based on bi-evaluation of programming statements. A programming language statement is evaluated that includes a first and a second sub-statement. The first sub-statement is evaluated and an evaluation success result is determined if evaluation succeeds, or a distinguished value if evaluation fails. The distinguished value is a value that is not included in the range of possible evaluation success results of the first sub-statement. Further, it is determined whether the second sub-statement is to be evaluated. If this is the case, an evaluation success result of the second sub-statement is determined if evaluation succeeds, or the distinguished value if evaluation fails. The range of possible evaluation success results of the second sub-statement does not include the distinguished value. The evaluation result of the statement is determined depending on at least whether evaluation of the first sub-statement succeeds or fails.
摘要:
Programming abstractions with at least one expression are composed to a single abstraction using a composition operator. Expressions from the abstractions are unfolded by removing the prefix of each abstraction and substituting formal parameter names in each expression with a common parameter name to define open variables. The unfolded expressions are transformed to a reduced expression using a composition pattern that tunes semantics of the composition operators. The reduced expression is nested in the single abstraction by: appending a selected prefix of the composed abstraction to the reduced expression, binding the open variables of the reduced expression to the formal parameter of the selected prefix, and computing the type of the formal parameter of the selected prefix.
摘要:
A system and method for encrypting/decrypting a document is provided. The encryption method includes encrypting portions within the document containing structural information with an asymmetric public key, encrypting portions within the document containing content information with a symmetric private key, and outputting the document, whereby a service provider provided with a public key is able to access and process only the structural information.