Flylib.com
List of Examples
Previous page
Table of content
Introduction
A Specimen Example
Chapter 1: XSLT in Context
A "Hello, world!" XSLT Stylesheet
Tabulating Word Frequencies
Displaying a Poem
Chapter 2: The XSLT Processing Model
An XML Tree
Well-Balanced XML Fragment
Push Processing
Controlling the Sequence of Processing
Selecting Nodes Explicitly
Chapter 3: Stylesheet Structure
Using <xsl: include>
Using <xsl: import>
Embedded Stylesheets
A Simplified Stylesheet
Using an Extension Instruction
Chapter 5: XSLT Elements
Using Modes
Checking for Cycles in a Graph
Generating an Attribute Conditionally
Deciding the Attribute Name at Runtime
Using an Attribute Set for Numbering
Using Recursion' to Process a Sequence of Nodes
Using Recursion to Process a Sequence of Strings
Using a character-map to comment-out Elements
Example Example: Using <xsl:copy-of> for Repeated Output
Converting Attributes to Child Elements
Showing the Ancestors of a Node
Single-Level Grouping by Value
Example Example: Multilevel Grouping by Value
Grouping Consecutive Elements by Name
Example Example: Handling Repeating Groups of Adjacent Elements
Handling Flat XHTML Documents
Looking for Cycles among Attribute Sets
Formatting a List of Names
Example 1: Precedenec of Variables
Example 2: Precedence of Template Rules
Using <xsl: Include> with Named Attribute Sets
Multivalued Nonunique Keys
Example of <xsl: namespace-alias >
Numbering the Lines of a Poem
Using <xsl: param> with a Default Value
Tunnel Parameters
Creating Multiple Output Files
Sorting on the Result of a Calculation
Template Rules
Using modes
Using a Variable for Context-Sensitive Values
Getting the Result of <xsl:call-template> In a Variable
A MultiPhase Transformation
Chapter 6: Patterns
Using the key() Pattern to Format a Specific Node
Chapter 7: XSLT Functions
current()
Using the document() Function to Analyze a Stylesheet
A Lookup Table in the Stylesheet
Creating Multiple Output Files
Using generate-Id() to Create Links
Using Keys as Cross-References
Using Keys for Grouping
Processing a Comma-Separated-Values File
Chapter 8: Extensibility
Using VBScript in an MSXML3 Stylesheet
An Extension Function to Calculate a Square Root
Calling External Functions within a Loop
A Function with Uncontrolled Side Effects
Chapter 9: Stylesheet Design Patterns
A "Fill-in-the-Blanks" Stylesheet
A Navigational Stylesheet
A Rule-Based Stylesheet
Aggregating a List of Numbers
Using Interleaved Structures
Appendix C: Microsoft XSLT Processors
Using Client-Side JScript to Transform a Document
Appendix E: Saxon
Using saxon: evaluate() to Apply Business Rules
Previous page
Table of content
NetBeansв„ў IDE Field Guide: Developing Desktop, Web, Enterprise, and Mobile Applications (2nd Edition)
ISBN: 764569090
EAN: 2147483647
Year: 2003
Pages: 324
Authors:
Patrick Keegan
,
Ludovic Champenois
,
Gregory Crawley
,
Charlie Hunt
,
Christopher Webster
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Characters, Strings, and Text Output
Basic Graphics Commands
Adding Sound Effects to Your Game
Playing Intro Movies and Cut-Scenes
Fundamentals of 3D Graphics Programming
Snort Cookbook
Logging Packets That Snort Captures
Ignoring Some Alerts
Countermeasures from Rules
Running Snortsnarf Automatically
Installing and Configuring Barnyard
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Test Execution
Improving the Testing Process
Some Final Thoughts…
Appendix C IEEE Templates
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
IP Multicast
Adaptive Inspection Prevention Security Services Module Overview (AIP-SSM)
System Clock
Failover
WebVPN
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Triggers
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Running Operating System Commands
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies