16_a_wsj_1640
Moreover, he said, technology now exists for stealing corporate secrets after they've been “erased” from a computer's memory.
arc(r_0016_0006__technology, r_0016_0013__after, r_0016_0009__for).
arc(r_0016_0008__exists, r_0016_0001__Moreover, nim2).
arc(r_0016_0008__exists, r_0016_0006__technology, arg0).
arc(r_0016_0008__exists, r_0016_0007__now, nim21).
arc(r_0016_0010__stealing, r_0016_0012__secrets, arg1).
arc(r_0016_0010__stealing, z_000_16_a_wsj_1640_29, arg0).
arc(r_0016_0012__secrets, r_0016_0011__corporate, attrib33).
arc(r_0016_0013__after, r_0016_0010__stealing, scope).
arc(r_0016_0013__after, r_0016_0015___apos_ve, restriction).
arc(r_0016_0015___apos_ve, r_0016_0016__been, scope).
arc(r_0016_0016__been, r_0016_0018__erased, scope).
arc(r_0016_0018__erased, r_0016_0012__secrets, arg1).
arc(r_0016_0018__erased, r_0016_0024__memory, r_0016_0020__from_nim62).
arc(r_0016_0018__erased, z_000_16_a_wsj_1640_53, arg0).
arc(r_0016_0024__memory, r_0016_0021__a_r_0016_0022__computer_r_0016_0023___apos_s, gen).
fof(formula,axiom,
? [R_16_8_EXISTS,R_16_6_TECHNOLOGY,R_16_13_AFTER,R_16_15__APOS_VE_BEEN_ERASED,Z_16_A_WSJ_1640_53,R_16_24_MEMORY,R_16_21_A_COMPUTER_APOS_S,R_16_10_STEALING,Z_16_A_WSJ_1640_29,R_16_12_SECRETS,R_16_11_CORPORATE,R_16_1_MOREOVER,R_16_7_NOW] :
( a_computer_apos_s(R_16_21_A_COMPUTER_APOS_S)
& corporate(R_16_11_CORPORATE)
& moreover(R_16_1_MOREOVER)
& now(R_16_7_NOW)
& exists(R_16_8_EXISTS,R_16_6_TECHNOLOGY)
& technology(R_16_6_TECHNOLOGY)
& for(R_16_6_TECHNOLOGY,R_16_13_AFTER)
& after(R_16_13_AFTER)
& conj1(R_16_13_AFTER,R_16_15__APOS_VE_BEEN_ERASED)
& _apos_ve_been_erased(R_16_15__APOS_VE_BEEN_ERASED,Z_16_A_WSJ_1640_53,R_16_12_SECRETS)
& secrets(R_16_12_SECRETS)
& attrib33(R_16_12_SECRETS,R_16_11_CORPORATE)
& from_nim62(R_16_15__APOS_VE_BEEN_ERASED,R_16_24_MEMORY)
& memory(R_16_24_MEMORY)
& gen(R_16_24_MEMORY,R_16_21_A_COMPUTER_APOS_S)
& conj2(R_16_13_AFTER,R_16_10_STEALING)
& stealing(R_16_10_STEALING,Z_16_A_WSJ_1640_29,R_16_12_SECRETS)
& nim2(R_16_8_EXISTS,R_16_1_MOREOVER)
& nim21(R_16_8_EXISTS,R_16_7_NOW) ) ).
( (IP-MAT (ADVP-NIM (ADV Moreover;{moreover}))
(PUNC ,)
(PRN (IP-MAT (NP-SBJ;{EXPERT} (PRO he;{he}))
(VBD;_Tr_ said;{say})))
(PUNC ,)
(NP-SBJ (N technology;{technology})
(PP *ICH*-126))
(ADVP-NIM (ADV now;{now}))
(VBP;_I_ exists;{exist})
(PP-EPD-126 (P-ROLE for;{for})
(IP-PPL (VAG;_Tn_ stealing;{steal})
(NP-OB1;{SECRETS} (ADJP (ADJ corporate;{corporate}))
(NS secrets;{secret}))
(PP-SCON (P-CONN after;{after})
(IP-ADV (NP-SBJ;{SECRETS} (PRO they;{they}))
(HVP;_cat_Ve_ <apos>ve;{have})
(IP-PPL-CAT (BEN;_cat_VePASS_ been;{be})
(PULQ <ldquo>)
(IP-PPL-CAT (NP-LGS *)
(VVN;_Tn.pr_ erased;{erase[from]})
(PURQ <rdquo>)
(PP-NIM (P-ROLE from;{from})
(NP (NP-GEN (D a;{a})
(N computer;{computer})
(GENM <apos>s))
(N memory;{memory})))))))))
(PUNC .))
(ID 16_a_wsj_1640))