Allow predictable sessions PAZ-1030
[pazpar2-moved-to-github.git] / test / test_limit_limitmap_9.res
1 <?xml version="1.0" encoding="UTF-8"?>
2 <show><status>OK</status>
3 <activeclients>0</activeclients>
4 <merged>109</merged>
5 <total>2025</total>
6 <start>0</start>
7 <num>20</num>
8 <hit>
9  <md-title>Adobe Illustrator for the Mac</md-title>
10  <md-title-remainder>fast &amp; easy</md-title-remainder>
11  <md-date>2001</md-date>
12  <md-author>Woodward, C. Michael</md-author>
13  <location id="Target-2"
14     name="LOC-SOLR" checksum="739120627">
15   <md-title>Adobe Illustrator for the Mac</md-title>
16   <md-title-remainder>fast &amp; easy</md-title-remainder>
17   <md-date>2001</md-date>
18   <md-author>Woodward, C. Michael</md-author>
19  </location>
20  <count>1</count>
21  <relevance>50734</relevance>
22  <recid>content: title adobe illustrator for the mac author woodward c michael</recid>
23 </hit>
24 <hit>
25  <md-title>Advanced computer performance modeling and simulation</md-title>
26  <md-date>1998</md-date>
27  <location id="Target-2"
28     name="LOC-SOLR" checksum="3541567482">
29   <md-title>Advanced computer performance modeling and simulation</md-title>
30   <md-date>1998</md-date>
31  </location>
32  <count>1</count>
33  <relevance>50734</relevance>
34  <recid>content: title advanced computer performance modeling and simulation</recid>
35 </hit>
36 <hit>
37  <md-title>Cyberterrorism and computer crimes</md-title>
38  <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
39  <md-date>2000</md-date>
40  <md-author>Aldrich, Richard W</md-author>
41  <md-description>&quot;April 2000.&quot;</md-description>
42  <location id="Target-2"
43     name="LOC-SOLR" checksum="4100786124">
44   <md-title>Cyberterrorism and computer crimes</md-title>
45   <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
46   <md-date>2000</md-date>
47   <md-author>Aldrich, Richard W</md-author>
48   <md-description>&quot;April 2000.&quot;</md-description>
49  </location>
50  <count>1</count>
51  <relevance>50734</relevance>
52  <recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
53 </hit>
54 <hit>
55  <md-title>Software design and usability</md-title>
56  <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
57  <md-date>2000</md-date>
58  <md-author>Kaasgaard, Klaus</md-author>
59  <location id="Target-2"
60     name="LOC-SOLR" checksum="552714413">
61   <md-title>Software design and usability</md-title>
62   <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
63   <md-date>2000</md-date>
64   <md-author>Kaasgaard, Klaus</md-author>
65  </location>
66  <count>1</count>
67  <relevance>46506</relevance>
68  <recid>content: title software design and usability author kaasgaard klaus</recid>
69 </hit>
70 <hit>
71  <md-title>Everything you need to know about the dangers of computer hacking</md-title>
72  <md-date>2000</md-date>
73  <md-author>Knittel, John</md-author>
74  <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description>
75  <location id="Target-2"
76     name="LOC-SOLR" checksum="1672422426">
77   <md-title>Everything you need to know about the dangers of computer hacking</md-title>
78   <md-date>2000</md-date>
79   <md-author>Knittel, John</md-author>
80   <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description>
81  </location>
82  <count>1</count>
83  <relevance>44474</relevance>
84  <recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
85 </hit>
86 <hit>
87  <md-title>Computer peripherals</md-title>
88  <md-date>1995</md-date>
89  <md-author>Cook, Barry M</md-author>
90  <location id="Target-2"
91     name="LOC-SOLR" checksum="550172955">
92   <md-title>Computer peripherals</md-title>
93   <md-date>1995</md-date>
94   <md-author>Cook, Barry M</md-author>
95  </location>
96  <count>1</count>
97  <relevance>44392</relevance>
98  <recid>content: title computer peripherals author cook barry m</recid>
99 </hit>
100 <hit>
101  <md-title>Kids&apos; computer book</md-title>
102  <md-date>1994</md-date>
103  <md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description>
104  <location id="Target-2"
105     name="LOC-SOLR" checksum="2419318011">
106   <md-title>Kids&apos; computer book</md-title>
107   <md-date>1994</md-date>
108   <md-description>&quot;For kids and their parents&quot;--Cover</md-description>
109   <md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description>
110  </location>
111  <count>1</count>
112  <relevance>38990</relevance>
113  <recid>content: title kids computer book</recid>
114 </hit>
115 <hit>
116  <md-title>Computer friendly</md-title>
117  <md-date>1999</md-date>
118  <md-author>Steinbacher, Raymond</md-author>
119  <location id="Target-2"
120     name="LOC-SOLR" checksum="3353890539">
121   <md-title>Computer friendly</md-title>
122   <md-date>1999</md-date>
123   <md-author>Steinbacher, Raymond</md-author>
124  </location>
125  <count>1</count>
126  <relevance>38050</relevance>
127  <recid>content: title computer friendly author steinbacher raymond</recid>
128 </hit>
129 <hit>
130  <md-title>Computer misuse</md-title>
131  <md-date>1999</md-date>
132  <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description>
133  <location id="Target-2"
134     name="LOC-SOLR" checksum="2234182526">
135   <md-title>Computer misuse</md-title>
136   <md-date>1999</md-date>
137   <md-description>&quot;May 1999.&quot;</md-description>
138   <md-description>&quot;NZLC R54&quot;--T.p. verso</md-description>
139   <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description>
140  </location>
141  <count>1</count>
142  <relevance>38050</relevance>
143  <recid>content: title computer misuse</recid>
144 </hit>
145 <hit>
146  <md-title>Computer networking</md-title>
147  <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
148  <md-date>2001</md-date>
149  <md-author>Ross, Keith W</md-author>
150  <location id="Target-2"
151     name="LOC-SOLR" checksum="1669880968">
152   <md-title>Computer networking</md-title>
153   <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
154   <md-date>2001</md-date>
155   <md-author>Ross, Keith W</md-author>
156  </location>
157  <count>1</count>
158  <relevance>38050</relevance>
159  <recid>content: title computer networking author ross keith w</recid>
160 </hit>
161 <hit>
162  <md-title>CorelDRAW 8 for Windows</md-title>
163  <md-date>1998</md-date>
164  <md-author>Davis, Phyllis</md-author>
165  <md-description>Includes index</md-description>
166  <location id="Target-2"
167     name="LOC-SOLR" checksum="1297068540">
168   <md-title>CorelDRAW 8 for Windows</md-title>
169   <md-date>1998</md-date>
170   <md-author>Davis, Phyllis</md-author>
171   <md-description>Includes index</md-description>
172  </location>
173  <count>1</count>
174  <relevance>38050</relevance>
175  <recid>content: title coreldraw for windows author davis phyllis</recid>
176 </hit>
177 <hit>
178  <md-title>Quicken 2000 for the Mac</md-title>
179  <md-title-remainder>the official guide</md-title-remainder>
180  <md-date>2000</md-date>
181  <md-author>Langer, Maria</md-author>
182  <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description>
183  <location id="Target-2"
184     name="LOC-SOLR" checksum="2605724225">
185   <md-title>Quicken 2000 for the Mac</md-title>
186   <md-title-remainder>the official guide</md-title-remainder>
187   <md-date>2000</md-date>
188   <md-author>Langer, Maria</md-author>
189   <md-description>Includes index</md-description>
190   <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description>
191  </location>
192  <count>1</count>
193  <relevance>38050</relevance>
194  <recid>content: title quicken for the mac author langer maria</recid>
195 </hit>
196 <hit>
197  <md-title>Sicherheit und Schutz im Netz</md-title>
198  <md-date>1998</md-date>
199  <location id="Target-2"
200     name="LOC-SOLR" checksum="2604453496">
201   <md-title>Sicherheit und Schutz im Netz</md-title>
202   <md-date>1998</md-date>
203  </location>
204  <count>1</count>
205  <relevance>38050</relevance>
206  <recid>content: title sicherheit und schutz im netz</recid>
207 </hit>
208 <hit>
209  <md-title>Unix Secure Shell</md-title>
210  <md-date>1999</md-date>
211  <md-author>Carasik, Anne H</md-author>
212  <md-description>Includes index</md-description>
213  <location id="Target-2"
214     name="LOC-SOLR" checksum="3726702967">
215   <md-title>Unix Secure Shell</md-title>
216   <md-date>1999</md-date>
217   <md-author>Carasik, Anne H</md-author>
218   <md-description>Includes index</md-description>
219  </location>
220  <count>1</count>
221  <relevance>38050</relevance>
222  <recid>content: title unix secure shell author carasik anne h</recid>
223 </hit>
224 <hit>
225  <md-title>Eight International Conference on Computer Communications and Networks</md-title>
226  <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
227  <md-date>1999</md-date>
228  <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description>
229  <location id="Target-2"
230     name="LOC-SOLR" checksum="3166213596">
231   <md-title>Eight International Conference on Computer Communications and Networks</md-title>
232   <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
233   <md-date>1999</md-date>
234   <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description>
235  </location>
236  <count>1</count>
237  <relevance>35936</relevance>
238  <recid>content: title eight international conference on computer communications and networks</recid>
239 </hit>
240 <hit>
241  <md-title>Building storage networks</md-title>
242  <md-date>2000</md-date>
243  <md-author>Farley, Marc</md-author>
244  <md-description>Includes index</md-description>
245  <location id="Target-2"
246     name="LOC-SOLR" checksum="3164942867">
247   <md-title>Building storage networks</md-title>
248   <md-date>2000</md-date>
249   <md-author>Farley, Marc</md-author>
250   <md-description>Includes index</md-description>
251  </location>
252  <count>1</count>
253  <relevance>33822</relevance>
254  <recid>content: title building storage networks author farley marc</recid>
255 </hit>
256 <hit>
257  <md-title>Complete CL</md-title>
258  <md-title-remainder>the definitive control language programming guide</md-title-remainder>
259  <md-date>1999</md-date>
260  <md-author>Malaga, Ernie</md-author>
261  <md-description>Includes index</md-description>
262  <location id="Target-2"
263     name="LOC-SOLR" checksum="551443684">
264   <md-title>Complete CL</md-title>
265   <md-title-remainder>the definitive control language programming guide</md-title-remainder>
266   <md-date>1999</md-date>
267   <md-author>Malaga, Ernie</md-author>
268   <md-description>Includes index</md-description>
269  </location>
270  <count>1</count>
271  <relevance>33822</relevance>
272  <recid>content: title complete cl author malaga ernie</recid>
273 </hit>
274 <hit>
275  <md-title>3D games</md-title>
276  <md-title-remainder>real-time rendering and software technology</md-title-remainder>
277  <md-date>2001</md-date>
278  <md-author>Watt, Alan H</md-author>
279  <location id="Target-2"
280     name="LOC-SOLR" checksum="4287192338">
281   <md-title>3D games</md-title>
282   <md-title-remainder>real-time rendering and software technology</md-title-remainder>
283   <md-date>2001</md-date>
284   <md-author>Watt, Alan H</md-author>
285  </location>
286  <count>1</count>
287  <relevance>33822</relevance>
288  <recid>content: title d games author watt alan h</recid>
289 </hit>
290 <hit>
291  <md-title>Java applications strategies for the AS/400</md-title>
292  <md-date>1999</md-date>
293  <md-author>Denoncourt, Don</md-author>
294  <location id="Target-2"
295     name="LOC-SOLR" checksum="3351349081">
296   <md-title>Java applications strategies for the AS/400</md-title>
297   <md-date>1999</md-date>
298   <md-author>Denoncourt, Don</md-author>
299  </location>
300  <count>1</count>
301  <relevance>33822</relevance>
302  <recid>content: title java applications strategies for the as author denoncourt don</recid>
303 </hit>
304 <hit>
305  <md-title>Mastering algorithms with C</md-title>
306  <md-date>1999</md-date>
307  <md-author>Loudon, Kyle</md-author>
308  <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description>
309  <location id="Target-2"
310     name="LOC-SOLR" checksum="178631256">
311   <md-title>Mastering algorithms with C</md-title>
312   <md-date>1999</md-date>
313   <md-author>Loudon, Kyle</md-author>
314   <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description>
315   <md-description>Includes index</md-description>
316  </location>
317  <count>1</count>
318  <relevance>33822</relevance>
319  <recid>content: title mastering algorithms with c author loudon kyle</recid>
320 </hit>
321 </show>