Updates to pz:authentication documentation
[pazpar2-moved-to-github.git] / test / test_limit_limitmap_24.res
index eb9920b..3542249 100644 (file)
 <?xml version="1.0" encoding="UTF-8"?>
 <show><status>OK</status>
-<activeclients>2</activeclients>
-<merged>40</merged>
-<total>2015</total>
+<activeclients>0</activeclients>
+<merged>1</merged>
+<total>2025</total>
 <start>0</start>
-<num>20</num>
-<hit>
-
-<md-title>Adobe Illustrator for the Mac</md-title>
-<md-title-remainder>fast &amp; easy</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Woodward, C. Michael</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Adobe Illustrator for the Mac</md-title>
-<md-title-remainder>fast &amp; easy</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Woodward, C. Michael</md-author></location>
-<relevance>30776</relevance>
-<recid>content: title adobe illustrator for the mac author woodward c michael</recid>
-</hit>
-<hit>
-
-<md-title>Advanced computer performance modeling and simulation</md-title>
-<md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
-<md-title>Advanced computer performance modeling and simulation</md-title>
-<md-date>1998</md-date></location>
-<relevance>30776</relevance>
-<recid>content: title advanced computer performance modeling and simulation</recid>
-</hit>
-<hit>
-
-<md-title>Cyberterrorism and computer crimes</md-title>
-<md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Aldrich, Richard W</md-author>
-<md-description>&quot;April 2000.&quot;</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Cyberterrorism and computer crimes</md-title>
-<md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Aldrich, Richard W</md-author>
-<md-description>&quot;April 2000.&quot;</md-description></location>
-<relevance>30776</relevance>
-<recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
-</hit>
-<hit>
-
-<md-title>Software design and usability</md-title>
-<md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Kaasgaard, Klaus</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Software design and usability</md-title>
-<md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Kaasgaard, Klaus</md-author></location>
-<relevance>28211</relevance>
-<recid>content: title software design and usability author kaasgaard klaus</recid>
-</hit>
-<hit>
-
-<md-title>Computer friendly</md-title>
-<md-date>1999</md-date>
-<md-author>Steinbacher, Raymond</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Computer friendly</md-title>
-<md-date>1999</md-date>
-<md-author>Steinbacher, Raymond</md-author></location>
-<relevance>23082</relevance>
-<recid>content: title computer friendly author steinbacher raymond</recid>
-</hit>
-<hit>
-
-<md-title>Computer misuse</md-title>
-<md-date>1999</md-date>
-<md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Computer misuse</md-title>
-<md-date>1999</md-date>
-<md-description>&quot;May 1999.&quot;</md-description>
-<md-description>&quot;NZLC R54&quot;--T.p. verso</md-description>
-<md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description></location>
-<relevance>23082</relevance>
-<recid>content: title computer misuse</recid>
-</hit>
-<hit>
-
-<md-title>Unix Secure Shell</md-title>
-<md-date>1999</md-date>
-<md-author>Carasik, Anne H</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Unix Secure Shell</md-title>
-<md-date>1999</md-date>
-<md-author>Carasik, Anne H</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>23082</relevance>
-<recid>content: title unix secure shell author carasik anne h</recid>
-</hit>
-<hit>
-
-<md-title>3D games</md-title>
-<md-title-remainder>real-time rendering and software technology</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Watt, Alan H</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>3D games</md-title>
-<md-title-remainder>real-time rendering and software technology</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Watt, Alan H</md-author></location>
-<relevance>20517</relevance>
-<recid>content: title d games author watt alan h</recid>
-</hit>
-<hit>
-
-<md-title>Java applications strategies for the AS/400</md-title>
-<md-date>1999</md-date>
-<md-author>Denoncourt, Don</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Java applications strategies for the AS/400</md-title>
-<md-date>1999</md-date>
-<md-author>Denoncourt, Don</md-author></location>
-<relevance>20517</relevance>
-<recid>content: title java applications strategies for the as author denoncourt don</recid>
-</hit>
-<hit>
-
-<md-title>Mastering algorithms with C</md-title>
-<md-date>1999</md-date>
-<md-author>Loudon, Kyle</md-author>
-<md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Mastering algorithms with C</md-title>
-<md-date>1999</md-date>
-<md-author>Loudon, Kyle</md-author>
-<md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description>
-<md-description>Includes index</md-description></location>
-<relevance>20517</relevance>
-<recid>content: title mastering algorithms with c author loudon kyle</recid>
-</hit>
-<hit>
-
-<md-title>Programming Web graphics with PERL and GNU software</md-title>
-<md-date>1999</md-date>
-<md-author>Wallace, Shawn P</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Programming Web graphics with PERL and GNU software</md-title>
-<md-date>1999</md-date>
-<md-author>Wallace, Shawn P</md-author></location>
-<relevance>20517</relevance>
-<recid>content: title programming web graphics with perl and gnu software author wallace shawn p</recid>
-</hit>
-<hit>
-
-<md-title>4th ACM Conference on Computer and Communications Security, April 1-4, 1997, Zurich, Switzerland</md-title>
-<md-date>1997</md-date><location id="Target-2" name="LOC-SOLR">
-<md-title>4th ACM Conference on Computer and Communications Security, April 1-4, 1997, Zurich, Switzerland</md-title>
-<md-date>1997</md-date></location>
-<relevance>18185</relevance>
-<recid>content: title th acm conference on computer and communications security april zurich switzerland</recid>
-</hit>
-<hit>
-
-<md-title>Insanely great</md-title>
-<md-title-remainder>the life and times of Macintosh, the computer that changed everything</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Levy, Steven</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Insanely great</md-title>
-<md-title-remainder>the life and times of Macintosh, the computer that changed everything</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Levy, Steven</md-author></location>
-<relevance>17719</relevance>
-<recid>content: title insanely great author levy steven</recid>
-</hit>
-<hit>
-
-<md-title>Careers in computer animation</md-title>
-<md-date>2001</md-date>
-<md-author>Shires, Jeremy</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Careers in computer animation</md-title>
-<md-date>2001</md-date>
-<md-author>Shires, Jeremy</md-author></location>
-<relevance>15388</relevance>
-<recid>content: title careers in computer animation author shires jeremy</recid>
-</hit>
-<hit>
-
-<md-title>Hackers beware</md-title>
-<md-date>2002</md-date>
-<md-author>Cole, Eric</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Hackers beware</md-title>
-<md-date>2002</md-date>
-<md-author>Cole, Eric</md-author></location>
-<relevance>15388</relevance>
-<recid>content: title hackers beware author cole eric</recid>
-</hit>
-<hit>
-
-<md-title>How computer programming works</md-title>
-<md-date>2000</md-date>
-<md-author>Appleman, Daniel</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>How computer programming works</md-title>
-<md-date>2000</md-date>
-<md-author>Appleman, Daniel</md-author></location>
-<relevance>15388</relevance>
-<recid>content: title how computer programming works author appleman daniel</recid>
-</hit>
-<hit>
-
-<md-title>Icon design</md-title>
-<md-date>2001</md-date>
-<md-author>Caplin, Steve</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Icon design</md-title>
-<md-date>2001</md-date>
-<md-author>Caplin, Steve</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>15388</relevance>
-<recid>content: title icon design author caplin steve</recid>
-</hit>
-<hit>
-
-<md-title>Information security architecture</md-title>
-<md-date>2000</md-date>
-<md-author>Tudor, Jan Killmeyer</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Information security architecture</md-title>
-<md-date>2000</md-date>
-<md-author>Tudor, Jan Killmeyer</md-author></location>
-<relevance>15388</relevance>
-<recid>content: title information security architecture author tudor jan killmeyer</recid>
-</hit>
-<hit>
-
-<md-title>Windows 2000</md-title>
-<md-title-remainder>design &amp; migration</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Morimoto, Rand</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Windows 2000</md-title>
-<md-title-remainder>design &amp; migration</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Morimoto, Rand</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>15388</relevance>
-<recid>content: title windows author morimoto rand</recid>
-</hit>
-<hit>
-
-<md-title>The essence of computer graphics</md-title>
-<md-date>2000</md-date>
-<md-author>Cooley, Peter</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>The essence of computer graphics</md-title>
-<md-date>2000</md-date>
-<md-author>Cooley, Peter</md-author></location>
-<relevance>13849</relevance>
-<recid>content: title the essence of computer graphics author cooley peter</recid>
+<num>1</num>
+<hit>
+ <md-title>Washington metropolitan area rail computer feasibility study;</md-title>
+ <md-title-remainder>final report</md-title-remainder>
+ <md-date>1971</md-date>
+ <md-author>Englund, Carl R</md-author>
+ <md-description>&quot;Contract DOT-UT-10003.&quot;</md-description>
+ <location id="Target-1"
+    name="ztest-db1" checksum="2981078110">
+  <md-title>Washington metropolitan area rail computer feasibility study;</md-title>
+  <md-title-remainder>final report</md-title-remainder>
+  <md-date>1971</md-date>
+  <md-author>Englund, Carl R</md-author>
+  <md-description>&quot;Contract DOT-UT-10003.&quot;</md-description>
+  <md-test-usersetting>XXXXXXXXXX</md-test-usersetting>
+ </location>
+ <count>1</count>
+ <relevance>59412</relevance>
+ <recid>content: title washington metropolitan area rail computer feasibility study author englund carl r</recid>
 </hit>
 </show>
\ No newline at end of file