Update test results
[pazpar2-moved-to-github.git] / test / test_limit_limitmap_24.res
1 <?xml version="1.0" encoding="UTF-8"?>
2 <show><status>OK</status>
3 <activeclients>2</activeclients>
4 <merged>60</merged>
5 <total>2015</total>
6 <start>0</start>
7 <num>20</num>
8 <hit>
9
10 <md-title>Adobe Illustrator for the Mac</md-title>
11 <md-title-remainder>fast &amp; easy</md-title-remainder>
12 <md-date>2001</md-date>
13 <md-author>Woodward, C. Michael</md-author><location id="Target-2" name="LOC-SOLR">
14 <md-title>Adobe Illustrator for the Mac</md-title>
15 <md-title-remainder>fast &amp; easy</md-title-remainder>
16 <md-date>2001</md-date>
17 <md-author>Woodward, C. Michael</md-author></location>
18 <relevance>30776</relevance>
19 <recid>content: title adobe illustrator for the mac author woodward c michael</recid>
20 </hit>
21 <hit>
22
23 <md-title>Advanced computer performance modeling and simulation</md-title>
24 <md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
25 <md-title>Advanced computer performance modeling and simulation</md-title>
26 <md-date>1998</md-date></location>
27 <relevance>30776</relevance>
28 <recid>content: title advanced computer performance modeling and simulation</recid>
29 </hit>
30 <hit>
31
32 <md-title>Cyberterrorism and computer crimes</md-title>
33 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
34 <md-date>2000</md-date>
35 <md-author>Aldrich, Richard W</md-author>
36 <md-description>&quot;April 2000.&quot;</md-description><location id="Target-2" name="LOC-SOLR">
37 <md-title>Cyberterrorism and computer crimes</md-title>
38 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
39 <md-date>2000</md-date>
40 <md-author>Aldrich, Richard W</md-author>
41 <md-description>&quot;April 2000.&quot;</md-description></location>
42 <relevance>30776</relevance>
43 <recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
44 </hit>
45 <hit>
46
47 <md-title>Software design and usability</md-title>
48 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
49 <md-date>2000</md-date>
50 <md-author>Kaasgaard, Klaus</md-author><location id="Target-2" name="LOC-SOLR">
51 <md-title>Software design and usability</md-title>
52 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
53 <md-date>2000</md-date>
54 <md-author>Kaasgaard, Klaus</md-author></location>
55 <relevance>28211</relevance>
56 <recid>content: title software design and usability author kaasgaard klaus</recid>
57 </hit>
58 <hit>
59
60 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
61 <md-date>2000</md-date>
62 <md-author>Knittel, John</md-author>
63 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="Target-2" name="LOC-SOLR">
64 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
65 <md-date>2000</md-date>
66 <md-author>Knittel, John</md-author>
67 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description></location>
68 <relevance>26979</relevance>
69 <recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
70 </hit>
71 <hit>
72
73 <md-title>Kids&apos; computer book</md-title>
74 <md-date>1994</md-date>
75 <md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description><location id="Target-2" name="LOC-SOLR">
76 <md-title>Kids&apos; computer book</md-title>
77 <md-date>1994</md-date>
78 <md-description>&quot;For kids and their parents&quot;--Cover</md-description>
79 <md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description></location>
80 <relevance>23651</relevance>
81 <recid>content: title kids computer book</recid>
82 </hit>
83 <hit>
84
85 <md-title>Computer friendly</md-title>
86 <md-date>1999</md-date>
87 <md-author>Steinbacher, Raymond</md-author><location id="Target-2" name="LOC-SOLR">
88 <md-title>Computer friendly</md-title>
89 <md-date>1999</md-date>
90 <md-author>Steinbacher, Raymond</md-author></location>
91 <relevance>23082</relevance>
92 <recid>content: title computer friendly author steinbacher raymond</recid>
93 </hit>
94 <hit>
95
96 <md-title>Computer misuse</md-title>
97 <md-date>1999</md-date>
98 <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
99 <md-title>Computer misuse</md-title>
100 <md-date>1999</md-date>
101 <md-description>&quot;May 1999.&quot;</md-description>
102 <md-description>&quot;NZLC R54&quot;--T.p. verso</md-description>
103 <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description></location>
104 <relevance>23082</relevance>
105 <recid>content: title computer misuse</recid>
106 </hit>
107 <hit>
108
109 <md-title>Quicken 2000 for the Mac</md-title>
110 <md-title-remainder>the official guide</md-title-remainder>
111 <md-date>2000</md-date>
112 <md-author>Langer, Maria</md-author>
113 <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description><location id="Target-2" name="LOC-SOLR">
114 <md-title>Quicken 2000 for the Mac</md-title>
115 <md-title-remainder>the official guide</md-title-remainder>
116 <md-date>2000</md-date>
117 <md-author>Langer, Maria</md-author>
118 <md-description>Includes index</md-description>
119 <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description></location>
120 <relevance>23082</relevance>
121 <recid>content: title quicken for the mac author langer maria</recid>
122 </hit>
123 <hit>
124
125 <md-title>Unix Secure Shell</md-title>
126 <md-date>1999</md-date>
127 <md-author>Carasik, Anne H</md-author>
128 <md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
129 <md-title>Unix Secure Shell</md-title>
130 <md-date>1999</md-date>
131 <md-author>Carasik, Anne H</md-author>
132 <md-description>Includes index</md-description></location>
133 <relevance>23082</relevance>
134 <recid>content: title unix secure shell author carasik anne h</recid>
135 </hit>
136 <hit>
137
138 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
139 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
140 <md-date>1999</md-date>
141 <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
142 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
143 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
144 <md-date>1999</md-date>
145 <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description></location>
146 <relevance>21799</relevance>
147 <recid>content: title eight international conference on computer communications and networks</recid>
148 </hit>
149 <hit>
150
151 <md-title>Complete CL</md-title>
152 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
153 <md-date>1999</md-date>
154 <md-author>Malaga, Ernie</md-author>
155 <md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
156 <md-title>Complete CL</md-title>
157 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
158 <md-date>1999</md-date>
159 <md-author>Malaga, Ernie</md-author>
160 <md-description>Includes index</md-description></location>
161 <relevance>20517</relevance>
162 <recid>content: title complete cl author malaga ernie</recid>
163 </hit>
164 <hit>
165
166 <md-title>3D games</md-title>
167 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
168 <md-date>2001</md-date>
169 <md-author>Watt, Alan H</md-author><location id="Target-2" name="LOC-SOLR">
170 <md-title>3D games</md-title>
171 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
172 <md-date>2001</md-date>
173 <md-author>Watt, Alan H</md-author></location>
174 <relevance>20517</relevance>
175 <recid>content: title d games author watt alan h</recid>
176 </hit>
177 <hit>
178
179 <md-title>Mastering algorithms with C</md-title>
180 <md-date>1999</md-date>
181 <md-author>Loudon, Kyle</md-author>
182 <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description><location id="Target-2" name="LOC-SOLR">
183 <md-title>Mastering algorithms with C</md-title>
184 <md-date>1999</md-date>
185 <md-author>Loudon, Kyle</md-author>
186 <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description>
187 <md-description>Includes index</md-description></location>
188 <relevance>20517</relevance>
189 <recid>content: title mastering algorithms with c author loudon kyle</recid>
190 </hit>
191 <hit>
192
193 <md-title>Programming Web graphics with PERL and GNU software</md-title>
194 <md-date>1999</md-date>
195 <md-author>Wallace, Shawn P</md-author><location id="Target-2" name="LOC-SOLR">
196 <md-title>Programming Web graphics with PERL and GNU software</md-title>
197 <md-date>1999</md-date>
198 <md-author>Wallace, Shawn P</md-author></location>
199 <relevance>20517</relevance>
200 <recid>content: title programming web graphics with perl and gnu software author wallace shawn p</recid>
201 </hit>
202 <hit>
203
204 <md-title>4th ACM Conference on Computer and Communications Security, April 1-4, 1997, Zurich, Switzerland</md-title>
205 <md-date>1997</md-date><location id="Target-2" name="LOC-SOLR">
206 <md-title>4th ACM Conference on Computer and Communications Security, April 1-4, 1997, Zurich, Switzerland</md-title>
207 <md-date>1997</md-date></location>
208 <relevance>18185</relevance>
209 <recid>content: title th acm conference on computer and communications security april zurich switzerland</recid>
210 </hit>
211 <hit>
212
213 <md-title>3D computer graphics</md-title>
214 <md-date>2000</md-date>
215 <md-author>Watt, Alan H</md-author><location id="Target-2" name="LOC-SOLR">
216 <md-title>3D computer graphics</md-title>
217 <md-date>2000</md-date>
218 <md-author>Watt, Alan H</md-author></location>
219 <relevance>17952</relevance>
220 <recid>content: title d computer graphics author watt alan h</recid>
221 </hit>
222 <hit>
223
224 <md-title>Insanely great</md-title>
225 <md-title-remainder>the life and times of Macintosh, the computer that changed everything</md-title-remainder>
226 <md-date>2000</md-date>
227 <md-author>Levy, Steven</md-author><location id="Target-2" name="LOC-SOLR">
228 <md-title>Insanely great</md-title>
229 <md-title-remainder>the life and times of Macintosh, the computer that changed everything</md-title-remainder>
230 <md-date>2000</md-date>
231 <md-author>Levy, Steven</md-author></location>
232 <relevance>17719</relevance>
233 <recid>content: title insanely great author levy steven</recid>
234 </hit>
235 <hit>
236
237 <md-title>Careers in computer animation</md-title>
238 <md-date>2001</md-date>
239 <md-author>Shires, Jeremy</md-author><location id="Target-2" name="LOC-SOLR">
240 <md-title>Careers in computer animation</md-title>
241 <md-date>2001</md-date>
242 <md-author>Shires, Jeremy</md-author></location>
243 <relevance>15388</relevance>
244 <recid>content: title careers in computer animation author shires jeremy</recid>
245 </hit>
246 <hit>
247
248 <md-title>Hackers beware</md-title>
249 <md-date>2002</md-date>
250 <md-author>Cole, Eric</md-author><location id="Target-2" name="LOC-SOLR">
251 <md-title>Hackers beware</md-title>
252 <md-date>2002</md-date>
253 <md-author>Cole, Eric</md-author></location>
254 <relevance>15388</relevance>
255 <recid>content: title hackers beware author cole eric</recid>
256 </hit>
257 </show>