Update tests for limit maps
authorDennis Schafroth <dennis@indexdata.com>
Tue, 22 May 2012 09:24:45 +0000 (09:24 +0000)
committerDennis Schafroth <dennis@indexdata.com>
Tue, 22 May 2012 09:24:45 +0000 (09:24 +0000)
test/test_limit_limitmap.urls
test/test_limit_limitmap_27.res
test/test_limit_limitmap_28.res
test/test_limit_limitmap_29.res
test/test_limit_limitmap_30.res
test/test_limit_limitmap_31.res
test/test_limit_limitmap_32.res [new file with mode: 0644]
test/test_limit_limitmap_33.res [new file with mode: 0644]

index e40b12d..a56d6c1 100644 (file)
@@ -23,4 +23,9 @@ test_limit_limitmap_settings_4.xml http://localhost:9763/search.pz2?session=1&co
 http://localhost:9763/search.pz2?session=1&command=search&query=computer&limit=Mysubject%3DRailroads
 1 http://localhost:9763/search.pz2?session=1&command=show&block=1
 http://localhost:9763/search.pz2?session=1&command=search&query=computer&limit=date%3D1977
-http://localhost:9763/search.pz2?session=1&command=show&block=1
+1 http://localhost:9763/search.pz2?session=1&command=show&block=1
+http://localhost:9763/search.pz2?session=1&command=search&query=computer&limit=Mysubject%3DRailroads
+1 http://localhost:9763/search.pz2?session=1&command=show&block=1&version=2
+http://localhost:9763/search.pz2?session=1&command=search&query=computer&limit=date%3D1977
+http://localhost:9763/search.pz2?session=1&command=show&block=1&version=2
+http://localhost:9763/search.pz2?session=1&command=termlist&block=1&version=2
index 101bb60..ab63fe6 100644 (file)
@@ -1,22 +1,2 @@
 <?xml version="1.0" encoding="UTF-8"?>
-<show><status>OK</status>
-<activeclients>0</activeclients>
-<merged>1</merged>
-<total>1</total>
-<start>0</start>
-<num>1</num>
-<hit>
-
-<md-title>The religious teachers of Greece</md-title>
-<md-date>1972</md-date>
-<md-author>Adam, James</md-author>
-<md-description>Reprint of the 1909 ed., which was issued as the 1904-1906 Gifford lectures</md-description><location id="Target-1" name="ztest-db1">
-<md-title>The religious teachers of Greece</md-title>
-<md-date>1972</md-date>
-<md-author>Adam, James</md-author>
-<md-description>Reprint of the 1909 ed., which was issued as the 1904-1906 Gifford lectures</md-description>
-<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>420000</relevance>
-<recid>content: title the religious teachers of greece author adam james</recid>
-</hit>
-</show>
\ No newline at end of file
+<search><status>OK</status></search>
\ No newline at end of file
index ab63fe6..60b3c70 100644 (file)
@@ -1,2 +1,25 @@
 <?xml version="1.0" encoding="UTF-8"?>
-<search><status>OK</status></search>
\ No newline at end of file
+<show><status>OK</status>
+<activeclients>0</activeclients>
+<merged>1</merged>
+<total>2025</total>
+<approximation>1</approximation>
+<start>0</start>
+<num>1</num>
+<hit>
+
+<md-title>Washington metropolitan area rail computer feasibility study;</md-title>
+<md-title-remainder>final report</md-title-remainder>
+<md-date>1971</md-date>
+<md-author>Englund, Carl R</md-author>
+<md-description>&quot;Contract DOT-UT-10003.&quot;</md-description><location id="Target-1" name="ztest-db1">
+<md-title>Washington metropolitan area rail computer feasibility study;</md-title>
+<md-title-remainder>final report</md-title-remainder>
+<md-date>1971</md-date>
+<md-author>Englund, Carl R</md-author>
+<md-description>&quot;Contract DOT-UT-10003.&quot;</md-description>
+<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
+<relevance>85714</relevance>
+<recid>content: title washington metropolitan area rail computer feasibility study author englund carl r</recid>
+</hit>
+</show>
\ No newline at end of file
index 7d1c254..ab63fe6 100644 (file)
@@ -1,262 +1,2 @@
 <?xml version="1.0" encoding="UTF-8"?>
-<show><status>OK</status>
-<activeclients>1</activeclients>
-<merged>100</merged>
-<total>2015</total>
-<start>0</start>
-<num>20</num>
-<hit>
-
-<md-title>Adobe Illustrator for the Mac</md-title>
-<md-title-remainder>fast &amp; easy</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Woodward, C. Michael</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Adobe Illustrator for the Mac</md-title>
-<md-title-remainder>fast &amp; easy</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Woodward, C. Michael</md-author></location>
-<relevance>37125</relevance>
-<recid>content: title adobe illustrator for the mac author woodward c michael</recid>
-</hit>
-<hit>
-
-<md-title>Advanced computer performance modeling and simulation</md-title>
-<md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
-<md-title>Advanced computer performance modeling and simulation</md-title>
-<md-date>1998</md-date></location>
-<relevance>37125</relevance>
-<recid>content: title advanced computer performance modeling and simulation</recid>
-</hit>
-<hit>
-
-<md-title>Cyberterrorism and computer crimes</md-title>
-<md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Aldrich, Richard W</md-author>
-<md-description>&quot;April 2000.&quot;</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Cyberterrorism and computer crimes</md-title>
-<md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Aldrich, Richard W</md-author>
-<md-description>&quot;April 2000.&quot;</md-description></location>
-<relevance>37125</relevance>
-<recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
-</hit>
-<hit>
-
-<md-title>Computer interfacing</md-title>
-<md-date>2000</md-date>
-<md-author>Smith, George A</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Computer interfacing</md-title>
-<md-date>2000</md-date>
-<md-author>Smith, George A</md-author></location>
-<relevance>34031</relevance>
-<recid>content: title computer interfacing author smith george a</recid>
-</hit>
-<hit>
-
-<md-title>Software design and usability</md-title>
-<md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Kaasgaard, Klaus</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Software design and usability</md-title>
-<md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Kaasgaard, Klaus</md-author></location>
-<relevance>34031</relevance>
-<recid>content: title software design and usability author kaasgaard klaus</recid>
-</hit>
-<hit>
-
-<md-title>Everything you need to know about the dangers of computer hacking</md-title>
-<md-date>2000</md-date>
-<md-author>Knittel, John</md-author>
-<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Everything you need to know about the dangers of computer hacking</md-title>
-<md-date>2000</md-date>
-<md-author>Knittel, John</md-author>
-<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description></location>
-<relevance>32544</relevance>
-<recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
-</hit>
-<hit>
-
-<md-title>Computer peripherals</md-title>
-<md-date>1995</md-date>
-<md-author>Cook, Barry M</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Computer peripherals</md-title>
-<md-date>1995</md-date>
-<md-author>Cook, Barry M</md-author></location>
-<relevance>32484</relevance>
-<recid>content: title computer peripherals author cook barry m</recid>
-</hit>
-<hit>
-
-<md-title>Kids&apos; computer book</md-title>
-<md-date>1994</md-date>
-<md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Kids&apos; computer book</md-title>
-<md-date>1994</md-date>
-<md-description>&quot;For kids and their parents&quot;--Cover</md-description>
-<md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description></location>
-<relevance>28531</relevance>
-<recid>content: title kids computer book</recid>
-</hit>
-<hit>
-
-<md-title>Computer friendly</md-title>
-<md-date>1999</md-date>
-<md-author>Steinbacher, Raymond</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Computer friendly</md-title>
-<md-date>1999</md-date>
-<md-author>Steinbacher, Raymond</md-author></location>
-<relevance>27843</relevance>
-<recid>content: title computer friendly author steinbacher raymond</recid>
-</hit>
-<hit>
-
-<md-title>Computer misuse</md-title>
-<md-date>1999</md-date>
-<md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Computer misuse</md-title>
-<md-date>1999</md-date>
-<md-description>&quot;May 1999.&quot;</md-description>
-<md-description>&quot;NZLC R54&quot;--T.p. verso</md-description>
-<md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description></location>
-<relevance>27843</relevance>
-<recid>content: title computer misuse</recid>
-</hit>
-<hit>
-
-<md-title>Computer networking</md-title>
-<md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Ross, Keith W</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Computer networking</md-title>
-<md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Ross, Keith W</md-author></location>
-<relevance>27843</relevance>
-<recid>content: title computer networking author ross keith w</recid>
-</hit>
-<hit>
-
-<md-title>CorelDRAW 8 for Windows</md-title>
-<md-date>1998</md-date>
-<md-author>Davis, Phyllis</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>CorelDRAW 8 for Windows</md-title>
-<md-date>1998</md-date>
-<md-author>Davis, Phyllis</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>27843</relevance>
-<recid>content: title coreldraw for windows author davis phyllis</recid>
-</hit>
-<hit>
-
-<md-title>Quicken 2001 Deluxe for Macintosh</md-title>
-<md-title-remainder>the official guide</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Langer, Maria</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Quicken 2001 Deluxe for Macintosh</md-title>
-<md-title-remainder>the official guide</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Langer, Maria</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>27843</relevance>
-<recid>content: title quicken deluxe for macintosh author langer maria</recid>
-</hit>
-<hit>
-
-<md-title>Quicken 2000 for the Mac</md-title>
-<md-title-remainder>the official guide</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Langer, Maria</md-author>
-<md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Quicken 2000 for the Mac</md-title>
-<md-title-remainder>the official guide</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Langer, Maria</md-author>
-<md-description>Includes index</md-description>
-<md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description></location>
-<relevance>27843</relevance>
-<recid>content: title quicken for the mac author langer maria</recid>
-</hit>
-<hit>
-
-<md-title>Sicherheit und Schutz im Netz</md-title>
-<md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
-<md-title>Sicherheit und Schutz im Netz</md-title>
-<md-date>1998</md-date></location>
-<relevance>27843</relevance>
-<recid>content: title sicherheit und schutz im netz</recid>
-</hit>
-<hit>
-
-<md-title>Unix Secure Shell</md-title>
-<md-date>1999</md-date>
-<md-author>Carasik, Anne H</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Unix Secure Shell</md-title>
-<md-date>1999</md-date>
-<md-author>Carasik, Anne H</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>27843</relevance>
-<recid>content: title unix secure shell author carasik anne h</recid>
-</hit>
-<hit>
-
-<md-title>www.StopThief.net</md-title>
-<md-title-remainder>protecting your identity on the Web</md-title-remainder>
-<md-date>1999</md-date>
-<md-author>Marcella, Albert J</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>www.StopThief.net</md-title>
-<md-title-remainder>protecting your identity on the Web</md-title-remainder>
-<md-date>1999</md-date>
-<md-author>Marcella, Albert J</md-author></location>
-<relevance>27843</relevance>
-<recid>content: title www stopthief net author marcella albert j</recid>
-</hit>
-<hit>
-
-<md-title>Eight International Conference on Computer Communications and Networks</md-title>
-<md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
-<md-date>1999</md-date>
-<md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Eight International Conference on Computer Communications and Networks</md-title>
-<md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
-<md-date>1999</md-date>
-<md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description></location>
-<relevance>26297</relevance>
-<recid>content: title eight international conference on computer communications and networks</recid>
-</hit>
-<hit>
-
-<md-title>Building storage networks</md-title>
-<md-date>2000</md-date>
-<md-author>Farley, Marc</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Building storage networks</md-title>
-<md-date>2000</md-date>
-<md-author>Farley, Marc</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>24750</relevance>
-<recid>content: title building storage networks author farley marc</recid>
-</hit>
-<hit>
-
-<md-title>Complete CL</md-title>
-<md-title-remainder>the definitive control language programming guide</md-title-remainder>
-<md-date>1999</md-date>
-<md-author>Malaga, Ernie</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Complete CL</md-title>
-<md-title-remainder>the definitive control language programming guide</md-title-remainder>
-<md-date>1999</md-date>
-<md-author>Malaga, Ernie</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>24750</relevance>
-<recid>content: title complete cl author malaga ernie</recid>
-</hit>
-</show>
\ No newline at end of file
+<search><status>OK</status></search>
\ No newline at end of file
index ab63fe6..b568275 100644 (file)
@@ -1,2 +1,58 @@
 <?xml version="1.0" encoding="UTF-8"?>
-<search><status>OK</status></search>
\ No newline at end of file
+<show><status>OK</status>
+<activeclients>0</activeclients>
+<merged>4</merged>
+<total>10</total>
+<approximation>4</approximation>
+<start>0</start>
+<num>4</num>
+<hit>
+
+<md-title>Computer science &amp; technology</md-title>
+<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
+<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
+<md-title>Computer science &amp; technology</md-title>
+<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
+<md-date>1977</md-date>
+<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
+<relevance>57536</relevance>
+<recid>content: title computer science technology</recid>
+</hit>
+<hit>
+
+<md-title>The Computer Bible</md-title>
+<md-date>1973-1980</md-date>
+<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description><location id="Target-1" name="ztest-db1">
+<md-title>The Computer Bible</md-title>
+<md-date>1973-1980</md-date>
+<md-description>Hebrew and Greek; introductions in English</md-description>
+<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description>
+<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
+<relevance>57536</relevance>
+<recid>content: title the computer bible</recid>
+</hit>
+<hit>
+
+<md-title>The use of passwords for controlled access to computer resources</md-title>
+<md-date>1977</md-date>
+<md-author>Wood, Helen M</md-author><location id="Target-1" name="ztest-db1">
+<md-title>The use of passwords for controlled access to computer resources</md-title>
+<md-date>1977</md-date>
+<md-author>Wood, Helen M</md-author>
+<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
+<relevance>17260</relevance>
+<recid>content: title the use of passwords for controlled access to computer resources author wood helen m</recid>
+</hit>
+<hit>
+
+<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
+<md-title-remainder>proceedings of the workshop</md-title-remainder>
+<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
+<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
+<md-title-remainder>proceedings of the workshop</md-title-remainder>
+<md-date>1977</md-date>
+<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
+<relevance>0</relevance>
+<recid>content: title reconstruction tomography in diagnostic radiology and nuclear medicine</recid>
+</hit>
+</show>
\ No newline at end of file
index e1a4919..49ad793 100644 (file)
@@ -1,57 +1,30 @@
 <?xml version="1.0" encoding="UTF-8"?>
-<show><status>OK</status>
-<activeclients>0</activeclients>
-<merged>4</merged>
-<total>2025</total>
-<start>0</start>
-<num>4</num>
-<hit>
-
-<md-title>Computer science &amp; technology</md-title>
-<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
-<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
-<md-title>Computer science &amp; technology</md-title>
-<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
-<md-date>1977</md-date>
-<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>57536</relevance>
-<recid>content: title computer science technology</recid>
-</hit>
-<hit>
-
-<md-title>The Computer Bible</md-title>
-<md-date>1973-1980</md-date>
-<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description><location id="Target-1" name="ztest-db1">
-<md-title>The Computer Bible</md-title>
-<md-date>1973-1980</md-date>
-<md-description>Hebrew and Greek; introductions in English</md-description>
-<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description>
-<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>57536</relevance>
-<recid>content: title the computer bible</recid>
-</hit>
-<hit>
-
-<md-title>The use of passwords for controlled access to computer resources</md-title>
-<md-date>1977</md-date>
-<md-author>Wood, Helen M</md-author><location id="Target-1" name="ztest-db1">
-<md-title>The use of passwords for controlled access to computer resources</md-title>
-<md-date>1977</md-date>
-<md-author>Wood, Helen M</md-author>
-<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>17260</relevance>
-<recid>content: title the use of passwords for controlled access to computer resources author wood helen m</recid>
-</hit>
-<hit>
-
-<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
-<md-title-remainder>proceedings of the workshop</md-title-remainder>
-<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
-<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
-<md-title-remainder>proceedings of the workshop</md-title-remainder>
-<md-date>1977</md-date>
-<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>0</relevance>
-<recid>content: title reconstruction tomography in diagnostic radiology and nuclear medicine</recid>
-</hit>
-</show>
\ No newline at end of file
+<termlist><activeclients>0</activeclients>
+<list name="date">
+<term><name>1977</name><frequency>3</frequency></term>
+<term><name>1973</name><frequency>1</frequency></term>
+<term><name>1980</name><frequency>1</frequency></term>
+</list>
+<list name="subject">
+<term><name>Bible</name><frequency>1</frequency></term>
+<term><name>Bible. O.T</name><frequency>1</frequency></term>
+<term><name>Computers</name><frequency>1</frequency></term>
+<term><name>Optical pattern recognition</name><frequency>1</frequency></term>
+<term><name>Tomography</name><frequency>1</frequency></term>
+</list>
+<list name="author">
+<term><name>Wood, Helen M</name><frequency>1</frequency></term>
+</list>
+<list name="xtargets">
+<term>
+<id>Target-1</id>
+<name>ztest-db1</name>
+<frequency>10</frequency>
+<approximation>4</approximation>
+<records>4</records>
+<filtered>6</filtered>
+<state>Client_Idle</state>
+<diagnostic>0</diagnostic>
+</term>
+</list>
+</termlist>
\ No newline at end of file
diff --git a/test/test_limit_limitmap_32.res b/test/test_limit_limitmap_32.res
new file mode 100644 (file)
index 0000000..b568275
--- /dev/null
@@ -0,0 +1,58 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<show><status>OK</status>
+<activeclients>0</activeclients>
+<merged>4</merged>
+<total>10</total>
+<approximation>4</approximation>
+<start>0</start>
+<num>4</num>
+<hit>
+
+<md-title>Computer science &amp; technology</md-title>
+<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
+<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
+<md-title>Computer science &amp; technology</md-title>
+<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
+<md-date>1977</md-date>
+<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
+<relevance>57536</relevance>
+<recid>content: title computer science technology</recid>
+</hit>
+<hit>
+
+<md-title>The Computer Bible</md-title>
+<md-date>1973-1980</md-date>
+<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description><location id="Target-1" name="ztest-db1">
+<md-title>The Computer Bible</md-title>
+<md-date>1973-1980</md-date>
+<md-description>Hebrew and Greek; introductions in English</md-description>
+<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description>
+<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
+<relevance>57536</relevance>
+<recid>content: title the computer bible</recid>
+</hit>
+<hit>
+
+<md-title>The use of passwords for controlled access to computer resources</md-title>
+<md-date>1977</md-date>
+<md-author>Wood, Helen M</md-author><location id="Target-1" name="ztest-db1">
+<md-title>The use of passwords for controlled access to computer resources</md-title>
+<md-date>1977</md-date>
+<md-author>Wood, Helen M</md-author>
+<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
+<relevance>17260</relevance>
+<recid>content: title the use of passwords for controlled access to computer resources author wood helen m</recid>
+</hit>
+<hit>
+
+<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
+<md-title-remainder>proceedings of the workshop</md-title-remainder>
+<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
+<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
+<md-title-remainder>proceedings of the workshop</md-title-remainder>
+<md-date>1977</md-date>
+<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
+<relevance>0</relevance>
+<recid>content: title reconstruction tomography in diagnostic radiology and nuclear medicine</recid>
+</hit>
+</show>
\ No newline at end of file
diff --git a/test/test_limit_limitmap_33.res b/test/test_limit_limitmap_33.res
new file mode 100644 (file)
index 0000000..49ad793
--- /dev/null
@@ -0,0 +1,30 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<termlist><activeclients>0</activeclients>
+<list name="date">
+<term><name>1977</name><frequency>3</frequency></term>
+<term><name>1973</name><frequency>1</frequency></term>
+<term><name>1980</name><frequency>1</frequency></term>
+</list>
+<list name="subject">
+<term><name>Bible</name><frequency>1</frequency></term>
+<term><name>Bible. O.T</name><frequency>1</frequency></term>
+<term><name>Computers</name><frequency>1</frequency></term>
+<term><name>Optical pattern recognition</name><frequency>1</frequency></term>
+<term><name>Tomography</name><frequency>1</frequency></term>
+</list>
+<list name="author">
+<term><name>Wood, Helen M</name><frequency>1</frequency></term>
+</list>
+<list name="xtargets">
+<term>
+<id>Target-1</id>
+<name>ztest-db1</name>
+<frequency>10</frequency>
+<approximation>4</approximation>
+<records>4</records>
+<filtered>6</filtered>
+<state>Client_Idle</state>
+<diagnostic>0</diagnostic>
+</term>
+</list>
+</termlist>
\ No newline at end of file