From 8bb4441d47910c043a9d3d74ddb1f6f7bf05b1d2 Mon Sep 17 00:00:00 2001 From: Dennis Schafroth Date: Thu, 26 Apr 2012 11:12:14 +0000 Subject: [PATCH] Update test results --- test/test_limit_limitmap_11.res | 36 ++++----- test/test_limit_limitmap_12.res | 36 ++++----- test/test_limit_limitmap_24.res | 154 ++++++++++++++++++++------------------- test/test_limit_limitmap_9.res | 111 ++++++++++++++-------------- 4 files changed, 172 insertions(+), 165 deletions(-) diff --git a/test/test_limit_limitmap_11.res b/test/test_limit_limitmap_11.res index 94fb9e9..f758da5 100644 --- a/test/test_limit_limitmap_11.res +++ b/test/test_limit_limitmap_11.res @@ -19,42 +19,42 @@ Davis, Phyllis2 Jack Collins2 -Langer, Maria2 Norton, Peter2 Watt, Alan H2 +Abass, Olayide1 Aldrich, Richard W1 Appleman, Daniel1 Bainbridge, David I1 Caplin, Steve1 +Carasik, Anne H1 Cole, Eric1 De Jong, Kenneth A1 Dowd, Kevin1 Hodges, M. Susan1 Kaasgaard, Klaus1 -Lasser, Jon1 -Computers22 -Computer file20 -Computer networks15 -Computer science11 -Computer graphics10 +Computer file24 +Computers21 +Computer graphics13 +Computer networks13 Computer program language10 -Computer security10 -Computer crimes7 -Computer software7 +Computer science10 +Computer security9 Microsoft Windows7 -Computer6 +UNIX7 +Computer programs6 +Computer software6 Operating systems6 -Computer programs5 -Computer systems5 -UNIX5 +Computer5 +Computer crimes5 +Computer architecture4 -200048 -199920 -200114 -199811 +200047 +200120 +199916 +199810 19773 19712 19742 diff --git a/test/test_limit_limitmap_12.res b/test/test_limit_limitmap_12.res index 4bbf745..cd5c9ad 100644 --- a/test/test_limit_limitmap_12.res +++ b/test/test_limit_limitmap_12.res @@ -20,42 +20,42 @@ Davis, Phyllis2 Jack Collins2 -Langer, Maria2 Norton, Peter2 Watt, Alan H2 +Abass, Olayide1 Aldrich, Richard W1 Appleman, Daniel1 Bainbridge, David I1 Caplin, Steve1 +Carasik, Anne H1 Cole, Eric1 De Jong, Kenneth A1 Dowd, Kevin1 Hodges, M. Susan1 Kaasgaard, Klaus1 -Lasser, Jon1 -Computers22 -Computer file20 -Computer networks15 -Computer science11 -Computer graphics10 +Computer file24 +Computers21 +Computer graphics13 +Computer networks13 Computer program language10 -Computer security10 -Computer crimes7 -Computer software7 +Computer science10 +Computer security9 Microsoft Windows7 -Computer6 +UNIX7 +Computer programs6 +Computer software6 Operating systems6 -Computer programs5 -Computer systems5 -UNIX5 +Computer5 +Computer crimes5 +Computer architecture4 -200048 -199920 -200114 -199811 +200047 +200120 +199916 +199810 19773 19712 19742 diff --git a/test/test_limit_limitmap_24.res b/test/test_limit_limitmap_24.res index eb9920b..9f9ccad 100644 --- a/test/test_limit_limitmap_24.res +++ b/test/test_limit_limitmap_24.res @@ -1,7 +1,7 @@ OK 2 -40 +60 2015 0 20 @@ -57,6 +57,31 @@ +Everything you need to know about the dangers of computer hacking +2000 +Knittel, John +Explains what computer hacking is, who does it, and how dangerous it can be +Everything you need to know about the dangers of computer hacking +2000 +Knittel, John +Explains what computer hacking is, who does it, and how dangerous it can be +26979 +content: title everything you need to know about the dangers of computer hacking author knittel john + + + +Kids' computer book +1994 +Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children +Kids' computer book +1994 +"For kids and their parents"--Cover +Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children +23651 +content: title kids computer book + + + Computer friendly 1999 Steinbacher, Raymond @@ -81,6 +106,22 @@ +Quicken 2000 for the Mac +the official guide +2000 +Langer, Maria +"Covers Quicken deluxe 2000 for the Mac"--Cover +Quicken 2000 for the Mac +the official guide +2000 +Langer, Maria +Includes index +"Covers Quicken deluxe 2000 for the Mac"--Cover +23082 +content: title quicken for the mac author langer maria + + + Unix Secure Shell 1999 Carasik, Anne H @@ -94,6 +135,34 @@ +Eight International Conference on Computer Communications and Networks +proceedings, 11-13 October 1999, Boston, Massachusetts +1999 +"IEEE catalog number 99EX370"--T.p. verso +Eight International Conference on Computer Communications and Networks +proceedings, 11-13 October 1999, Boston, Massachusetts +1999 +"IEEE catalog number 99EX370"--T.p. verso +21799 +content: title eight international conference on computer communications and networks + + + +Complete CL +the definitive control language programming guide +1999 +Malaga, Ernie +Includes index +Complete CL +the definitive control language programming guide +1999 +Malaga, Ernie +Includes index +20517 +content: title complete cl author malaga ernie + + + 3D games real-time rendering and software technology 2001 @@ -107,17 +176,6 @@ -Java applications strategies for the AS/400 -1999 -Denoncourt, Don -Java applications strategies for the AS/400 -1999 -Denoncourt, Don -20517 -content: title java applications strategies for the as author denoncourt don - - - Mastering algorithms with C 1999 Loudon, Kyle @@ -152,6 +210,17 @@ +3D computer graphics +2000 +Watt, Alan H +3D computer graphics +2000 +Watt, Alan H +17952 +content: title d computer graphics author watt alan h + + + Insanely great the life and times of Macintosh, the computer that changed everything 2000 @@ -185,65 +254,4 @@ 15388 content: title hackers beware author cole eric - - -How computer programming works -2000 -Appleman, Daniel -How computer programming works -2000 -Appleman, Daniel -15388 -content: title how computer programming works author appleman daniel - - - -Icon design -2001 -Caplin, Steve -Includes index -Icon design -2001 -Caplin, Steve -Includes index -15388 -content: title icon design author caplin steve - - - -Information security architecture -2000 -Tudor, Jan Killmeyer -Information security architecture -2000 -Tudor, Jan Killmeyer -15388 -content: title information security architecture author tudor jan killmeyer - - - -Windows 2000 -design & migration -2000 -Morimoto, Rand -Includes index -Windows 2000 -design & migration -2000 -Morimoto, Rand -Includes index -15388 -content: title windows author morimoto rand - - - -The essence of computer graphics -2000 -Cooley, Peter -The essence of computer graphics -2000 -Cooley, Peter -13849 -content: title the essence of computer graphics author cooley peter - \ No newline at end of file diff --git a/test/test_limit_limitmap_9.res b/test/test_limit_limitmap_9.res index 3521921..64ca61c 100644 --- a/test/test_limit_limitmap_9.res +++ b/test/test_limit_limitmap_9.res @@ -15,7 +15,7 @@ fast & easy 2001 Woodward, C. Michael -39450 +45304 content: title adobe illustrator for the mac author woodward c michael @@ -24,7 +24,7 @@ 1998 Advanced computer performance modeling and simulation 1998 -39450 +45304 content: title advanced computer performance modeling and simulation @@ -39,22 +39,11 @@ 2000 Aldrich, Richard W "April 2000." -39450 +45304 content: title cyberterrorism and computer crimes author aldrich richard w -Computer interfacing -2000 -Smith, George A -Computer interfacing -2000 -Smith, George A -36163 -content: title computer interfacing author smith george a - - - Software design and usability talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum 2000 @@ -63,7 +52,7 @@ talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum 2000 Kaasgaard, Klaus -36163 +41529 content: title software design and usability author kaasgaard klaus @@ -76,7 +65,7 @@ 2000 Knittel, John Explains what computer hacking is, who does it, and how dangerous it can be -34583 +39715 content: title everything you need to know about the dangers of computer hacking author knittel john @@ -87,7 +76,7 @@ Computer peripherals 1995 Cook, Barry M -34519 +39641 content: title computer peripherals author cook barry m @@ -99,7 +88,7 @@ 1994 "For kids and their parents"--Cover Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -30318 +34817 content: title kids computer book @@ -110,7 +99,7 @@ Computer friendly 1999 Steinbacher, Raymond -29588 +33978 content: title computer friendly author steinbacher raymond @@ -123,7 +112,7 @@ "May 1999." "NZLC R54"--T.p. verso "Also published as Parliamentary Paper E 31AO"--T.p. verso -29588 +33978 content: title computer misuse @@ -136,7 +125,7 @@ a top-down approach featuring the Internet 2001 Ross, Keith W -29588 +33978 content: title computer networking author ross keith w @@ -149,26 +138,11 @@ 1998 Davis, Phyllis Includes index -29588 +33978 content: title coreldraw for windows author davis phyllis -Quicken 2001 Deluxe for Macintosh -the official guide -2001 -Langer, Maria -Includes index -Quicken 2001 Deluxe for Macintosh -the official guide -2001 -Langer, Maria -Includes index -29588 -content: title quicken deluxe for macintosh author langer maria - - - Quicken 2000 for the Mac the official guide 2000 @@ -180,7 +154,7 @@ Langer, Maria Includes index "Covers Quicken deluxe 2000 for the Mac"--Cover -29588 +33978 content: title quicken for the mac author langer maria @@ -189,7 +163,7 @@ 1998 Sicherheit und Schutz im Netz 1998 -29588 +33978 content: title sicherheit und schutz im netz @@ -202,24 +176,11 @@ 1999 Carasik, Anne H Includes index -29588 +33978 content: title unix secure shell author carasik anne h -www.StopThief.net -protecting your identity on the Web -1999 -Marcella, Albert J -www.StopThief.net -protecting your identity on the Web -1999 -Marcella, Albert J -29588 -content: title www stopthief net author marcella albert j - - - Eight International Conference on Computer Communications and Networks proceedings, 11-13 October 1999, Boston, Massachusetts 1999 @@ -228,7 +189,7 @@ proceedings, 11-13 October 1999, Boston, Massachusetts 1999 "IEEE catalog number 99EX370"--T.p. verso -27944 +32090 content: title eight international conference on computer communications and networks @@ -241,7 +202,7 @@ 2000 Farley, Marc Includes index -26300 +30203 content: title building storage networks author farley marc @@ -256,7 +217,45 @@ 1999 Malaga, Ernie Includes index -26300 +30203 content: title complete cl author malaga ernie + + +3D games +real-time rendering and software technology +2001 +Watt, Alan H +3D games +real-time rendering and software technology +2001 +Watt, Alan H +30203 +content: title d games author watt alan h + + + +Java applications strategies for the AS/400 +1999 +Denoncourt, Don +Java applications strategies for the AS/400 +1999 +Denoncourt, Don +30203 +content: title java applications strategies for the as author denoncourt don + + + +Mastering algorithms with C +1999 +Loudon, Kyle +"Useful techniques from sorting to encryption"--Cover +Mastering algorithms with C +1999 +Loudon, Kyle +"Useful techniques from sorting to encryption"--Cover +Includes index +30203 +content: title mastering algorithms with c author loudon kyle + \ No newline at end of file -- 1.7.10.4