16_a_wsj_1640
Moreover, he said, technology now exists for stealing corporate secrets after they've been “erased” from a computer's memory.
arc(r_0016_0006__technology, r_0016_0013__after, r_0016_0009__for).
arc(r_0016_0008__exists, r_0016_0001__Moreover, nim2).
arc(r_0016_0008__exists, r_0016_0006__technology, arg0).
arc(r_0016_0008__exists, r_0016_0007__now, nim21).
arc(r_0016_0010__stealing, r_0016_0012__secrets, arg1).
arc(r_0016_0010__stealing, z_000_16_a_wsj_1640_29, arg0).
arc(r_0016_0012__secrets, r_0016_0011__corporate, attrib33).
arc(r_0016_0013__after, r_0016_0010__stealing, scope).
arc(r_0016_0013__after, r_0016_0015___apos_ve, restriction).
arc(r_0016_0015___apos_ve, r_0016_0016__been, scope).
arc(r_0016_0016__been, r_0016_0018__erased, scope).
arc(r_0016_0018__erased, r_0016_0012__secrets, arg1).
arc(r_0016_0018__erased, r_0016_0024__memory, r_0016_0020__from_nim62).
arc(r_0016_0018__erased, z_000_16_a_wsj_1640_53, arg0).
arc(r_0016_0024__memory, r_0016_0021__a_r_0016_0022__computer_r_0016_0023___apos_s, gen).
fof(formula,axiom,
? [R_0016_0001__MOREOVER,R_0016_0011__CORPORATE,R_0016_0012__SECRETS,Z_000_16_A_WSJ_1640_29,R_0016_0010__STEALING,R_0016_0021__A_R_0016_0022__COMPUTER_R_0016_0023___APOS_S,R_0016_0024__MEMORY,Z_000_16_A_WSJ_1640_53,R_0016_0015___APOS_VE_R_0016_0016__BEEN_R_0016_0018__ERASED,R_0016_0013__AFTER,R_0016_0006__TECHNOLOGY,R_0016_0007__NOW,R_0016_0008__EXISTS] :
( r_0016_0001__Moreover(R_0016_0001__MOREOVER)
& r_0016_0007__now(R_0016_0007__NOW)
& r_0016_0011__corporate(R_0016_0011__CORPORATE)
& r_0016_0021__a_r_0016_0022__computer_r_0016_0023___apos_s(R_0016_0021__A_R_0016_0022__COMPUTER_R_0016_0023___APOS_S)
& z_000_16_a_wsj_1640_29(Z_000_16_A_WSJ_1640_29)
& z_000_16_a_wsj_1640_53(Z_000_16_A_WSJ_1640_53)
& r_0016_0008__exists(R_0016_0008__EXISTS)
& has_nim21(R_0016_0008__EXISTS,R_0016_0007__NOW)
& has_arg0(R_0016_0008__EXISTS,R_0016_0006__TECHNOLOGY)
& r_0016_0006__technology(R_0016_0006__TECHNOLOGY)
& has_r_0016_0009__for(R_0016_0006__TECHNOLOGY,R_0016_0013__AFTER)
& r_0016_0013__after(R_0016_0013__AFTER)
& has_conj1(R_0016_0013__AFTER,R_0016_0015___APOS_VE_R_0016_0016__BEEN_R_0016_0018__ERASED)
& r_0016_0015___apos_ve_r_0016_0016__been_r_0016_0018__erased(R_0016_0015___APOS_VE_R_0016_0016__BEEN_R_0016_0018__ERASED)
& has_arg0(R_0016_0015___APOS_VE_R_0016_0016__BEEN_R_0016_0018__ERASED,Z_000_16_A_WSJ_1640_53)
& has_r_0016_0020__from_nim62(R_0016_0015___APOS_VE_R_0016_0016__BEEN_R_0016_0018__ERASED,R_0016_0024__MEMORY)
& r_0016_0024__memory(R_0016_0024__MEMORY)
& has_gen(R_0016_0024__MEMORY,R_0016_0021__A_R_0016_0022__COMPUTER_R_0016_0023___APOS_S)
& has_arg1(R_0016_0015___APOS_VE_R_0016_0016__BEEN_R_0016_0018__ERASED,R_0016_0012__SECRETS)
& r_0016_0012__secrets(R_0016_0012__SECRETS)
& has_attrib33(R_0016_0012__SECRETS,R_0016_0011__CORPORATE)
& has_conj2(R_0016_0013__AFTER,R_0016_0010__STEALING)
& r_0016_0010__stealing(R_0016_0010__STEALING)
& has_arg0(R_0016_0010__STEALING,Z_000_16_A_WSJ_1640_29)
& has_arg1(R_0016_0010__STEALING,R_0016_0012__SECRETS)
& has_nim2(R_0016_0008__EXISTS,R_0016_0001__MOREOVER) ) ).
( (IP-MAT (ADVP-NIM (ADV Moreover;{moreover}))
(PUNC ,)
(PRN (IP-MAT (NP-SBJ;{EXPERT} (PRO he;{he}))
(VBD;_Tr_ said;{say})))
(PUNC ,)
(NP-SBJ (N technology;{technology})
(PP *ICH*-126))
(ADVP-NIM (ADV now;{now}))
(VBP;_I_ exists;{exist})
(PP-EPD-126 (P-ROLE for;{for})
(IP-PPL (VAG;_Tn_ stealing;{steal})
(NP-OB1;{SECRETS} (ADJP (ADJ corporate;{corporate}))
(NS secrets;{secret}))
(PP-SCON (P-CONN after;{after})
(IP-ADV (NP-SBJ;{SECRETS} (PRO they;{they}))
(HVP;_cat_Ve_ <apos>ve;{have})
(IP-PPL-CAT (BEN;_cat_VePASS_ been;{be})
(PULQ <ldquo>)
(IP-PPL-CAT (NP-LGS *)
(VVN;_Tn.pr_ erased;{erase[from]})
(PURQ <rdquo>)
(PP-NIM (P-ROLE from;{from})
(NP (NP-GEN (D a;{a})
(N computer;{computer})
(GENM <apos>s))
(N memory;{memory})))))))))
(PUNC .))
(ID 16_a_wsj_1640))