Match new urls.
[pazpar2-moved-to-github.git] / test / test_facets_13.res
index a549e49..06e9e2f 100644 (file)
@@ -3,60 +3,43 @@
 <status>OK</status>
 <activeclients>0</activeclients>
 <merged>7</merged>
-<total>16</total>
+<total>8</total>
 <start>0</start>
 <num>7</num>
 <hit>
 
 <md-title>How to program a computer</md-title>
-<md-author>Jack Collins</md-author><location id="localhost:9999/db2" name="db2">
-<md-title>How to program a computer</md-title>
-<md-author>Jack Collins</md-author></location>
-<location id="localhost:9999/db2" name="db2">
-<md-title>How to program a computer</md-title>
-<md-author>Jack Collins</md-author></location>
-<location id="localhost:9999/db1" name="db1">
+<md-author>Jack Collins</md-author><location id="localhost:9999/db1" name="db1">
 <md-title>How to program a computer</md-title>
 <md-author>Jack Collins</md-author></location>
 <location id="localhost:9999/db1" name="db1">
 <md-title>How to program a computer</md-title>
 <md-author>Jack Collins</md-author></location>
-<count>4</count>
-<relevance>64095</relevance>
+<count>2</count>
+<relevance>32047</relevance>
 <recid>title how to program a computer author jack collins</recid>
 </hit>
 <hit>
 
 <md-title>Computer science &amp; technology</md-title>
 <md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
-<md-date>1977</md-date><location id="localhost:9999/db2" name="db2">
-<md-title>Computer science &amp; technology</md-title>
-<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
-<md-date>1977</md-date></location>
-<location id="localhost:9999/db1" name="db1">
+<md-date>1977</md-date><location id="localhost:9999/db1" name="db1">
 <md-title>Computer science &amp; technology</md-title>
 <md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
 <md-date>1977</md-date></location>
-<count>2</count>
-<relevance>53412</relevance>
+<relevance>26706</relevance>
 <recid>title computer science technology</recid>
 </hit>
 <hit>
 
 <md-title>The Computer Bible</md-title>
 <md-date>1973-1980</md-date>
-<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description><location id="localhost:9999/db2" name="db2">
-<md-title>The Computer Bible</md-title>
-<md-date>1973-1980</md-date>
-<md-description>Hebrew and Greek; introductions in English</md-description>
-<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description></location>
-<location id="localhost:9999/db1" name="db1">
+<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description><location id="localhost:9999/db1" name="db1">
 <md-title>The Computer Bible</md-title>
 <md-date>1973-1980</md-date>
 <md-description>Hebrew and Greek; introductions in English</md-description>
 <md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description></location>
-<count>2</count>
-<relevance>53412</relevance>
+<relevance>26706</relevance>
 <recid>title the computer bible</recid>
 </hit>
 <hit>
 <md-title-remainder>a portfolio of thematic computer maps</md-title-remainder>
 <md-date>1974</md-date>
 <md-author>Mairs, John W</md-author>
-<md-description>Scale of maps ca. 1:1,000,000</md-description><location id="localhost:9999/db2" name="db2">
+<md-description>Scale of maps ca. 1:1,000,000</md-description><location id="localhost:9999/db1" name="db1">
 <md-title>The Puget Sound Region</md-title>
 <md-title-remainder>a portfolio of thematic computer maps</md-title-remainder>
 <md-date>1974</md-date>
 <md-author>Mairs, John W</md-author>
 <md-description>Scale of maps ca. 1:1,000,000</md-description></location>
-<location id="localhost:9999/db1" name="db1">
-<md-title>The Puget Sound Region</md-title>
-<md-title-remainder>a portfolio of thematic computer maps</md-title-remainder>
-<md-date>1974</md-date>
-<md-author>Mairs, John W</md-author>
-<md-description>Scale of maps ca. 1:1,000,000</md-description></location>
-<count>2</count>
-<relevance>22255</relevance>
+<relevance>11127</relevance>
 <recid>title the puget sound region author mairs john w</recid>
 </hit>
 <hit>
 
 <md-title>Computer processing of dynamic images from an Anger scintillation camera</md-title>
 <md-title-remainder>the proceedings of a workshop</md-title-remainder>
-<md-date>1974</md-date><location id="localhost:9999/db2" name="db2">
-<md-title>Computer processing of dynamic images from an Anger scintillation camera</md-title>
-<md-title-remainder>the proceedings of a workshop</md-title-remainder>
-<md-date>1974</md-date></location>
-<location id="localhost:9999/db1" name="db1">
+<md-date>1974</md-date><location id="localhost:9999/db1" name="db1">
 <md-title>Computer processing of dynamic images from an Anger scintillation camera</md-title>
 <md-title-remainder>the proceedings of a workshop</md-title-remainder>
 <md-date>1974</md-date></location>
-<count>2</count>
-<relevance>16023</relevance>
+<relevance>8011</relevance>
 <recid>title computer processing of dynamic images from an anger scintillation camera</recid>
 </hit>
 <hit>
 
 <md-title>The use of passwords for controlled access to computer resources</md-title>
 <md-date>1977</md-date>
-<md-author>Wood, Helen M</md-author><location id="localhost:9999/db2" name="db2">
+<md-author>Wood, Helen M</md-author><location id="localhost:9999/db1" name="db1">
 <md-title>The use of passwords for controlled access to computer resources</md-title>
 <md-date>1977</md-date>
 <md-author>Wood, Helen M</md-author></location>
-<location id="localhost:9999/db1" name="db1">
-<md-title>The use of passwords for controlled access to computer resources</md-title>
-<md-date>1977</md-date>
-<md-author>Wood, Helen M</md-author></location>
-<count>2</count>
-<relevance>16023</relevance>
+<relevance>8011</relevance>
 <recid>title the use of passwords for controlled access to computer resources author wood helen m</recid>
 </hit>
 <hit>
 
 <md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
 <md-title-remainder>proceedings of the workshop</md-title-remainder>
-<md-date>1977</md-date><location id="localhost:9999/db2" name="db2">
+<md-date>1977</md-date><location id="localhost:9999/db1" name="db1">
 <md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
 <md-title-remainder>proceedings of the workshop</md-title-remainder>
 <md-date>1977</md-date></location>
-<location id="localhost:9999/db1" name="db1">
-<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
-<md-title-remainder>proceedings of the workshop</md-title-remainder>
-<md-date>1977</md-date></location>
-<count>2</count>
 <relevance>0</relevance>
 <recid>title reconstruction tomography in diagnostic radiology and nuclear medicine</recid>
 </hit>