X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_termlist_block_9.res;h=1d820c72d06234c5b0de227b3a2714fc51184d9b;hb=f451628ce616009071ab80cbe201cc7a3f60702d;hp=cbe4f17f8f270c46767ed52503b52452a3fca8fe;hpb=ee40230fd0e997212b707fafcdec0da154fd1b21;p=pazpar2-moved-to-github.git diff --git a/test/test_termlist_block_9.res b/test/test_termlist_block_9.res index cbe4f17..1d820c7 100644 --- a/test/test_termlist_block_9.res +++ b/test/test_termlist_block_9.res @@ -1,443 +1,318 @@ OK 0 -100 -2015 +122 +2038 0 20 - -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -49512 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(1); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](6.000000) * idf[1](0.082521) (49512); -score = relevance(49512); - -content: title adobe illustrator for the mac author woodward c michael + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + 1 + 105534 + content: title adobe illustrator for the mac author woodward c michael - -Advanced computer performance modeling and simulation -1998 -Advanced computer performance modeling and simulation -1998 -49512 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(3); -computer: field=subject vecf[1] += mult(3) / length(3); -computer: field=title vecf[1] += mult(6) / length(6); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](6.000000) * idf[1](0.082521) (49512); -score = relevance(49512); - -content: title advanced computer performance modeling and simulation + Advanced computer performance modeling and simulation + 1998 + + Advanced computer performance modeling and simulation + 1998 + + 1 + 105534 + content: title advanced computer performance modeling and simulation - -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -49512 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=title vecf[1] += mult(6) / length(4); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](6.000000) * idf[1](0.082521) (49512); -score = relevance(49512); - -content: title cyberterrorism and computer crimes author aldrich richard w + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + 1 + 105534 + content: title cyberterrorism and computer crimes author aldrich richard w - -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -45386 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(3); -computer: field=subject vecf[1] += mult(3) / length(2); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](5.500000) * idf[1](0.082521) (45386); -score = relevance(45386); - -content: title software design and usability author kaasgaard klaus + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + 1 + 96739 + content: title software design and usability author kaasgaard klaus - -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -43403 - -computer: field=description vecf[1] += mult(3) / length(14); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=title vecf[1] += mult(6) / length(11); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](5.259740) * idf[1](0.082521) (43403); -score = relevance(43403); - -content: title everything you need to know about the dangers of computer hacking author knittel john + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + 1 + 92513 + content: title everything you need to know about the dangers of computer hacking author knittel john - -Computer peripherals -1995 -Cook, Barry M -Computer peripherals -1995 -Cook, Barry M -43323 - -computer: field=subject vecf[1] += mult(3) / length(4); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=title vecf[1] += mult(6) / length(2); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](5.250000) * idf[1](0.082521) (43323); -score = relevance(43323); - -content: title computer peripherals author cook barry m + Computer peripherals + 1995 + Cook, Barry M + + Computer peripherals + 1995 + Cook, Barry M + + 1 + 92342 + content: title computer peripherals author cook barry m - -Kids' computer book -1994 -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -Kids' computer book -1994 -"For kids and their parents"--Cover -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -38051 - -computer: field=description vecf[1] += mult(3) / length(27); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(3); -computer: field=title vecf[1] += mult(6) / length(3); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.611111) * idf[1](0.082521) (38051); -score = relevance(38051); - -content: title kids computer book + Kids' computer book + 1994 + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + Kids' computer book + 1994 + "For kids and their parents"--Cover + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + 1 + 81105 + content: title kids computer book - -Computer friendly -1999 -Steinbacher, Raymond -Computer friendly -1999 -Steinbacher, Raymond -37134 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=title vecf[1] += mult(6) / length(2); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); -score = relevance(37134); - -content: title computer friendly author steinbacher raymond + Computer friendly + 1999 + Steinbacher, Raymond + + Computer friendly + 1999 + Steinbacher, Raymond + + 1 + 79150 + content: title computer friendly author steinbacher raymond - -Computer misuse -1999 -"Also published as Parliamentary Paper E 31AO"--T.p. verso -Computer misuse -1999 -"May 1999." -"NZLC R54"--T.p. verso -"Also published as Parliamentary Paper E 31AO"--T.p. verso -37134 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=title vecf[1] += mult(6) / length(2); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); -score = relevance(37134); - -content: title computer misuse + Computer misuse + 1999 + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + Computer misuse + 1999 + "May 1999." + "NZLC R54"--T.p. verso + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + 1 + 79150 + content: title computer misuse - -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -37134 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=title vecf[1] += mult(6) / length(2); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); -score = relevance(37134); - -content: title computer networking author ross keith w + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + 1 + 79150 + content: title computer networking author ross keith w - -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -37134 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); -score = relevance(37134); - -content: title coreldraw for windows author davis phyllis + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + 1 + 79150 + content: title coreldraw for windows author davis phyllis - -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -"Covers Quicken deluxe 2000 for the Mac"--Cover -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -Includes index -"Covers Quicken deluxe 2000 for the Mac"--Cover -37134 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(1); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); -score = relevance(37134); - -content: title quicken for the mac author langer maria + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + "Covers Quicken deluxe 2000 for the Mac"--Cover + + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + Includes index + "Covers Quicken deluxe 2000 for the Mac"--Cover + + 1 + 79150 + content: title quicken for the mac author langer maria - -Sicherheit und Schutz im Netz -1998 -Sicherheit und Schutz im Netz -1998 -37134 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); -score = relevance(37134); - -content: title sicherheit und schutz im netz + Sicherheit und Schutz im Netz + 1998 + + Sicherheit und Schutz im Netz + 1998 + + 1 + 79150 + content: title sicherheit und schutz im netz - -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -37134 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); -score = relevance(37134); - -content: title unix secure shell author carasik anne h + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + 1 + 79150 + content: title unix secure shell author carasik anne h - -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -35071 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(3); -computer: field=subject vecf[1] += mult(3) / length(3); -computer: field=title vecf[1] += mult(6) / length(8); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.250000) * idf[1](0.082521) (35071); -score = relevance(35071); - -content: title eight international conference on computer communications and networks + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + 1 + 74753 + content: title eight international conference on computer communications and networks - -Building storage networks -2000 -Farley, Marc -Includes index -Building storage networks -2000 -Farley, Marc -Includes index -33008 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(3); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); -score = relevance(33008); - -content: title building storage networks author farley marc + Building storage networks + 2000 + Farley, Marc + Includes index + + Building storage networks + 2000 + Farley, Marc + Includes index + + 1 + 70356 + content: title building storage networks author farley marc - -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -33008 - -computer: field=subject vecf[1] += mult(3) / length(1); -computer: field=subject vecf[1] += mult(3) / length(3); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); -score = relevance(33008); - -content: title complete cl author malaga ernie + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + 1 + 70356 + content: title complete cl author malaga ernie - -3D games -real-time rendering and software technology -2001 -Watt, Alan H -3D games -real-time rendering and software technology -2001 -Watt, Alan H -33008 - -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(3); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); -score = relevance(33008); - -content: title d games author watt alan h + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 1 + 70356 + content: title d games author watt alan h - -Java applications strategies for the AS/400 -1999 -Denoncourt, Don -Java applications strategies for the AS/400 -1999 -Denoncourt, Don -33008 - -computer: field=subject vecf[1] += mult(3) / length(3); -computer: field=subject vecf[1] += mult(3) / length(1); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); -score = relevance(33008); - -content: title java applications strategies for the as author denoncourt don + Internet world + 1992 + Title from caption + + Internet world + 1992 + Title from caption + + 1 + 70356 + content: title internet world - -Mastering algorithms with C -1999 -Loudon, Kyle -"Useful techniques from sorting to encryption"--Cover -Mastering algorithms with C -1999 -Loudon, Kyle -"Useful techniques from sorting to encryption"--Cover -Includes index -33008 - -computer: field=subject vecf[1] += mult(3) / length(3); -computer: field=subject vecf[1] += mult(3) / length(2); -computer: field=subject vecf[1] += mult(3) / length(2); -idf[1] = log(((1 + total(100))/termoccur(93)); -computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); -score = relevance(33008); - -content: title mastering algorithms with c author loudon kyle + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + 1 + 70356 + content: title java applications strategies for the as author denoncourt don \ No newline at end of file