Lists Home |
Date Index |
- To: "Henri Sivonen" <firstname.lastname@example.org>, <email@example.com>
- Subject: RE: [xml-dev] Question on XSD validator
- From: "Saha Rabindra N" <firstname.lastname@example.org>
- Date: Wed, 18 May 2005 21:57:14 -0400
- Importance: normal
- Priority: normal
- Thread-index: AcVb8ALMHkiS4ny6R2adW28ZtaUBNAAJVa8g
- Thread-topic: [xml-dev] Question on XSD validator
There is one more question I have on the same topic.
Is there any software OR tool OR library [set of APIs] available in Unix by means of which I can create an XML document from a given XSD document. The data for the XML document will come from a datafile.
So I just want to know whether there exist any such library [like Xerces/libxml2]which can be used to write a program that will take an XSD document as input and will create corresponding XML file. [the reverse engineering].
If that is possible then the generated XML document will always conform to the given XSD document and so no question of failure in XSD validation at client site.
Please correct me.
Thanks in advance for your input.
From: Henri Sivonen [mailto:email@example.com]
Sent: Wednesday, May 18, 2005 5:13 PM
To: <firstname.lastname@example.org> <email@example.com>
Subject: Re: [xml-dev] Question on XSD validator
On May 18, 2005, at 20:19, Michael Kay wrote:
> By contrast, XML Spy uses its own schema processor, which is not
> always 100% conformant with the spec.
Has anyone systematically surveyed the conformance of various XSD
validator implementations? Is there a comparison table somewhere on the
I have often seen--as in this thread--various qualifications suggesting
that a particular implementation is not 100% conformant or is partial,
etc. Xerces claims fullness but I've been told it doesn't implement the
The xml-dev list is sponsored by XML.org <http://www.xml.org>, an
initiative of OASIS <http://www.oasis-open.org>
The list archives are at http://lists.xml.org/archives/xml-dev/
To subscribe or unsubscribe from this list use the subscription
The information contained in this e-mail may be confidential and is intended solely for the use of the named addressee.
Access, copying or re-use of the e-mail or any information contained therein by any other person is not authorized.
If you are not the intended recipient please notify us immediately by returning the e-mail to the originator.(17b)