<%@ taglib uri="webwork" prefix="webwork" %> <%@ taglib uri="webwork" prefix="ui" %> <%@ taglib uri="sitemesh-page" prefix="page" %> <webwork:if test="/showProjects == 'true'"> <webwork:text name="'popups.filterprojectpicker.title'"/> </webwork:if> <webwork:else> <webwork:text name="'popups.filterpicker.title'"/> </webwork:else>

<%-- Warning XSS Magic This invisible tag exists in the page to hold possibly javascript-hostile values for fields which have originally come from the url. If an evil hacker passed some concat-escaping script fragment as the field parameter and submitFilter() used this value to concat to produce the id of the field in the opener window, they would be able to execute arbitrary javascript in the client. --%>

"/> "/> "/> <%-- component includes its own row --%> <%--Already has a TD--%> <%-- component includes its own row --%>
: #finding_filters
"/>
false
<%--//--%> <%--// POPULAR RESULTS SECTION HERE--%> <%--//--%> false <%--// --%> <%--// FAVOURITE RESULTS SECTION HERE--%> <%--//--%> false true false <%--// --%> <%--// PROJECTS SECTION HERE--%> <%--//--%>
: