Tweak rank/relevance algorithm
[pazpar2-moved-to-github.git] / test / test_termlist_block_9.res
1 <?xml version="1.0" encoding="UTF-8"?>
2 <show><status>OK</status>
3 <activeclients>0</activeclients>
4 <merged>100</merged>
5 <total>2015</total>
6 <start>0</start>
7 <num>20</num>
8 <hit>
9
10 <md-title>Adobe Illustrator for the Mac</md-title>
11 <md-title-remainder>fast &amp; easy</md-title-remainder>
12 <md-date>2001</md-date>
13 <md-author>Woodward, C. Michael</md-author><location id="id_solr"
14  name="LOC (SOLR)" checksum="1471384697">
15 <md-title>Adobe Illustrator for the Mac</md-title>
16 <md-title-remainder>fast &amp; easy</md-title-remainder>
17 <md-date>2001</md-date>
18 <md-author>Woodward, C. Michael</md-author></location>
19 <relevance>49512</relevance>
20 <recid>content: title adobe illustrator for the mac author woodward c michael</recid>
21 </hit>
22 <hit>
23
24 <md-title>Advanced computer performance modeling and simulation</md-title>
25 <md-date>1998</md-date><location id="id_solr"
26  name="LOC (SOLR)" checksum="3924860916">
27 <md-title>Advanced computer performance modeling and simulation</md-title>
28 <md-date>1998</md-date></location>
29 <relevance>49512</relevance>
30 <recid>content: title advanced computer performance modeling and simulation</recid>
31 </hit>
32 <hit>
33
34 <md-title>Cyberterrorism and computer crimes</md-title>
35 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
36 <md-date>2000</md-date>
37 <md-author>Aldrich, Richard W</md-author>
38 <md-description>&quot;April 2000.&quot;</md-description><location id="id_solr"
39  name="LOC (SOLR)" checksum="2501955422">
40 <md-title>Cyberterrorism and computer crimes</md-title>
41 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
42 <md-date>2000</md-date>
43 <md-author>Aldrich, Richard W</md-author>
44 <md-description>&quot;April 2000.&quot;</md-description></location>
45 <relevance>49512</relevance>
46 <recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
47 </hit>
48 <hit>
49
50 <md-title>Software design and usability</md-title>
51 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
52 <md-date>2000</md-date>
53 <md-author>Kaasgaard, Klaus</md-author><location id="id_solr"
54  name="LOC (SOLR)" checksum="514030763">
55 <md-title>Software design and usability</md-title>
56 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
57 <md-date>2000</md-date>
58 <md-author>Kaasgaard, Klaus</md-author></location>
59 <relevance>45386</relevance>
60 <recid>content: title software design and usability author kaasgaard klaus</recid>
61 </hit>
62 <hit>
63
64 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
65 <md-date>2000</md-date>
66 <md-author>Knittel, John</md-author>
67 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="id_solr"
68  name="LOC (SOLR)" checksum="440813972">
69 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
70 <md-date>2000</md-date>
71 <md-author>Knittel, John</md-author>
72 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description></location>
73 <relevance>43403</relevance>
74 <recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
75 </hit>
76 <hit>
77
78 <md-title>Computer peripherals</md-title>
79 <md-date>1995</md-date>
80 <md-author>Cook, Barry M</md-author><location id="id_solr"
81  name="LOC (SOLR)" checksum="3558776961">
82 <md-title>Computer peripherals</md-title>
83 <md-date>1995</md-date>
84 <md-author>Cook, Barry M</md-author></location>
85 <relevance>43323</relevance>
86 <recid>content: title computer peripherals author cook barry m</recid>
87 </hit>
88 <hit>
89
90 <md-title>Kids&apos; computer book</md-title>
91 <md-date>1994</md-date>
92 <md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description><location id="id_solr"
93  name="LOC (SOLR)" checksum="2747856609">
94 <md-title>Kids&apos; computer book</md-title>
95 <md-date>1994</md-date>
96 <md-description>&quot;For kids and their parents&quot;--Cover</md-description>
97 <md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description></location>
98 <relevance>38051</relevance>
99 <recid>content: title kids computer book</recid>
100 </hit>
101 <hit>
102
103 <md-title>Computer friendly</md-title>
104 <md-date>1999</md-date>
105 <md-author>Steinbacher, Raymond</md-author><location id="id_solr"
106  name="LOC (SOLR)" checksum="194912785">
107 <md-title>Computer friendly</md-title>
108 <md-date>1999</md-date>
109 <md-author>Steinbacher, Raymond</md-author></location>
110 <relevance>37134</relevance>
111 <recid>content: title computer friendly author steinbacher raymond</recid>
112 </hit>
113 <hit>
114
115 <md-title>Computer misuse</md-title>
116 <md-date>1999</md-date>
117 <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description><location id="id_solr"
118  name="LOC (SOLR)" checksum="268129576">
119 <md-title>Computer misuse</md-title>
120 <md-date>1999</md-date>
121 <md-description>&quot;May 1999.&quot;</md-description>
122 <md-description>&quot;NZLC R54&quot;--T.p. verso</md-description>
123 <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description></location>
124 <relevance>37134</relevance>
125 <recid>content: title computer misuse</recid>
126 </hit>
127 <hit>
128
129 <md-title>Computer networking</md-title>
130 <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
131 <md-date>2001</md-date>
132 <md-author>Ross, Keith W</md-author><location id="id_solr"
133  name="LOC (SOLR)" checksum="3485560170">
134 <md-title>Computer networking</md-title>
135 <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
136 <md-date>2001</md-date>
137 <md-author>Ross, Keith W</md-author></location>
138 <relevance>37134</relevance>
139 <recid>content: title computer networking author ross keith w</recid>
140 </hit>
141 <hit>
142
143 <md-title>CorelDRAW 8 for Windows</md-title>
144 <md-date>1998</md-date>
145 <md-author>Davis, Phyllis</md-author>
146 <md-description>Includes index</md-description><location id="id_solr"
147  name="LOC (SOLR)" checksum="1570852302">
148 <md-title>CorelDRAW 8 for Windows</md-title>
149 <md-date>1998</md-date>
150 <md-author>Davis, Phyllis</md-author>
151 <md-description>Includes index</md-description></location>
152 <relevance>37134</relevance>
153 <recid>content: title coreldraw for windows author davis phyllis</recid>
154 </hit>
155 <hit>
156
157 <md-title>Quicken 2000 for the Mac</md-title>
158 <md-title-remainder>the official guide</md-title-remainder>
159 <md-date>2000</md-date>
160 <md-author>Langer, Maria</md-author>
161 <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description><location id="id_solr"
162  name="LOC (SOLR)" checksum="3705210543">
163 <md-title>Quicken 2000 for the Mac</md-title>
164 <md-title-remainder>the official guide</md-title-remainder>
165 <md-date>2000</md-date>
166 <md-author>Langer, Maria</md-author>
167 <md-description>Includes index</md-description>
168 <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description></location>
169 <relevance>37134</relevance>
170 <recid>content: title quicken for the mac author langer maria</recid>
171 </hit>
172 <hit>
173
174 <md-title>Sicherheit und Schutz im Netz</md-title>
175 <md-date>1998</md-date><location id="id_solr"
176  name="LOC (SOLR)" checksum="932616346">
177 <md-title>Sicherheit und Schutz im Netz</md-title>
178 <md-date>1998</md-date></location>
179 <relevance>37134</relevance>
180 <recid>content: title sicherheit und schutz im netz</recid>
181 </hit>
182 <hit>
183
184 <md-title>Unix Secure Shell</md-title>
185 <md-date>1999</md-date>
186 <md-author>Carasik, Anne H</md-author>
187 <md-description>Includes index</md-description><location id="id_solr"
188  name="LOC (SOLR)" checksum="2109620653">
189 <md-title>Unix Secure Shell</md-title>
190 <md-date>1999</md-date>
191 <md-author>Carasik, Anne H</md-author>
192 <md-description>Includes index</md-description></location>
193 <relevance>37134</relevance>
194 <recid>content: title unix secure shell author carasik anne h</recid>
195 </hit>
196 <hit>
197
198 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
199 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
200 <md-date>1999</md-date>
201 <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description><location id="id_solr"
202  name="LOC (SOLR)" checksum="759931950">
203 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
204 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
205 <md-date>1999</md-date>
206 <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description></location>
207 <relevance>35071</relevance>
208 <recid>content: title eight international conference on computer communications and networks</recid>
209 </hit>
210 <hit>
211
212 <md-title>Building storage networks</md-title>
213 <md-date>2000</md-date>
214 <md-author>Farley, Marc</md-author>
215 <md-description>Includes index</md-description><location id="id_solr"
216  name="LOC (SOLR)" checksum="2282305049">
217 <md-title>Building storage networks</md-title>
218 <md-date>2000</md-date>
219 <md-author>Farley, Marc</md-author>
220 <md-description>Includes index</md-description></location>
221 <relevance>33008</relevance>
222 <recid>content: title building storage networks author farley marc</recid>
223 </hit>
224 <hit>
225
226 <md-title>Complete CL</md-title>
227 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
228 <md-date>1999</md-date>
229 <md-author>Malaga, Ernie</md-author>
230 <md-description>Includes index</md-description><location id="id_solr"
231  name="LOC (SOLR)" checksum="2036403862">
232 <md-title>Complete CL</md-title>
233 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
234 <md-date>1999</md-date>
235 <md-author>Malaga, Ernie</md-author>
236 <md-description>Includes index</md-description></location>
237 <relevance>33008</relevance>
238 <recid>content: title complete cl author malaga ernie</recid>
239 </hit>
240 <hit>
241
242 <md-title>3D games</md-title>
243 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
244 <md-date>2001</md-date>
245 <md-author>Watt, Alan H</md-author><location id="id_solr"
246  name="LOC (SOLR)" checksum="3459309356">
247 <md-title>3D games</md-title>
248 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
249 <md-date>2001</md-date>
250 <md-author>Watt, Alan H</md-author></location>
251 <relevance>33008</relevance>
252 <recid>content: title d games author watt alan h</recid>
253 </hit>
254 <hit>
255
256 <md-title>Java applications strategies for the AS/400</md-title>
257 <md-date>1999</md-date>
258 <md-author>Denoncourt, Don</md-author><location id="id_solr"
259  name="LOC (SOLR)" checksum="3239658983">
260 <md-title>Java applications strategies for the AS/400</md-title>
261 <md-date>1999</md-date>
262 <md-author>Denoncourt, Don</md-author></location>
263 <relevance>33008</relevance>
264 <recid>content: title java applications strategies for the as author denoncourt don</recid>
265 </hit>
266 <hit>
267
268 <md-title>Mastering algorithms with C</md-title>
269 <md-date>1999</md-date>
270 <md-author>Loudon, Kyle</md-author>
271 <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description><location id="id_solr"
272  name="LOC (SOLR)" checksum="121695994">
273 <md-title>Mastering algorithms with C</md-title>
274 <md-date>1999</md-date>
275 <md-author>Loudon, Kyle</md-author>
276 <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description>
277 <md-description>Includes index</md-description></location>
278 <relevance>33008</relevance>
279 <recid>content: title mastering algorithms with c author loudon kyle</recid>
280 </hit>
281 </show>