Tweak rank/relevance algorithm
[pazpar2-moved-to-github.git] / test / test_limit_limitmap_30.res
1 <?xml version="1.0" encoding="UTF-8"?>
2 <show><status>OK</status>
3 <activeclients>0</activeclients>
4 <merged>4</merged>
5 <total>10</total>
6 <approximation>4</approximation>
7 <start>0</start>
8 <num>4</num>
9 <hit>
10
11 <md-title>Computer science &amp; technology</md-title>
12 <md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
13 <md-date>1977</md-date><location id="Target-1"
14  name="ztest-db1" checksum="1487286940">
15 <md-title>Computer science &amp; technology</md-title>
16 <md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
17 <md-date>1977</md-date>
18 <md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
19 <relevance>102165</relevance>
20 <recid>content: title computer science technology</recid>
21 </hit>
22 <hit>
23
24 <md-title>The Computer Bible</md-title>
25 <md-date>1973-1980</md-date>
26 <md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description><location id="Target-1"
27  name="ztest-db1" checksum="3541567481">
28 <md-title>The Computer Bible</md-title>
29 <md-date>1973-1980</md-date>
30 <md-description>Hebrew and Greek; introductions in English</md-description>
31 <md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description>
32 <md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
33 <relevance>102165</relevance>
34 <recid>content: title the computer bible</recid>
35 </hit>
36 <hit>
37
38 <md-title>The use of passwords for controlled access to computer resources</md-title>
39 <md-date>1977</md-date>
40 <md-author>Wood, Helen M</md-author><location id="Target-1"
41  name="ztest-db1" checksum="2234182525">
42 <md-title>The use of passwords for controlled access to computer resources</md-title>
43 <md-date>1977</md-date>
44 <md-author>Wood, Helen M</md-author>
45 <md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
46 <relevance>30649</relevance>
47 <recid>content: title the use of passwords for controlled access to computer resources author wood helen m</recid>
48 </hit>
49 <hit>
50
51 <md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
52 <md-title-remainder>proceedings of the workshop</md-title-remainder>
53 <md-date>1977</md-date><location id="Target-1"
54  name="ztest-db1" checksum="740391355">
55 <md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
56 <md-title-remainder>proceedings of the workshop</md-title-remainder>
57 <md-date>1977</md-date>
58 <md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
59 <relevance>0</relevance>
60 <recid>content: title reconstruction tomography in diagnostic radiology and nuclear medicine</recid>
61 </hit>
62 </show>