Updates to pz:authentication documentation
[pazpar2-moved-to-github.git] / test / test_limit_limitmap_31.res
index e1a4919..3acc441 100644 (file)
@@ -1,57 +1,27 @@
 <?xml version="1.0" encoding="UTF-8"?>
-<show><status>OK</status>
-<activeclients>0</activeclients>
-<merged>4</merged>
-<total>2025</total>
-<start>0</start>
-<num>4</num>
-<hit>
-
-<md-title>Computer science &amp; technology</md-title>
-<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
-<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
-<md-title>Computer science &amp; technology</md-title>
-<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
-<md-date>1977</md-date>
-<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>57536</relevance>
-<recid>content: title computer science technology</recid>
-</hit>
-<hit>
-
-<md-title>The Computer Bible</md-title>
-<md-date>1973-1980</md-date>
-<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description><location id="Target-1" name="ztest-db1">
-<md-title>The Computer Bible</md-title>
-<md-date>1973-1980</md-date>
-<md-description>Hebrew and Greek; introductions in English</md-description>
-<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description>
-<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>57536</relevance>
-<recid>content: title the computer bible</recid>
-</hit>
-<hit>
-
-<md-title>The use of passwords for controlled access to computer resources</md-title>
-<md-date>1977</md-date>
-<md-author>Wood, Helen M</md-author><location id="Target-1" name="ztest-db1">
-<md-title>The use of passwords for controlled access to computer resources</md-title>
-<md-date>1977</md-date>
-<md-author>Wood, Helen M</md-author>
-<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>17260</relevance>
-<recid>content: title the use of passwords for controlled access to computer resources author wood helen m</recid>
-</hit>
-<hit>
-
-<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
-<md-title-remainder>proceedings of the workshop</md-title-remainder>
-<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
-<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
-<md-title-remainder>proceedings of the workshop</md-title-remainder>
-<md-date>1977</md-date>
-<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>0</relevance>
-<recid>content: title reconstruction tomography in diagnostic radiology and nuclear medicine</recid>
-</hit>
-</show>
\ No newline at end of file
+<termlist><activeclients>0</activeclients>
+<list name="date">
+<term><name>1977</name><frequency>3</frequency></term>
+<term><name>1973</name><frequency>1</frequency></term>
+<term><name>1980</name><frequency>1</frequency></term>
+</list>
+<list name="subject">
+<term><name>Bible</name><frequency>1</frequency></term>
+<term><name>Bible. O.T</name><frequency>1</frequency></term>
+<term><name>Computers</name><frequency>1</frequency></term>
+<term><name>Optical pattern recognition</name><frequency>1</frequency></term>
+<term><name>Tomography</name><frequency>1</frequency></term>
+</list>
+<list name="author">
+<term><name>Wood, Helen M</name><frequency>1</frequency></term>
+</list>
+<list name="xtargets">
+<term>
+<id>Target-1</id>
+<name>ztest-db1</name>
+<frequency>10</frequency>
+<state>Client_Idle</state>
+<diagnostic>0</diagnostic>
+</term>
+</list>
+</termlist>
\ No newline at end of file