New relevance returned by Solr
[pazpar2-moved-to-github.git] / test / test_limit_limitmap_24.res
1 <?xml version="1.0" encoding="UTF-8"?>
2 <show><status>OK</status>
3 <activeclients>2</activeclients>
4 <merged>40</merged>
5 <total>2015</total>
6 <start>0</start>
7 <num>20</num>
8 <hit>
9
10 <md-title>Adobe Illustrator for the Mac</md-title>
11 <md-title-remainder>fast &amp; easy</md-title-remainder>
12 <md-date>2001</md-date>
13 <md-author>Woodward, C. Michael</md-author><location id="Target-2" name="LOC-SOLR">
14 <md-title>Adobe Illustrator for the Mac</md-title>
15 <md-title-remainder>fast &amp; easy</md-title-remainder>
16 <md-date>2001</md-date>
17 <md-author>Woodward, C. Michael</md-author></location>
18 <relevance>30776</relevance>
19 <recid>content: title adobe illustrator for the mac author woodward c michael</recid>
20 </hit>
21 <hit>
22
23 <md-title>Advanced computer performance modeling and simulation</md-title>
24 <md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
25 <md-title>Advanced computer performance modeling and simulation</md-title>
26 <md-date>1998</md-date></location>
27 <relevance>30776</relevance>
28 <recid>content: title advanced computer performance modeling and simulation</recid>
29 </hit>
30 <hit>
31
32 <md-title>Cyberterrorism and computer crimes</md-title>
33 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
34 <md-date>2000</md-date>
35 <md-author>Aldrich, Richard W</md-author>
36 <md-description>&quot;April 2000.&quot;</md-description><location id="Target-2" name="LOC-SOLR">
37 <md-title>Cyberterrorism and computer crimes</md-title>
38 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
39 <md-date>2000</md-date>
40 <md-author>Aldrich, Richard W</md-author>
41 <md-description>&quot;April 2000.&quot;</md-description></location>
42 <relevance>30776</relevance>
43 <recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
44 </hit>
45 <hit>
46
47 <md-title>Software design and usability</md-title>
48 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
49 <md-date>2000</md-date>
50 <md-author>Kaasgaard, Klaus</md-author><location id="Target-2" name="LOC-SOLR">
51 <md-title>Software design and usability</md-title>
52 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
53 <md-date>2000</md-date>
54 <md-author>Kaasgaard, Klaus</md-author></location>
55 <relevance>28211</relevance>
56 <recid>content: title software design and usability author kaasgaard klaus</recid>
57 </hit>
58 <hit>
59
60 <md-title>Computer friendly</md-title>
61 <md-date>1999</md-date>
62 <md-author>Steinbacher, Raymond</md-author><location id="Target-2" name="LOC-SOLR">
63 <md-title>Computer friendly</md-title>
64 <md-date>1999</md-date>
65 <md-author>Steinbacher, Raymond</md-author></location>
66 <relevance>23082</relevance>
67 <recid>content: title computer friendly author steinbacher raymond</recid>
68 </hit>
69 <hit>
70
71 <md-title>Computer misuse</md-title>
72 <md-date>1999</md-date>
73 <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
74 <md-title>Computer misuse</md-title>
75 <md-date>1999</md-date>
76 <md-description>&quot;May 1999.&quot;</md-description>
77 <md-description>&quot;NZLC R54&quot;--T.p. verso</md-description>
78 <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description></location>
79 <relevance>23082</relevance>
80 <recid>content: title computer misuse</recid>
81 </hit>
82 <hit>
83
84 <md-title>Unix Secure Shell</md-title>
85 <md-date>1999</md-date>
86 <md-author>Carasik, Anne H</md-author>
87 <md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
88 <md-title>Unix Secure Shell</md-title>
89 <md-date>1999</md-date>
90 <md-author>Carasik, Anne H</md-author>
91 <md-description>Includes index</md-description></location>
92 <relevance>23082</relevance>
93 <recid>content: title unix secure shell author carasik anne h</recid>
94 </hit>
95 <hit>
96
97 <md-title>3D games</md-title>
98 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
99 <md-date>2001</md-date>
100 <md-author>Watt, Alan H</md-author><location id="Target-2" name="LOC-SOLR">
101 <md-title>3D games</md-title>
102 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
103 <md-date>2001</md-date>
104 <md-author>Watt, Alan H</md-author></location>
105 <relevance>20517</relevance>
106 <recid>content: title d games author watt alan h</recid>
107 </hit>
108 <hit>
109
110 <md-title>Java applications strategies for the AS/400</md-title>
111 <md-date>1999</md-date>
112 <md-author>Denoncourt, Don</md-author><location id="Target-2" name="LOC-SOLR">
113 <md-title>Java applications strategies for the AS/400</md-title>
114 <md-date>1999</md-date>
115 <md-author>Denoncourt, Don</md-author></location>
116 <relevance>20517</relevance>
117 <recid>content: title java applications strategies for the as author denoncourt don</recid>
118 </hit>
119 <hit>
120
121 <md-title>Mastering algorithms with C</md-title>
122 <md-date>1999</md-date>
123 <md-author>Loudon, Kyle</md-author>
124 <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description><location id="Target-2" name="LOC-SOLR">
125 <md-title>Mastering algorithms with C</md-title>
126 <md-date>1999</md-date>
127 <md-author>Loudon, Kyle</md-author>
128 <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description>
129 <md-description>Includes index</md-description></location>
130 <relevance>20517</relevance>
131 <recid>content: title mastering algorithms with c author loudon kyle</recid>
132 </hit>
133 <hit>
134
135 <md-title>Programming Web graphics with PERL and GNU software</md-title>
136 <md-date>1999</md-date>
137 <md-author>Wallace, Shawn P</md-author><location id="Target-2" name="LOC-SOLR">
138 <md-title>Programming Web graphics with PERL and GNU software</md-title>
139 <md-date>1999</md-date>
140 <md-author>Wallace, Shawn P</md-author></location>
141 <relevance>20517</relevance>
142 <recid>content: title programming web graphics with perl and gnu software author wallace shawn p</recid>
143 </hit>
144 <hit>
145
146 <md-title>4th ACM Conference on Computer and Communications Security, April 1-4, 1997, Zurich, Switzerland</md-title>
147 <md-date>1997</md-date><location id="Target-2" name="LOC-SOLR">
148 <md-title>4th ACM Conference on Computer and Communications Security, April 1-4, 1997, Zurich, Switzerland</md-title>
149 <md-date>1997</md-date></location>
150 <relevance>18185</relevance>
151 <recid>content: title th acm conference on computer and communications security april zurich switzerland</recid>
152 </hit>
153 <hit>
154
155 <md-title>Insanely great</md-title>
156 <md-title-remainder>the life and times of Macintosh, the computer that changed everything</md-title-remainder>
157 <md-date>2000</md-date>
158 <md-author>Levy, Steven</md-author><location id="Target-2" name="LOC-SOLR">
159 <md-title>Insanely great</md-title>
160 <md-title-remainder>the life and times of Macintosh, the computer that changed everything</md-title-remainder>
161 <md-date>2000</md-date>
162 <md-author>Levy, Steven</md-author></location>
163 <relevance>17719</relevance>
164 <recid>content: title insanely great author levy steven</recid>
165 </hit>
166 <hit>
167
168 <md-title>Careers in computer animation</md-title>
169 <md-date>2001</md-date>
170 <md-author>Shires, Jeremy</md-author><location id="Target-2" name="LOC-SOLR">
171 <md-title>Careers in computer animation</md-title>
172 <md-date>2001</md-date>
173 <md-author>Shires, Jeremy</md-author></location>
174 <relevance>15388</relevance>
175 <recid>content: title careers in computer animation author shires jeremy</recid>
176 </hit>
177 <hit>
178
179 <md-title>Hackers beware</md-title>
180 <md-date>2002</md-date>
181 <md-author>Cole, Eric</md-author><location id="Target-2" name="LOC-SOLR">
182 <md-title>Hackers beware</md-title>
183 <md-date>2002</md-date>
184 <md-author>Cole, Eric</md-author></location>
185 <relevance>15388</relevance>
186 <recid>content: title hackers beware author cole eric</recid>
187 </hit>
188 <hit>
189
190 <md-title>How computer programming works</md-title>
191 <md-date>2000</md-date>
192 <md-author>Appleman, Daniel</md-author><location id="Target-2" name="LOC-SOLR">
193 <md-title>How computer programming works</md-title>
194 <md-date>2000</md-date>
195 <md-author>Appleman, Daniel</md-author></location>
196 <relevance>15388</relevance>
197 <recid>content: title how computer programming works author appleman daniel</recid>
198 </hit>
199 <hit>
200
201 <md-title>Icon design</md-title>
202 <md-date>2001</md-date>
203 <md-author>Caplin, Steve</md-author>
204 <md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
205 <md-title>Icon design</md-title>
206 <md-date>2001</md-date>
207 <md-author>Caplin, Steve</md-author>
208 <md-description>Includes index</md-description></location>
209 <relevance>15388</relevance>
210 <recid>content: title icon design author caplin steve</recid>
211 </hit>
212 <hit>
213
214 <md-title>Information security architecture</md-title>
215 <md-date>2000</md-date>
216 <md-author>Tudor, Jan Killmeyer</md-author><location id="Target-2" name="LOC-SOLR">
217 <md-title>Information security architecture</md-title>
218 <md-date>2000</md-date>
219 <md-author>Tudor, Jan Killmeyer</md-author></location>
220 <relevance>15388</relevance>
221 <recid>content: title information security architecture author tudor jan killmeyer</recid>
222 </hit>
223 <hit>
224
225 <md-title>Windows 2000</md-title>
226 <md-title-remainder>design &amp; migration</md-title-remainder>
227 <md-date>2000</md-date>
228 <md-author>Morimoto, Rand</md-author>
229 <md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
230 <md-title>Windows 2000</md-title>
231 <md-title-remainder>design &amp; migration</md-title-remainder>
232 <md-date>2000</md-date>
233 <md-author>Morimoto, Rand</md-author>
234 <md-description>Includes index</md-description></location>
235 <relevance>15388</relevance>
236 <recid>content: title windows author morimoto rand</recid>
237 </hit>
238 <hit>
239
240 <md-title>The essence of computer graphics</md-title>
241 <md-date>2000</md-date>
242 <md-author>Cooley, Peter</md-author><location id="Target-2" name="LOC-SOLR">
243 <md-title>The essence of computer graphics</md-title>
244 <md-date>2000</md-date>
245 <md-author>Cooley, Peter</md-author></location>
246 <relevance>13849</relevance>
247 <recid>content: title the essence of computer graphics author cooley peter</recid>
248 </hit>
249 </show>