Allow predictable sessions PAZ-1030
[pazpar2-moved-to-github.git] / test / test_limit_limitmap_26.res
1 <?xml version="1.0" encoding="UTF-8"?>
2 <show><status>OK</status>
3 <activeclients>0</activeclients>
4 <merged>4</merged>
5 <total>10</total>
6 <start>0</start>
7 <num>4</num>
8 <hit>
9  <md-title>Computer science &amp; technology</md-title>
10  <md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
11  <md-date>1977</md-date>
12  <location id="Target-1"
13     name="ztest-db1" checksum="1487286940">
14   <md-title>Computer science &amp; technology</md-title>
15   <md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
16   <md-date>1977</md-date>
17   <md-test-usersetting>XXXXXXXXXX</md-test-usersetting>
18  </location>
19  <count>1</count>
20  <relevance>102165</relevance>
21  <recid>content: title computer science technology</recid>
22 </hit>
23 <hit>
24  <md-title>The Computer Bible</md-title>
25  <md-date>1973-1980</md-date>
26  <md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description>
27  <location id="Target-1"
28     name="ztest-db1" checksum="3541567481">
29   <md-title>The Computer Bible</md-title>
30   <md-date>1973-1980</md-date>
31   <md-description>Hebrew and Greek; introductions in English</md-description>
32   <md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description>
33   <md-test-usersetting>XXXXXXXXXX</md-test-usersetting>
34  </location>
35  <count>1</count>
36  <relevance>102165</relevance>
37  <recid>content: title the computer bible</recid>
38 </hit>
39 <hit>
40  <md-title>The use of passwords for controlled access to computer resources</md-title>
41  <md-date>1977</md-date>
42  <md-author>Wood, Helen M</md-author>
43  <location id="Target-1"
44     name="ztest-db1" checksum="2234182525">
45   <md-title>The use of passwords for controlled access to computer resources</md-title>
46   <md-date>1977</md-date>
47   <md-author>Wood, Helen M</md-author>
48   <md-test-usersetting>XXXXXXXXXX</md-test-usersetting>
49  </location>
50  <count>1</count>
51  <relevance>30649</relevance>
52  <recid>content: title the use of passwords for controlled access to computer resources author wood helen m</recid>
53 </hit>
54 <hit>
55  <md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
56  <md-title-remainder>proceedings of the workshop</md-title-remainder>
57  <md-date>1977</md-date>
58  <location id="Target-1"
59     name="ztest-db1" checksum="740391355">
60   <md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
61   <md-title-remainder>proceedings of the workshop</md-title-remainder>
62   <md-date>1977</md-date>
63   <md-test-usersetting>XXXXXXXXXX</md-test-usersetting>
64  </location>
65  <count>1</count>
66  <relevance>0</relevance>
67  <recid>content: title reconstruction tomography in diagnostic radiology and nuclear medicine</recid>
68 </hit>
69 </show>