Updates to pz:authentication documentation
[pazpar2-moved-to-github.git] / test / test_termlist_block_9.res
index e2a4318..1d820c7 100644 (file)
 <?xml version="1.0" encoding="UTF-8"?>
 <show><status>OK</status>
 <activeclients>0</activeclients>
-<merged>100</merged>
-<total>2015</total>
+<merged>122</merged>
+<total>2038</total>
 <start>0</start>
 <num>20</num>
 <hit>
-
-<md-title>Adobe Illustrator for the Mac</md-title>
-<md-title-remainder>fast &amp; easy</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Woodward, C. Michael</md-author><location id="id_solr"
- name="LOC (SOLR)" checksum="1471384697">
-<md-title>Adobe Illustrator for the Mac</md-title>
-<md-title-remainder>fast &amp; easy</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Woodward, C. Michael</md-author></location>
-<relevance>49512</relevance>
-<recid>content: title adobe illustrator for the mac author woodward c michael</recid>
+ <md-title>Adobe Illustrator for the Mac</md-title>
+ <md-title-remainder>fast &amp; easy</md-title-remainder>
+ <md-date>2001</md-date>
+ <md-author>Woodward, C. Michael</md-author>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="1471384697">
+  <md-title>Adobe Illustrator for the Mac</md-title>
+  <md-title-remainder>fast &amp; easy</md-title-remainder>
+  <md-date>2001</md-date>
+  <md-author>Woodward, C. Michael</md-author>
+ </location>
+ <count>1</count>
+ <relevance>105534</relevance>
+ <recid>content: title adobe illustrator for the mac author woodward c michael</recid>
 </hit>
 <hit>
-
-<md-title>Advanced computer performance modeling and simulation</md-title>
-<md-date>1998</md-date><location id="id_solr"
- name="LOC (SOLR)" checksum="3924860916">
-<md-title>Advanced computer performance modeling and simulation</md-title>
-<md-date>1998</md-date></location>
-<relevance>49512</relevance>
-<recid>content: title advanced computer performance modeling and simulation</recid>
+ <md-title>Advanced computer performance modeling and simulation</md-title>
+ <md-date>1998</md-date>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="3924860916">
+  <md-title>Advanced computer performance modeling and simulation</md-title>
+  <md-date>1998</md-date>
+ </location>
+ <count>1</count>
+ <relevance>105534</relevance>
+ <recid>content: title advanced computer performance modeling and simulation</recid>
 </hit>
 <hit>
-
-<md-title>Cyberterrorism and computer crimes</md-title>
-<md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Aldrich, Richard W</md-author>
-<md-description>&quot;April 2000.&quot;</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="2501955422">
-<md-title>Cyberterrorism and computer crimes</md-title>
-<md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Aldrich, Richard W</md-author>
-<md-description>&quot;April 2000.&quot;</md-description></location>
-<relevance>49512</relevance>
-<recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
+ <md-title>Cyberterrorism and computer crimes</md-title>
+ <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
+ <md-date>2000</md-date>
+ <md-author>Aldrich, Richard W</md-author>
+ <md-description>&quot;April 2000.&quot;</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="2501955422">
+  <md-title>Cyberterrorism and computer crimes</md-title>
+  <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
+  <md-date>2000</md-date>
+  <md-author>Aldrich, Richard W</md-author>
+  <md-description>&quot;April 2000.&quot;</md-description>
+ </location>
+ <count>1</count>
+ <relevance>105534</relevance>
+ <recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
 </hit>
 <hit>
-
-<md-title>Software design and usability</md-title>
-<md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Kaasgaard, Klaus</md-author><location id="id_solr"
- name="LOC (SOLR)" checksum="514030763">
-<md-title>Software design and usability</md-title>
-<md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Kaasgaard, Klaus</md-author></location>
-<relevance>45386</relevance>
-<recid>content: title software design and usability author kaasgaard klaus</recid>
+ <md-title>Software design and usability</md-title>
+ <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
+ <md-date>2000</md-date>
+ <md-author>Kaasgaard, Klaus</md-author>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="514030763">
+  <md-title>Software design and usability</md-title>
+  <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
+  <md-date>2000</md-date>
+  <md-author>Kaasgaard, Klaus</md-author>
+ </location>
+ <count>1</count>
+ <relevance>96739</relevance>
+ <recid>content: title software design and usability author kaasgaard klaus</recid>
 </hit>
 <hit>
-
-<md-title>Everything you need to know about the dangers of computer hacking</md-title>
-<md-date>2000</md-date>
-<md-author>Knittel, John</md-author>
-<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="440813972">
-<md-title>Everything you need to know about the dangers of computer hacking</md-title>
-<md-date>2000</md-date>
-<md-author>Knittel, John</md-author>
-<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description></location>
-<relevance>43403</relevance>
-<recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
+ <md-title>Everything you need to know about the dangers of computer hacking</md-title>
+ <md-date>2000</md-date>
+ <md-author>Knittel, John</md-author>
+ <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="440813972">
+  <md-title>Everything you need to know about the dangers of computer hacking</md-title>
+  <md-date>2000</md-date>
+  <md-author>Knittel, John</md-author>
+  <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description>
+ </location>
+ <count>1</count>
+ <relevance>92513</relevance>
+ <recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
 </hit>
 <hit>
-
-<md-title>Computer peripherals</md-title>
-<md-date>1995</md-date>
-<md-author>Cook, Barry M</md-author><location id="id_solr"
- name="LOC (SOLR)" checksum="3558776961">
-<md-title>Computer peripherals</md-title>
-<md-date>1995</md-date>
-<md-author>Cook, Barry M</md-author></location>
-<relevance>43323</relevance>
-<recid>content: title computer peripherals author cook barry m</recid>
+ <md-title>Computer peripherals</md-title>
+ <md-date>1995</md-date>
+ <md-author>Cook, Barry M</md-author>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="3558776961">
+  <md-title>Computer peripherals</md-title>
+  <md-date>1995</md-date>
+  <md-author>Cook, Barry M</md-author>
+ </location>
+ <count>1</count>
+ <relevance>92342</relevance>
+ <recid>content: title computer peripherals author cook barry m</recid>
 </hit>
 <hit>
-
-<md-title>Kids&apos; computer book</md-title>
-<md-date>1994</md-date>
-<md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="2747856609">
-<md-title>Kids&apos; computer book</md-title>
-<md-date>1994</md-date>
-<md-description>&quot;For kids and their parents&quot;--Cover</md-description>
-<md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description></location>
-<relevance>38051</relevance>
-<recid>content: title kids computer book</recid>
+ <md-title>Kids&apos; computer book</md-title>
+ <md-date>1994</md-date>
+ <md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="2747856609">
+  <md-title>Kids&apos; computer book</md-title>
+  <md-date>1994</md-date>
+  <md-description>&quot;For kids and their parents&quot;--Cover</md-description>
+  <md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description>
+ </location>
+ <count>1</count>
+ <relevance>81105</relevance>
+ <recid>content: title kids computer book</recid>
 </hit>
 <hit>
-
-<md-title>Computer friendly</md-title>
-<md-date>1999</md-date>
-<md-author>Steinbacher, Raymond</md-author><location id="id_solr"
- name="LOC (SOLR)" checksum="194912785">
-<md-title>Computer friendly</md-title>
-<md-date>1999</md-date>
-<md-author>Steinbacher, Raymond</md-author></location>
-<relevance>37134</relevance>
-<recid>content: title computer friendly author steinbacher raymond</recid>
+ <md-title>Computer friendly</md-title>
+ <md-date>1999</md-date>
+ <md-author>Steinbacher, Raymond</md-author>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="194912785">
+  <md-title>Computer friendly</md-title>
+  <md-date>1999</md-date>
+  <md-author>Steinbacher, Raymond</md-author>
+ </location>
+ <count>1</count>
+ <relevance>79150</relevance>
+ <recid>content: title computer friendly author steinbacher raymond</recid>
 </hit>
 <hit>
-
-<md-title>Computer misuse</md-title>
-<md-date>1999</md-date>
-<md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="268129576">
-<md-title>Computer misuse</md-title>
-<md-date>1999</md-date>
-<md-description>&quot;May 1999.&quot;</md-description>
-<md-description>&quot;NZLC R54&quot;--T.p. verso</md-description>
-<md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description></location>
-<relevance>37134</relevance>
-<recid>content: title computer misuse</recid>
+ <md-title>Computer misuse</md-title>
+ <md-date>1999</md-date>
+ <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="268129576">
+  <md-title>Computer misuse</md-title>
+  <md-date>1999</md-date>
+  <md-description>&quot;May 1999.&quot;</md-description>
+  <md-description>&quot;NZLC R54&quot;--T.p. verso</md-description>
+  <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description>
+ </location>
+ <count>1</count>
+ <relevance>79150</relevance>
+ <recid>content: title computer misuse</recid>
 </hit>
 <hit>
-
-<md-title>Computer networking</md-title>
-<md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Ross, Keith W</md-author><location id="id_solr"
- name="LOC (SOLR)" checksum="3485560170">
-<md-title>Computer networking</md-title>
-<md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Ross, Keith W</md-author></location>
-<relevance>37134</relevance>
-<recid>content: title computer networking author ross keith w</recid>
+ <md-title>Computer networking</md-title>
+ <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
+ <md-date>2001</md-date>
+ <md-author>Ross, Keith W</md-author>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="3485560170">
+  <md-title>Computer networking</md-title>
+  <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
+  <md-date>2001</md-date>
+  <md-author>Ross, Keith W</md-author>
+ </location>
+ <count>1</count>
+ <relevance>79150</relevance>
+ <recid>content: title computer networking author ross keith w</recid>
 </hit>
 <hit>
-
-<md-title>CorelDRAW 8 for Windows</md-title>
-<md-date>1998</md-date>
-<md-author>Davis, Phyllis</md-author>
-<md-description>Includes index</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="1570852302">
-<md-title>CorelDRAW 8 for Windows</md-title>
-<md-date>1998</md-date>
-<md-author>Davis, Phyllis</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>37134</relevance>
-<recid>content: title coreldraw for windows author davis phyllis</recid>
+ <md-title>CorelDRAW 8 for Windows</md-title>
+ <md-date>1998</md-date>
+ <md-author>Davis, Phyllis</md-author>
+ <md-description>Includes index</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="1570852302">
+  <md-title>CorelDRAW 8 for Windows</md-title>
+  <md-date>1998</md-date>
+  <md-author>Davis, Phyllis</md-author>
+  <md-description>Includes index</md-description>
+ </location>
+ <count>1</count>
+ <relevance>79150</relevance>
+ <recid>content: title coreldraw for windows author davis phyllis</recid>
 </hit>
 <hit>
-
-<md-title>Quicken 2000 for the Mac</md-title>
-<md-title-remainder>the official guide</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Langer, Maria</md-author>
-<md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="3705210543">
-<md-title>Quicken 2000 for the Mac</md-title>
-<md-title-remainder>the official guide</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Langer, Maria</md-author>
-<md-description>Includes index</md-description>
-<md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description></location>
-<relevance>37134</relevance>
-<recid>content: title quicken for the mac author langer maria</recid>
+ <md-title>Quicken 2000 for the Mac</md-title>
+ <md-title-remainder>the official guide</md-title-remainder>
+ <md-date>2000</md-date>
+ <md-author>Langer, Maria</md-author>
+ <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="3705210543">
+  <md-title>Quicken 2000 for the Mac</md-title>
+  <md-title-remainder>the official guide</md-title-remainder>
+  <md-date>2000</md-date>
+  <md-author>Langer, Maria</md-author>
+  <md-description>Includes index</md-description>
+  <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description>
+ </location>
+ <count>1</count>
+ <relevance>79150</relevance>
+ <recid>content: title quicken for the mac author langer maria</recid>
 </hit>
 <hit>
-
-<md-title>Sicherheit und Schutz im Netz</md-title>
-<md-date>1998</md-date><location id="id_solr"
- name="LOC (SOLR)" checksum="932616346">
-<md-title>Sicherheit und Schutz im Netz</md-title>
-<md-date>1998</md-date></location>
-<relevance>37134</relevance>
-<recid>content: title sicherheit und schutz im netz</recid>
+ <md-title>Sicherheit und Schutz im Netz</md-title>
+ <md-date>1998</md-date>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="932616346">
+  <md-title>Sicherheit und Schutz im Netz</md-title>
+  <md-date>1998</md-date>
+ </location>
+ <count>1</count>
+ <relevance>79150</relevance>
+ <recid>content: title sicherheit und schutz im netz</recid>
 </hit>
 <hit>
-
-<md-title>Unix Secure Shell</md-title>
-<md-date>1999</md-date>
-<md-author>Carasik, Anne H</md-author>
-<md-description>Includes index</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="2109620653">
-<md-title>Unix Secure Shell</md-title>
-<md-date>1999</md-date>
-<md-author>Carasik, Anne H</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>37134</relevance>
-<recid>content: title unix secure shell author carasik anne h</recid>
+ <md-title>Unix Secure Shell</md-title>
+ <md-date>1999</md-date>
+ <md-author>Carasik, Anne H</md-author>
+ <md-description>Includes index</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="2109620653">
+  <md-title>Unix Secure Shell</md-title>
+  <md-date>1999</md-date>
+  <md-author>Carasik, Anne H</md-author>
+  <md-description>Includes index</md-description>
+ </location>
+ <count>1</count>
+ <relevance>79150</relevance>
+ <recid>content: title unix secure shell author carasik anne h</recid>
 </hit>
 <hit>
-
-<md-title>Eight International Conference on Computer Communications and Networks</md-title>
-<md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
-<md-date>1999</md-date>
-<md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="759931950">
-<md-title>Eight International Conference on Computer Communications and Networks</md-title>
-<md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
-<md-date>1999</md-date>
-<md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description></location>
-<relevance>35071</relevance>
-<recid>content: title eight international conference on computer communications and networks</recid>
+ <md-title>Eight International Conference on Computer Communications and Networks</md-title>
+ <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
+ <md-date>1999</md-date>
+ <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="759931950">
+  <md-title>Eight International Conference on Computer Communications and Networks</md-title>
+  <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
+  <md-date>1999</md-date>
+  <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description>
+ </location>
+ <count>1</count>
+ <relevance>74753</relevance>
+ <recid>content: title eight international conference on computer communications and networks</recid>
 </hit>
 <hit>
-
-<md-title>Building storage networks</md-title>
-<md-date>2000</md-date>
-<md-author>Farley, Marc</md-author>
-<md-description>Includes index</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="2282305049">
-<md-title>Building storage networks</md-title>
-<md-date>2000</md-date>
-<md-author>Farley, Marc</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>33008</relevance>
-<recid>content: title building storage networks author farley marc</recid>
+ <md-title>Building storage networks</md-title>
+ <md-date>2000</md-date>
+ <md-author>Farley, Marc</md-author>
+ <md-description>Includes index</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="2282305049">
+  <md-title>Building storage networks</md-title>
+  <md-date>2000</md-date>
+  <md-author>Farley, Marc</md-author>
+  <md-description>Includes index</md-description>
+ </location>
+ <count>1</count>
+ <relevance>70356</relevance>
+ <recid>content: title building storage networks author farley marc</recid>
 </hit>
 <hit>
-
-<md-title>Complete CL</md-title>
-<md-title-remainder>the definitive control language programming guide</md-title-remainder>
-<md-date>1999</md-date>
-<md-author>Malaga, Ernie</md-author>
-<md-description>Includes index</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="2036403862">
-<md-title>Complete CL</md-title>
-<md-title-remainder>the definitive control language programming guide</md-title-remainder>
-<md-date>1999</md-date>
-<md-author>Malaga, Ernie</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>33008</relevance>
-<recid>content: title complete cl author malaga ernie</recid>
+ <md-title>Complete CL</md-title>
+ <md-title-remainder>the definitive control language programming guide</md-title-remainder>
+ <md-date>1999</md-date>
+ <md-author>Malaga, Ernie</md-author>
+ <md-description>Includes index</md-description>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="2036403862">
+  <md-title>Complete CL</md-title>
+  <md-title-remainder>the definitive control language programming guide</md-title-remainder>
+  <md-date>1999</md-date>
+  <md-author>Malaga, Ernie</md-author>
+  <md-description>Includes index</md-description>
+ </location>
+ <count>1</count>
+ <relevance>70356</relevance>
+ <recid>content: title complete cl author malaga ernie</recid>
 </hit>
 <hit>
-
-<md-title>3D games</md-title>
-<md-title-remainder>real-time rendering and software technology</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Watt, Alan H</md-author><location id="id_solr"
- name="LOC (SOLR)" checksum="3459309356">
-<md-title>3D games</md-title>
-<md-title-remainder>real-time rendering and software technology</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Watt, Alan H</md-author></location>
-<relevance>33008</relevance>
-<recid>content: title d games author watt alan h</recid>
+ <md-title>3D games</md-title>
+ <md-title-remainder>real-time rendering and software technology</md-title-remainder>
+ <md-date>2001</md-date>
+ <md-author>Watt, Alan H</md-author>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="3459309356">
+  <md-title>3D games</md-title>
+  <md-title-remainder>real-time rendering and software technology</md-title-remainder>
+  <md-date>2001</md-date>
+  <md-author>Watt, Alan H</md-author>
+ </location>
+ <count>1</count>
+ <relevance>70356</relevance>
+ <recid>content: title d games author watt alan h</recid>
 </hit>
 <hit>
-
-<md-title>Java applications strategies for the AS/400</md-title>
-<md-date>1999</md-date>
-<md-author>Denoncourt, Don</md-author><location id="id_solr"
- name="LOC (SOLR)" checksum="3239658983">
-<md-title>Java applications strategies for the AS/400</md-title>
-<md-date>1999</md-date>
-<md-author>Denoncourt, Don</md-author></location>
-<relevance>33008</relevance>
-<recid>content: title java applications strategies for the as author denoncourt don</recid>
+ <md-title>Internet world</md-title>
+ <md-date>1992</md-date>
+ <md-description>Title from caption</md-description>
+ <location id="localhost:9999/db1"
+    name="db1" checksum="2093092631">
+  <md-title>Internet world</md-title>
+  <md-date>1992</md-date>
+  <md-description>Title from caption</md-description>
+ </location>
+ <count>1</count>
+ <relevance>70356</relevance>
+ <recid>content: title internet world</recid>
 </hit>
 <hit>
-
-<md-title>Mastering algorithms with C</md-title>
-<md-date>1999</md-date>
-<md-author>Loudon, Kyle</md-author>
-<md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description><location id="id_solr"
- name="LOC (SOLR)" checksum="121695994">
-<md-title>Mastering algorithms with C</md-title>
-<md-date>1999</md-date>
-<md-author>Loudon, Kyle</md-author>
-<md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description>
-<md-description>Includes index</md-description></location>
-<relevance>33008</relevance>
-<recid>content: title mastering algorithms with c author loudon kyle</recid>
+ <md-title>Java applications strategies for the AS/400</md-title>
+ <md-date>1999</md-date>
+ <md-author>Denoncourt, Don</md-author>
+ <location id="id_solr"
+    name="LOC (SOLR)" checksum="3239658983">
+  <md-title>Java applications strategies for the AS/400</md-title>
+  <md-date>1999</md-date>
+  <md-author>Denoncourt, Don</md-author>
+ </location>
+ <count>1</count>
+ <relevance>70356</relevance>
+ <recid>content: title java applications strategies for the as author denoncourt don</recid>
 </hit>
 </show>
\ No newline at end of file