From e5f6d1c95b99e5716f47765f2c131e415ab6b7ce Mon Sep 17 00:00:00 2001 From: Dennis Schafroth Date: Tue, 22 May 2012 09:24:45 +0000 Subject: [PATCH] Update tests for limit maps --- test/test_limit_limitmap.urls | 7 +- test/test_limit_limitmap_27.res | 22 +--- test/test_limit_limitmap_28.res | 25 +++- test/test_limit_limitmap_29.res | 262 +-------------------------------------- test/test_limit_limitmap_30.res | 58 ++++++++- test/test_limit_limitmap_31.res | 85 +++++-------- test/test_limit_limitmap_32.res | 58 +++++++++ test/test_limit_limitmap_33.res | 30 +++++ 8 files changed, 206 insertions(+), 341 deletions(-) create mode 100644 test/test_limit_limitmap_32.res create mode 100644 test/test_limit_limitmap_33.res diff --git a/test/test_limit_limitmap.urls b/test/test_limit_limitmap.urls index e40b12d..a56d6c1 100644 --- a/test/test_limit_limitmap.urls +++ b/test/test_limit_limitmap.urls @@ -23,4 +23,9 @@ test_limit_limitmap_settings_4.xml http://localhost:9763/search.pz2?session=1&co http://localhost:9763/search.pz2?session=1&command=search&query=computer&limit=Mysubject%3DRailroads 1 http://localhost:9763/search.pz2?session=1&command=show&block=1 http://localhost:9763/search.pz2?session=1&command=search&query=computer&limit=date%3D1977 -http://localhost:9763/search.pz2?session=1&command=show&block=1 +1 http://localhost:9763/search.pz2?session=1&command=show&block=1 +http://localhost:9763/search.pz2?session=1&command=search&query=computer&limit=Mysubject%3DRailroads +1 http://localhost:9763/search.pz2?session=1&command=show&block=1&version=2 +http://localhost:9763/search.pz2?session=1&command=search&query=computer&limit=date%3D1977 +http://localhost:9763/search.pz2?session=1&command=show&block=1&version=2 +http://localhost:9763/search.pz2?session=1&command=termlist&block=1&version=2 diff --git a/test/test_limit_limitmap_27.res b/test/test_limit_limitmap_27.res index 101bb60..ab63fe6 100644 --- a/test/test_limit_limitmap_27.res +++ b/test/test_limit_limitmap_27.res @@ -1,22 +1,2 @@ -OK -0 -1 -1 -0 -1 - - -The religious teachers of Greece -1972 -Adam, James -Reprint of the 1909 ed., which was issued as the 1904-1906 Gifford lectures -The religious teachers of Greece -1972 -Adam, James -Reprint of the 1909 ed., which was issued as the 1904-1906 Gifford lectures -XXXXXXXXXX -420000 -content: title the religious teachers of greece author adam james - - \ No newline at end of file +OK \ No newline at end of file diff --git a/test/test_limit_limitmap_28.res b/test/test_limit_limitmap_28.res index ab63fe6..60b3c70 100644 --- a/test/test_limit_limitmap_28.res +++ b/test/test_limit_limitmap_28.res @@ -1,2 +1,25 @@ -OK \ No newline at end of file +OK +0 +1 +2025 +1 +0 +1 + + +Washington metropolitan area rail computer feasibility study; +final report +1971 +Englund, Carl R +"Contract DOT-UT-10003." +Washington metropolitan area rail computer feasibility study; +final report +1971 +Englund, Carl R +"Contract DOT-UT-10003." +XXXXXXXXXX +85714 +content: title washington metropolitan area rail computer feasibility study author englund carl r + + \ No newline at end of file diff --git a/test/test_limit_limitmap_29.res b/test/test_limit_limitmap_29.res index 7d1c254..ab63fe6 100644 --- a/test/test_limit_limitmap_29.res +++ b/test/test_limit_limitmap_29.res @@ -1,262 +1,2 @@ -OK -1 -100 -2015 -0 -20 - - -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -37125 -content: title adobe illustrator for the mac author woodward c michael - - - -Advanced computer performance modeling and simulation -1998 -Advanced computer performance modeling and simulation -1998 -37125 -content: title advanced computer performance modeling and simulation - - - -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -37125 -content: title cyberterrorism and computer crimes author aldrich richard w - - - -Computer interfacing -2000 -Smith, George A -Computer interfacing -2000 -Smith, George A -34031 -content: title computer interfacing author smith george a - - - -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -34031 -content: title software design and usability author kaasgaard klaus - - - -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -32544 -content: title everything you need to know about the dangers of computer hacking author knittel john - - - -Computer peripherals -1995 -Cook, Barry M -Computer peripherals -1995 -Cook, Barry M -32484 -content: title computer peripherals author cook barry m - - - -Kids' computer book -1994 -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -Kids' computer book -1994 -"For kids and their parents"--Cover -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -28531 -content: title kids computer book - - - -Computer friendly -1999 -Steinbacher, Raymond -Computer friendly -1999 -Steinbacher, Raymond -27843 -content: title computer friendly author steinbacher raymond - - - -Computer misuse -1999 -"Also published as Parliamentary Paper E 31AO"--T.p. verso -Computer misuse -1999 -"May 1999." -"NZLC R54"--T.p. verso -"Also published as Parliamentary Paper E 31AO"--T.p. verso -27843 -content: title computer misuse - - - -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -27843 -content: title computer networking author ross keith w - - - -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -27843 -content: title coreldraw for windows author davis phyllis - - - -Quicken 2001 Deluxe for Macintosh -the official guide -2001 -Langer, Maria -Includes index -Quicken 2001 Deluxe for Macintosh -the official guide -2001 -Langer, Maria -Includes index -27843 -content: title quicken deluxe for macintosh author langer maria - - - -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -"Covers Quicken deluxe 2000 for the Mac"--Cover -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -Includes index -"Covers Quicken deluxe 2000 for the Mac"--Cover -27843 -content: title quicken for the mac author langer maria - - - -Sicherheit und Schutz im Netz -1998 -Sicherheit und Schutz im Netz -1998 -27843 -content: title sicherheit und schutz im netz - - - -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -27843 -content: title unix secure shell author carasik anne h - - - -www.StopThief.net -protecting your identity on the Web -1999 -Marcella, Albert J -www.StopThief.net -protecting your identity on the Web -1999 -Marcella, Albert J -27843 -content: title www stopthief net author marcella albert j - - - -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -26297 -content: title eight international conference on computer communications and networks - - - -Building storage networks -2000 -Farley, Marc -Includes index -Building storage networks -2000 -Farley, Marc -Includes index -24750 -content: title building storage networks author farley marc - - - -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -24750 -content: title complete cl author malaga ernie - - \ No newline at end of file +OK \ No newline at end of file diff --git a/test/test_limit_limitmap_30.res b/test/test_limit_limitmap_30.res index ab63fe6..b568275 100644 --- a/test/test_limit_limitmap_30.res +++ b/test/test_limit_limitmap_30.res @@ -1,2 +1,58 @@ -OK \ No newline at end of file +OK +0 +4 +10 +4 +0 +4 + + +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +XXXXXXXXXX +57536 +content: title computer science technology + + + +The Computer Bible +1973-1980 +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +The Computer Bible +1973-1980 +Hebrew and Greek; introductions in English +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +XXXXXXXXXX +57536 +content: title the computer bible + + + +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +XXXXXXXXXX +17260 +content: title the use of passwords for controlled access to computer resources author wood helen m + + + +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +XXXXXXXXXX +0 +content: title reconstruction tomography in diagnostic radiology and nuclear medicine + + \ No newline at end of file diff --git a/test/test_limit_limitmap_31.res b/test/test_limit_limitmap_31.res index e1a4919..49ad793 100644 --- a/test/test_limit_limitmap_31.res +++ b/test/test_limit_limitmap_31.res @@ -1,57 +1,30 @@ -OK -0 -4 -2025 -0 -4 - - -Computer science & technology -proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 -1977 -Computer science & technology -proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 -1977 -XXXXXXXXXX -57536 -content: title computer science technology - - - -The Computer Bible -1973-1980 -Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates -The Computer Bible -1973-1980 -Hebrew and Greek; introductions in English -Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates -XXXXXXXXXX -57536 -content: title the computer bible - - - -The use of passwords for controlled access to computer resources -1977 -Wood, Helen M -The use of passwords for controlled access to computer resources -1977 -Wood, Helen M -XXXXXXXXXX -17260 -content: title the use of passwords for controlled access to computer resources author wood helen m - - - -Reconstruction tomography in diagnostic radiology and nuclear medicine -proceedings of the workshop -1977 -Reconstruction tomography in diagnostic radiology and nuclear medicine -proceedings of the workshop -1977 -XXXXXXXXXX -0 -content: title reconstruction tomography in diagnostic radiology and nuclear medicine - - \ No newline at end of file +0 + +19773 +19731 +19801 + + +Bible1 +Bible. O.T1 +Computers1 +Optical pattern recognition1 +Tomography1 + + +Wood, Helen M1 + + + +Target-1 +ztest-db1 +10 +4 +4 +6 +Client_Idle +0 + + + \ No newline at end of file diff --git a/test/test_limit_limitmap_32.res b/test/test_limit_limitmap_32.res new file mode 100644 index 0000000..b568275 --- /dev/null +++ b/test/test_limit_limitmap_32.res @@ -0,0 +1,58 @@ + +OK +0 +4 +10 +4 +0 +4 + + +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +XXXXXXXXXX +57536 +content: title computer science technology + + + +The Computer Bible +1973-1980 +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +The Computer Bible +1973-1980 +Hebrew and Greek; introductions in English +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +XXXXXXXXXX +57536 +content: title the computer bible + + + +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +XXXXXXXXXX +17260 +content: title the use of passwords for controlled access to computer resources author wood helen m + + + +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +XXXXXXXXXX +0 +content: title reconstruction tomography in diagnostic radiology and nuclear medicine + + \ No newline at end of file diff --git a/test/test_limit_limitmap_33.res b/test/test_limit_limitmap_33.res new file mode 100644 index 0000000..49ad793 --- /dev/null +++ b/test/test_limit_limitmap_33.res @@ -0,0 +1,30 @@ + +0 + +19773 +19731 +19801 + + +Bible1 +Bible. O.T1 +Computers1 +Optical pattern recognition1 +Tomography1 + + +Wood, Helen M1 + + + +Target-1 +ztest-db1 +10 +4 +4 +6 +Client_Idle +0 + + + \ No newline at end of file -- 1.7.10.4