855 Symbols & (Ampersand), 211 && (AND Operator), 608 `` (Backquotes/Backticks), 143 & (Bitwise AND) Operator, 1

Total Page:16

File Type:pdf, Size:1020Kb

855 Symbols & (Ampersand), 211 && (AND Operator), 608 `` (Backquotes/Backticks), 143 & (Bitwise AND) Operator, 1 index.fm Page 855 Wednesday, October 25, 2006 1:28 PM Index Symbols A & (ampersand), 211 abs() function, 117 && (AND operator), 608 Access methods, 53, 758–760 `` (backquotes/backticks), 143 ACTION attribute, 91 & (bitwise AND) operator, 140 action attribute, 389–390, 421 ~ (bitwise NOT) operator, 141 addcslashes() function, 206–208, 214 | (bitwise OR) operator, 140 Addition (+), 112 ^ (bitwise XOR) operator, 140 addslashes() function, 206–208, 214 ^ (caret metacharacter), 518, 520–521 admin_art_edit.php, 784, 793–796 " (double quote), 211 admin_art_list.php, 784 @ (error control) operator, 143–145 admin_artist_edit.php, 784, 788–789 > (greater than), 211, 608, 611-612 admin_artist_insert.php, 784, 791–792 << (left shift) operator, 141 admin_artist_list.php, 784, 786–787, < (less than), 211, 608, 611-612 796 * metacharacter, 536–538 admin_footer.php, 784 !, NOT operator, 608 admin_header.php, 784, 803 < operator, 608, 611–612 admin_login.php, 784, 797, 803 <= operator, 608 Advisory locking, 474 <>, != operator, 608–609 Aliases, 630–631 = operator, 608–609 Alphabetic sort of, 299–300 > operator, 608, 611–612 Alphanumeric word characters, metasymbols -> operator, 743–744 representing, 531–533 >= operator, 608 ALTER command, 631 || (OR operator), 130–132, 608 ALTER TABLE statement, 620, 631–633 >> (right shift) operator, 141 Alternation, metacharacters for, 543 ' (single quote), 211, 352–353, 609 Anchoring metacharacters, 520–523 % wildcard, 613–614 beginning-of-line anchor, 520–523 >>> (zero-fill right shift) operator, end-of-line anchor, 522 141 word boundaries, 523 855 index.fm Page 856 Wednesday, October 25, 2006 1:28 PM 856 Index AND operator, 612–613 array_multisort() function, 298, 334 && (and) operator, 127–128 array_pad() function, 251 compared to using the word AND, 132 array_pop() function, 311–312, 332 Apache Web server, 14, 834 array_product() function, 332 configuring to use PHP module (all array_push() function, 315, 317–318, 332 platforms), 851–852 array_rand() function, 306, 310, 332 installing on Windows, 849–850 array_reduce() function, 332 testing installation, 852 array_reverse() function, 332 Appending to files, 473–474 array_search() function, 333 Application Programming Interface (API), 5 array_shift() function, 311, 313, 332 area.php, 146 array_slice() function, 320–321, 332 Arguments, 27, 29, 339, See also Passing array_splice() function, 311, 315, 318– arguments 321, 332 defined, 341 array_sum() function, 331 missing, 344–345 array_udiff() function, 333 names of, 341–342 array_udiff_assoc() function, 333 passing, 341–351 array_udiff_uassoc() function, 333 variable number of, 345–347 array_uintersect() function, 334 Arithmetic operators, 112–113 array_uintersect_assoc() function, array() function, 251–252, 330 334 (array) operator, 119 array_uintersect_uassoc() function, array_change_key_case() function, 333 334 array_chunk() function, 332 array_unique() function, 314–315, 332 array_combine() function, 251 array_unshift() function, 315–316, 332 array_count_values() function, 278–279, array_values() function, 283–284, 331, 333 333 array_diff() function, 333 array_walk() function, 332 array_diff_assoc() function, 333 array_walk_recursive() function, 332, array_diff_key() function, 333 360 array_diff_ukey() function, 333 Arrays, 46, 95, 247–335 array_diff_unassoc() function, 333 accessing an array’s elements (values), array_fill() function, 251, 255–256, 330 257–262 array_filter() function, 332 alphabetic sort, 299–300 array_flip() function, 332 array() function, 251–252, 330 array_intersect() function, 334 array identifier [ ], 252–253 array_intersect_assoc() function, 334 array_combine() function, 251 array_intersect_key() function, 334 array_count_values() function, 278– array_intersect_uassoc() function, 334 279, 333 array_intersect_ukey() function, 334 array_fill() function, 251, 255–256, array_key_exists() function, 331 330 array_keys() function, 281–282, 331 array_keys() function, 281–282, 331 array_map() function, 332, 359, 359–360 array_merge() function, 323, 325, 331 array_merge() function, 323, 325, 331 array_pad() function, 251 array_merge_recursive() function, 326, array_push() function, 315, 317–318, 331 332 index.fm Page 857 Wednesday, October 25, 2006 1:28 PM Index 857 array_slice() function, 320–321, 332 print_r() function, 262–264 array_unshift() function, 315–316, var_dump() function, 265–266 332 randomizing, 306–310 array_values() function, 283–284, 331, range() function, 251, 253–255 333 removing, 310–315 associative, 248 removing duplicate values from, 314–315 elements of, 259–260 reversed sort, 302 merging, 325 sizeof() function, 277–279, 333 sort by key, 305–306 sort by key, 305–306 sort by values, 302–303 sort by values, 302–303 checking for the existence of, 274–275 in reverse order, 303–304 combining/merging, 322–327 sorting, 298–306 compact() function, 251 splicing, 318–321 count() function, 278–279 arsort() function, 298, 303–304, 334 creating and naming, 251–256 Art gallery, building (example), See Canvas creating from strings, 275–277 Gallery Web project creating strings from, 275–277 artist_detail.php, 784, 798, 800–801 creating variables from array elements, AS keyword, 630 286–293 ASCII character set, 125 defined, 247 asort() function, 298, 334 each() function, 284–285, 288, 331 ASP, 14, 41 elements, 247 asp_tags configuration option, 853 adding, 315–319 Assignment operator, 107–108 copying, 320–321 Assignment statement, defined, 108 removing, 310–315 Associative arrays, 248 extract() function, 97, 288–293, and extract() function, 288–293 331, 398–399, 788 merging, 325 extracting keys and values from, 281–286 sort by key, 305–306 finding the size of, 278–280 sort by values, 302–303 functions, 330–335 Associativity, 108–111 list() function, 286–288 rules of, for PHP operators, 110 and loops, 266–273 Attributes, 52, 675, 740–741 mixing elements in, 260–262 AUTH_TYPE, 98 modifying, 310–335 AUTO_INCREMENT attribute, 625 multidimensional, 293–297 Autoglobal arrays, 431 numeric, 248 Autoincrement and autodecrement operators, elements of, 257–258 115–117 shuffling, 309–310 AVG() function, 634 numeric sort, 300–301 Axmark, David, 7 numerically indexed, merging, 323–324 operators, 327–330 B equality operator, 329–330 Backquotes, 143 identical operator, 329–330 Backslash (/), 62 union operator, 327–328 Backticks, 74, 143 printing, 262–266 Base class, 763 index.fm Page 858 Wednesday, October 25, 2006 1:28 PM 858 Index base_convert() function, 117 header.php page, 797–798 basename() function, 485–486 index.php page, 798–799 BBEdit, 15 public/private pages, 783 Beginning-of-line anchor, 520–523, 521 securing pages with login, 803–805 Berners-Lee, Tim, 1, 3 Web site, creating, 785–805 BETWEEN operator, 608, 615 where to find the files for, 805 BIG5, 214 Capturing, 545–547 BIG5-HKSCS, 214 Caret (^) metacharacter, 518, 520–521 Binary operators, 107 Carriage return, 24 bindec() function, 117 Case sensitivity, SQL commands, 599–600 binhex() function, 214 Case statement, 228 Bits, 140 Casting operators, 118–120 Bitwise operators, 140–143 C/C++, 41, 49 shift operators, 141–142 ceil() function, 117 using, 140 CGI script, 2 Black box, See Functions Character classes, 525–526 BLOB data type, 622 Character list (charlist), 182, 512 Block, 132 charset, 211 (bool) operator, 119 CHAR(SIZE) data type, 622 Boolean literals, 68 checkbox input type, 388, 406–407 Boolean values, 44 checkdate() function, 831–832 break statement, 51, 239–243 chgrp() function, 447 Browser: chmod() function, 447–448 and HTML forms, 380–383 chop function, 167fn, 182, 214 using to remove cookies, 693–694 chown() function, 447 Built-in constants, 103 chr() function, 205, 214 Built-in functions, PHP, 27–28, 69 chunk_split function, 214 Bytes, 140, 149 Chunks, 814 Class constants, 774–775, 775 C Class members, 742 Callback functions, 358, 358–362 __CLASS__, 103 array_map() function, 359–360 Classes, 52–53 array_walk_recursive() function, 360 accessor or instance methods defined, 358 (setters/getters), 758–760 Canvas Gallery Web project, 783–808 class constants, 774–775 administration pages, 786–788 constructors, 753–756 database, creating, 785–786 creating, 746–747 files, 784 defined, 740 installing, 805–808 destructors, 756–758 MySQL database, installing, 806–807 encapsulation, 749–750 PHP pages, editing, 808 functions for getting class information, public pages, 797–803 748–749 artist_detail.php page, 798, 800– information hiding, 749–750 801 inheritance, 741, 763–766 contact.php page, 802–803 instantiating, 741–742 index.fm Page 859 Wednesday, October 25, 2006 1:28 PM Index 859 magic methods, 753–762 creating with the define() function, members, 742 100–101 and scope, 750–752 defined, 99–100 methods, 742 magic, 102 and objects, 740 predefined, 102–103 difference between, 742 __construct() method, 753 overriding methods, 766–768 Constructors, 753–756 properties, 742 and inheritance, 763–766 protected access, 768–771 contact.php, 784 reusing, 776–780 contact.php page, 802–803 static members, 773–774 continue control statement, 239–243 working with, 741–772 continue statement, 51 Classes and objects, 52–54 Control statements, loops, 239–243 Client/server databases, 568 Control string, 156 Client/server model, 7 convert_cyr_string function, 214 clock.php, 354 convert_uudecode function, 214 Clustering, 544, 544–545 convert_uuencode function, 214 Codd, E.F. “Ted,” 595 converter() function, 377 ColdFusion, 14 $_COOKIE global array, 678–681 Command, 597 Cookie jar, 674 Command-line applications, defined, 32 Cookies, 673–736 Command-line
Recommended publications
  • Express Yourself! Regular Expressions Vs SAS Text String Functions Spencer Childress, Rho®, Inc., Chapel Hill, NC
    PharmaSUG 2014 - Paper BB08 Express Yourself! Regular Expressions vs SAS Text String Functions Spencer Childress, Rho®, Inc., Chapel Hill, NC ABSTRACT ® SAS and Perl regular expression functions offer a powerful alternative and complement to typical SAS text string functions. By harnessing the power of regular expressions, SAS functions such as PRXMATCH and PRXCHANGE not only overlap functionality with functions such as INDEX and TRANWRD, they also eclipse them. With the addition of the modifier argument to such functions as COMPRESS, SCAN, and FINDC, some of the regular expression syntax already exists for programmers familiar with SAS 9.2 and later versions. We look at different methods that solve the same problem, with detailed explanations of how each method works. Problems range from simple searches to complex search and replaces. Programmers should expect an improved grasp of the regular expression and how it can complement their portfolio of code. The techniques presented herein offer a good overview of basic data step text string manipulation appropriate for all levels of SAS capability. While this article targets a clinical computing audience, the techniques apply to a broad range of computing scenarios. INTRODUCTION This article focuses on the added capability of Perl regular expressions to a SAS programmer’s skillset. A regular expression (regex) forms a search pattern, which SAS uses to scan through a text string to detect matches. An extensive library of metacharacters, characters with special meanings within the regex, allows extremely robust searches. Before jumping in, the reader would do well to read over ‘An Introduction to Perl Regular Expressions in SAS 9’, referencing page 3 in particular (Cody, 2004).
    [Show full text]
  • Perl Regular Expressions 102
    NESUG 2006 Posters Perl Regular Expressions 102 Kenneth W. Borowiak, Howard M. Proskin & Associates, Inc., Rochester, NY ABSTRACT Perl regular expressions were made available in SAS® in Version 9 through the PRX family of functions and call routines. The SAS community has already generated some literature on getting started with these often-cryptic, but very powerful character functions. The goal of this paper is to build upon the existing literature by exposing some of the pitfalls and subtleties of writing regular expressions. Using a fictitious clinical trial adverse event data set, concepts such as zero-width assertions, anchors, non-capturing buffers and greedy quantifiers are explored. This paper is targeted at those who already have a basic knowledge of regular expressions. Keywords: word boundary, negative lookaheads, positive lookbehinds, zero-width assertions, anchors, non-capturing buffers, greedy quantifiers INTRODUCTION Regular expressions enable you to generally characterize a pattern for subsequent matching and manipulation of text fields. If you have you ever used a text editor’s Find (-and Replace) capability of literal strings then you are already using regular expressions, albeit in the most strict sense. In SAS Version 9, Perl regular expressions were made available through the PRX family of functions and call routines. Though the Programming Extract and Reporting Language is itself a programming language, it is the regular expression capabilities of Perl that have been implemented in SAS. The SAS community of users and developers has already generated some literature on getting started with these often- cryptic, but very powerful character functions. Introductory papers by Cassell [2005], Cody [2006], Pless [2005] and others are referenced at the end of this paper.
    [Show full text]
  • Quick Tips and Tricks: Perl Regular Expressions in SAS® Pratap S
    Paper 4005-2019 Quick Tips and Tricks: Perl Regular Expressions in SAS® Pratap S. Kunwar, Jinson Erinjeri, Emmes Corporation. ABSTRACT Programming with text strings or patterns in SAS® can be complicated without the knowledge of Perl regular expressions. Just knowing the basics of regular expressions (PRX functions) will sharpen anyone's programming skills. Having attended a few SAS conferences lately, we have noticed that there are few presentations on this topic and many programmers tend to avoid learning and applying the regular expressions. Also, many of them are not aware of the capabilities of these functions in SAS. In this presentation, we present quick tips on these expressions with various applications which will enable anyone learn this topic with ease. INTRODUCTION SAS has numerous character (string) functions which are very useful in manipulating character fields. Every SAS programmer is generally familiar with basic character functions such as SUBSTR, SCAN, STRIP, INDEX, UPCASE, LOWCASE, CAT, ANY, NOT, COMPARE, COMPBL, COMPRESS, FIND, TRANSLATE, TRANWRD etc. Though these common functions are very handy for simple string manipulations, they are not built for complex pattern matching and search-and-replace operations. Regular expressions (RegEx) are both flexible and powerful and are widely used in popular programming languages such as Perl, Python, JavaScript, PHP, .NET and many more for pattern matching and translating character strings. Regular expressions skills can be easily ported to other languages like SQL., However, unlike SQL, RegEx itself is not a programming language, but simply defines a search pattern that describes text. Learning regular expressions starts with understanding of character classes and metacharacters.
    [Show full text]
  • Context-Free Grammar for the Syntax of Regular Expression Over the ASCII
    Context-free Grammar for the syntax of regular expression over the ASCII character set assumption : • A regular expression is to be interpreted a Haskell string, then is used to match against a Haskell string. Therefore, each regexp is enclosed inside a pair of double quotes, just like any Haskell string. For clarity, a regexp is highlighted and a “Haskell input string” is quoted for the examples in this document. • Since ASCII character strings will be encoded as in Haskell, therefore special control ASCII characters such as NUL and DEL are handled by Haskell. context-free grammar : BNF notation is used to describe the syntax of regular expressions defined in this document, with the following basic rules: • <nonterminal> ::= choice1 | choice2 | ... • Double quotes are used when necessary to reflect the literal meaning of the content itself. <regexp> ::= <union> | <concat> <union> ::= <regexp> "|" <concat> <concat> ::= <term><concat> | <term> <term> ::= <star> | <element> <star> ::= <element>* <element> ::= <group> | <char> | <emptySet> | <emptyStr> <group> ::= (<regexp>) <char> ::= <alphanum> | <symbol> | <white> <alphanum> ::= A | B | C | ... | Z | a | b | c | ... | z | 0 | 1 | 2 | ... | 9 <symbol> ::= ! | " | # | $ | % | & | ' | + | , | - | . | / | : | ; | < | = | > | ? | @ | [ | ] | ^ | _ | ` | { | } | ~ | <sp> | \<metachar> <sp> ::= " " <metachar> ::= \ | "|" | ( | ) | * | <white> <white> ::= <tab> | <vtab> | <nline> <tab> ::= \t <vtab> ::= \v <nline> ::= \n <emptySet> ::= Ø <emptyStr> ::= "" Explanations : 1. Definition of <metachar> in our definition of regexp: Symbol meaning \ Used to escape a metacharacter, \* means the star char itself | Specifies alternatives, y|n|m means y OR n OR m (...) Used for grouping, giving the group priority * Used to indicate zero or more of a regexp, a* matches the empty string, “a”, “aa”, “aaa” and so on Whi tespace char meaning \n A new line character \t A horizontal tab character \v A vertical tab character 2.
    [Show full text]
  • K5917: Using Regular Expressions in a Health Monitor Receive String
    K5917: Using regular expressions in a health monitor receive string Non-Diagnostic Original Publication Date: Oct 20, 2015 Update Date: Aug 24, 2021 Topic Some BIG-IP application health monitors, such as the HTTP monitor, include a Receive String field. This field specifies a string for comparison with the server response. You can specify a regular expression in that field to provide some flexibility in matching an expected response from a healthy server. Health monitors that support regular expressions include TCP, HTTP, HTTPS, and User Datagram Protocol (UDP). Regular expressions provide the flexibility for identifying strings of text that are of interest, such as certain characters, words, or a pattern of characters. With some exceptions, health monitors on BIG-IP systems support the use of POSIX Extended Regular Expressions (ERE). ERE syntax treats most characters as literals, meaning that they match only themselves, and defines metacharacters, which can be used to represent special characters, multiple characters, or a sequences of characters. To reduce operating overhead for the BIG-IP system, F5 recommends that, whenever possible, you use static strings for monitoring. Using static strings instead of regular expressions for monitoring is simpler and more efficient. However, the performance impact is minimal in comparison to the administrative flexibility offered from using regular expressions. For example, your HTTP health monitor requests the /admin/monitor.html page from the web server, which invokes a simple local script. The script checks whether vital local operating parameters, such as connections, memory, processor, or disk space, are within acceptable limits. If so, the script returns the monitor.html page, which includes a single line of body text that varies for each server, based on the server name: Server1: OK Server2: OK Server3: OK If you do not use a regular expression to match this response, you must create three separate monitors, each with a different receive string, and ensure the correct monitor is applied to each server.
    [Show full text]
  • String Search & Pattern Matching
    String Search & Pattern Matching Wednesday, October 23, 2008 Reading: Stoughton 3.14, Kozen Chs. 7-8 CS235 Languages and Automata Department of Computer Science Wellesley College Some Applications of Regular Languages Today: o Efficient string searching o Pattern matching with regular expressions (example: Unix grep utility) Tomorrow: o Lexical analysis (a.k.a. scanning, tokenizing) in a compiler (example: ML-Lex). Pattern Matching 21-2 Naïve String Searching How to search for abbaba in abbabcabbabbaba? a b b a b c a b b a b b a b a a b b a b a a b b a b a a b b a b a a b b a b a a b b a b a a b b a b a a b b a b a a b b a b a a b b a b a a b b a b a Pattern Matching 21-3 More Efficient String Searching Knuth-Morris-Pratt algorithm: construct a DFA for searched-for string, and use it to do searching. b,c a a b a a b b a b a c c b,c c c How to construct this DFA automatically? a b b a b c a b b a b b a b a a b b a b a a b b a b a a b b a b a Pattern Matching 21-4 Pattern Matching with Regular Expressions Can turn any regular expression (possibly extended with complement, intersection, and difference) into a DFA and use it for string searching.
    [Show full text]
  • Strings, I/O, Formatting, and Parsing
    CertPrs8/Java 5 Cert. Study Guide/Sierra-Bates/225360-6/Chapter 6 Blind Folio CDXI 6 Strings, I/O, Formatting, and Parsing CERTIFICATION OBJECTIVES l Using String, StringBuilder, and l Using Regular Expressions StringBuffer 3 Two-Minute Drill l File I/O using the java.io package Q&A Self Test l Serialization using the java.io package l Working with Dates, Numbers, and Currencies chap6-1127f.indd 411 11/28/05 12:43:24 AM CertPrs8/Java 5 Cert. Study Guide/Sierra-Bates/225360-6/Chapter 6 412 Chapter 6: Strings, I/O, Formatting, and Parsing his chapter focuses on the various API-related topics that were added to the exam for Java 5. J2SE comes with an enormous API, and a lot of your work as a Java programmer Twill revolve around using this API. The exam team chose to focus on APIs for I/O, formatting, and parsing. Each of these topics could fill an entire book. Fortunately, you won't have to become a total I/O or regex guru to do well on the exam. The intention of the exam team was to include just the basic aspects of these technologies, and in this chapter we cover more than you'll need to get through the String, I/O, formatting, and parsing objectives on the exam. CERTIFICATION OBJECTIVE String, StringBuilder, and StringBuffer (Exam Objective 3.1) 3.1 Discuss the differences between the String, StringBuilder, and StringBuffer classes. Everything you needed to know about Strings in the SCJP 1.4 exam, you'll need to know for the SCJP 5 exam…plus, Sun added the StringBuilder class to the API, to provide faster, non-synchronized StringBuffer capability.
    [Show full text]
  • Introduction to Regular Expressions in SAS®
    Introduction to Regular Expressions in SAS® K. Matthew Windham From Introduction to Regular Expressions in SAS®. Full book available for purchase here. Contents About This Book ........................................................................................ vii About The Author ...................................................................................... xi Acknowledgments .................................................................................... xiii Chapter 1: Introduction .............................................................................. 1 1.1 Purpose of This Book .............................................................................................................. 1 1.2 Layout of This Book ................................................................................................................. 1 1.3 Defining Regular Expressions ................................................................................................. 2 1.4 Motivational Examples ............................................................................................................ 3 1.4.1 Extract, Transform, and Load (ETL) .............................................................................. 3 1.4.2 Data Manipulation .......................................................................................................... 4 1.4.3 Data Enrichment ............................................................................................................. 5 Chapter 2: Getting Started with Regular
    [Show full text]
  • Lecture 7 Regular Expressions and Grep 7.1
    LECTURE 7 REGULAR EXPRESSIONS AND GREP 7.1 Regular Expressions 7.1.1 Metacharacters, Wild cards and Regular Expressions Characters that have special meaning for utilities like grep, sed and awk are called metacharacters. These special characters are usually alpha-numeric in nature; a "e# e$- ample metacharacters are: caret &�'( dollar &+'( question mar- &.'( asterisk &/'( backslash &1'("orward slash &2'( ampersand &3'( set braces &4 an) 5'( range brac-ets &[...]). These special characters are interpreted contextually 0y the utilities. If you need to use the spe- cial characters as is without any interpretation, they need to be prefixed with the escape character (\). 8or example( a literal + can be inserted as 1+! a literal \can be inserted as \\. Although not as commonly used, numbers also can be turned into metacharacters 0y using escape character. 8or example( a number 9 is a literal number tw*( while 19 has a special meaning. Often times( the same metacharacters ha:e special meaning "or the shell as #ell. Thus #e need to be careful when passing metacharacters as arguments to utilities. It is a standard practice to embed the metacharacter arguments in single quotes to stop the shell from interpreting the metacharacters. $grep a*b file . asteris- gets interpreted 0y shell $grep ’a*b’ file . asterisk gets interpreted 0y 6rep utility Although single quotes are needed only "or arguments with metacharacters( as a 6**) practice( the pattern arguments *" the 6rep( sed and a#- utilities are always embedded in single quotes. $grep ’ab’ file $sed ’/a*b/’ file 7.1 Regular Expressions 47 Wild card Meaning given 0y shell / Zero or more characters .
    [Show full text]
  • Corrigendum 3 Corrigendum 3
    INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.680 TELECOMMUNICATION Corrigendum 3 STANDARDIZATION SECTOR OF ITU (02/2001) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects – Abstract Syntax Notation One (ASN.1) Corrigendum 3: CAUTION ! PREPUBLISHED RECOMMENDATION This prepublication is an unedited version of a recently approved Recommendation. It will be replaced by the published version after editing. Therefore, there will be differences between this prepublication and the published version. FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of tele communications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-T's purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression "Administration" is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process.
    [Show full text]
  • 3 What Is Decidable About String Constraints with the Replaceall
    What Is Decidable about String Constraints with the ReplaceAll Function TAOLUE CHEN, Birkbeck, University of London, United Kingdom YAN CHEN, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China and University of Chinese Academy of Sciences, China MATTHEW HAGUE, Royal Holloway, University of London, United Kingdom ANTHONY W. LIN, University of Oxford, United Kingdom ZHILIN WU, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China The theory of strings with concatenation has been widely argued as the basis of constraint solving for verifying 3 string-manipulating programs. However, this theory is far from adequate for expressing many string constraints that are also needed in practice; for example, the use of regular constraints (pattern matching against a regular expression), and the string-replace function (replacing either the first occurrence or all occurrences ofa “pattern” string constant/variable/regular expression by a “replacement” string constant/variable), among many others. Both regular constraints and the string-replace function are crucial for such applications as analysis of JavaScript (or more generally HTML5 applications) against cross-site scripting (XSS) vulnerabilities, which motivates us to consider a richer class of string constraints. The importance of the string-replace function (especially the replace-all facility) is increasingly recognised, which can be witnessed by the incorporation of the function in the input languages of several string constraint solvers. Recently, it was shown that any theory of strings containing the string-replace function (even the most restricted version where pattern/replacement strings are both constant strings) becomes undecidable if we do not impose some kind of straight-line (aka acyclicity) restriction on the formulas.
    [Show full text]
  • Google-Regular-Expressions-Cheat-Sheet.Pdf
    Regular expressions (RegEx) Drawn from: support.google.com/analytics About regular expressions (regex) Analytics supports regular expressions so you can create more flexible definitions for things like view filters, goals, segments, audiences, content groups, and channel groupings. In the context of Analytics, regular expressions are specific sequences of characters that broadly or narrowly match patterns in your Analytics data. For example, if you wanted to create a view filter to exclude site data generated by your own employees, you could use a regular expression to exclude any data from the entire range of IP addresses that serve your employees. Let’s say those IP addresses range from 198.51.100.1 - 198.51.100.25. Rather than enter 25 different IP addresses, you could create a regular expression like 198\.51\.100\.\d* that matches the entire range of addresses. Or if you wanted to create a view filter that included only campaign data from two different cities, you could create a regular expression like San Francisco|New York (San Francisco or New York). Regex metacharacters Wildcards . Matches any single character (letter, number or symbol) 1. matches 10, 1A 1.1 matches 111, 1A1 Examples ? Matches the preceding character 0 or 1 times 10? matches 1, 10 Examples + Matches the preceding character 1 or more times 10+ matches 10, 100 Examples * Matches the preceding character 0 or more times 1* matches 1, 10 Examples | Creates an OR match 1|10 matches 1, 10 Do not use at the end of an expression Examples Page 1 of 8 Regular expressions
    [Show full text]