OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

 


 

   Re: [xml-dev] Are people really using Identity constraints specified

[ Lists Home | Date Index | Thread Index ]

Are you sure that these schemas are from real world i.e. these are
actually used in the application. Those should not be the sample schemas
which are generally designed for explaining the concept.

Can you provide more details?

Thanks and Regards,
Priti Patil.


On Fri, 2004-08-13 at 17:42, Henry S. Thompson wrote:
> I have a collection of slightly over 1000 distinct schema documents
> culled from the web, which I'll be describing and releasing soon.  I
> just checked, and conservatively the numbers are as follows:
> 
>   schema documents using key, keyref and/or unique:  53
>   uses of unique:                                   105
>   uses of key:                                      179
>   uses of keyref:                                   229
> 
> ht
> -- 
>  Henry S. Thompson, HCRC Language Technology Group, University of Edinburgh
>                      Half-time member of W3C Team
>     2 Buccleuch Place, Edinburgh EH8 9LW, SCOTLAND -- (44) 131 650-4440
>             Fax: (44) 131 650-4587, e-mail: ht@inf.ed.ac.uk
>                    URL: http://www.ltg.ed.ac.uk/~ht/
> [mail really from me _always_ has this .sig -- mail without it is forged spam]
> 
> -----------------------------------------------------------------
> The xml-dev list is sponsored by XML.org <http://www.xml.org>, an
> initiative of OASIS <http://www.oasis-open.org>
> 
> The list archives are at http://lists.xml.org/archives/xml-dev/
> 
> To subscribe or unsubscribe from this list use the subscription
> manager: <http://www.oasis-open.org/mlmanage/index.php>
> 
> 





 

News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS