Update test results
authorDennis Schafroth <dennis@indexdata.com>
Thu, 26 Apr 2012 11:12:14 +0000 (11:12 +0000)
committerDennis Schafroth <dennis@indexdata.com>
Thu, 26 Apr 2012 11:12:14 +0000 (11:12 +0000)
test/test_limit_limitmap_11.res
test/test_limit_limitmap_12.res
test/test_limit_limitmap_24.res
test/test_limit_limitmap_9.res

index 94fb9e9..f758da5 100644 (file)
 <list name="author">
 <term><name>Davis, Phyllis</name><frequency>2</frequency></term>
 <term><name>Jack Collins</name><frequency>2</frequency></term>
-<term><name>Langer, Maria</name><frequency>2</frequency></term>
 <term><name>Norton, Peter</name><frequency>2</frequency></term>
 <term><name>Watt, Alan H</name><frequency>2</frequency></term>
+<term><name>Abass, Olayide</name><frequency>1</frequency></term>
 <term><name>Aldrich, Richard W</name><frequency>1</frequency></term>
 <term><name>Appleman, Daniel</name><frequency>1</frequency></term>
 <term><name>Bainbridge, David I</name><frequency>1</frequency></term>
 <term><name>Caplin, Steve</name><frequency>1</frequency></term>
+<term><name>Carasik, Anne H</name><frequency>1</frequency></term>
 <term><name>Cole, Eric</name><frequency>1</frequency></term>
 <term><name>De Jong, Kenneth A</name><frequency>1</frequency></term>
 <term><name>Dowd, Kevin</name><frequency>1</frequency></term>
 <term><name>Hodges, M. Susan</name><frequency>1</frequency></term>
 <term><name>Kaasgaard, Klaus</name><frequency>1</frequency></term>
-<term><name>Lasser, Jon</name><frequency>1</frequency></term>
 </list>
 <list name="subject">
-<term><name>Computers</name><frequency>22</frequency></term>
-<term><name>Computer file</name><frequency>20</frequency></term>
-<term><name>Computer networks</name><frequency>15</frequency></term>
-<term><name>Computer science</name><frequency>11</frequency></term>
-<term><name>Computer graphics</name><frequency>10</frequency></term>
+<term><name>Computer file</name><frequency>24</frequency></term>
+<term><name>Computers</name><frequency>21</frequency></term>
+<term><name>Computer graphics</name><frequency>13</frequency></term>
+<term><name>Computer networks</name><frequency>13</frequency></term>
 <term><name>Computer program language</name><frequency>10</frequency></term>
-<term><name>Computer security</name><frequency>10</frequency></term>
-<term><name>Computer crimes</name><frequency>7</frequency></term>
-<term><name>Computer software</name><frequency>7</frequency></term>
+<term><name>Computer science</name><frequency>10</frequency></term>
+<term><name>Computer security</name><frequency>9</frequency></term>
 <term><name>Microsoft Windows</name><frequency>7</frequency></term>
-<term><name>Computer</name><frequency>6</frequency></term>
+<term><name>UNIX</name><frequency>7</frequency></term>
+<term><name>Computer programs</name><frequency>6</frequency></term>
+<term><name>Computer software</name><frequency>6</frequency></term>
 <term><name>Operating systems</name><frequency>6</frequency></term>
-<term><name>Computer programs</name><frequency>5</frequency></term>
-<term><name>Computer systems</name><frequency>5</frequency></term>
-<term><name>UNIX</name><frequency>5</frequency></term>
+<term><name>Computer</name><frequency>5</frequency></term>
+<term><name>Computer crimes</name><frequency>5</frequency></term>
+<term><name>Computer architecture</name><frequency>4</frequency></term>
 </list>
 <list name="date">
-<term><name>2000</name><frequency>48</frequency></term>
-<term><name>1999</name><frequency>20</frequency></term>
-<term><name>2001</name><frequency>14</frequency></term>
-<term><name>1998</name><frequency>11</frequency></term>
+<term><name>2000</name><frequency>47</frequency></term>
+<term><name>2001</name><frequency>20</frequency></term>
+<term><name>1999</name><frequency>16</frequency></term>
+<term><name>1998</name><frequency>10</frequency></term>
 <term><name>1977</name><frequency>3</frequency></term>
 <term><name>1971</name><frequency>2</frequency></term>
 <term><name>1974</name><frequency>2</frequency></term>
index 4bbf745..cd5c9ad 100644 (file)
 <list name="author">
 <term><name>Davis, Phyllis</name><frequency>2</frequency></term>
 <term><name>Jack Collins</name><frequency>2</frequency></term>
-<term><name>Langer, Maria</name><frequency>2</frequency></term>
 <term><name>Norton, Peter</name><frequency>2</frequency></term>
 <term><name>Watt, Alan H</name><frequency>2</frequency></term>
+<term><name>Abass, Olayide</name><frequency>1</frequency></term>
 <term><name>Aldrich, Richard W</name><frequency>1</frequency></term>
 <term><name>Appleman, Daniel</name><frequency>1</frequency></term>
 <term><name>Bainbridge, David I</name><frequency>1</frequency></term>
 <term><name>Caplin, Steve</name><frequency>1</frequency></term>
+<term><name>Carasik, Anne H</name><frequency>1</frequency></term>
 <term><name>Cole, Eric</name><frequency>1</frequency></term>
 <term><name>De Jong, Kenneth A</name><frequency>1</frequency></term>
 <term><name>Dowd, Kevin</name><frequency>1</frequency></term>
 <term><name>Hodges, M. Susan</name><frequency>1</frequency></term>
 <term><name>Kaasgaard, Klaus</name><frequency>1</frequency></term>
-<term><name>Lasser, Jon</name><frequency>1</frequency></term>
 </list>
 <list name="subject">
-<term><name>Computers</name><frequency>22</frequency></term>
-<term><name>Computer file</name><frequency>20</frequency></term>
-<term><name>Computer networks</name><frequency>15</frequency></term>
-<term><name>Computer science</name><frequency>11</frequency></term>
-<term><name>Computer graphics</name><frequency>10</frequency></term>
+<term><name>Computer file</name><frequency>24</frequency></term>
+<term><name>Computers</name><frequency>21</frequency></term>
+<term><name>Computer graphics</name><frequency>13</frequency></term>
+<term><name>Computer networks</name><frequency>13</frequency></term>
 <term><name>Computer program language</name><frequency>10</frequency></term>
-<term><name>Computer security</name><frequency>10</frequency></term>
-<term><name>Computer crimes</name><frequency>7</frequency></term>
-<term><name>Computer software</name><frequency>7</frequency></term>
+<term><name>Computer science</name><frequency>10</frequency></term>
+<term><name>Computer security</name><frequency>9</frequency></term>
 <term><name>Microsoft Windows</name><frequency>7</frequency></term>
-<term><name>Computer</name><frequency>6</frequency></term>
+<term><name>UNIX</name><frequency>7</frequency></term>
+<term><name>Computer programs</name><frequency>6</frequency></term>
+<term><name>Computer software</name><frequency>6</frequency></term>
 <term><name>Operating systems</name><frequency>6</frequency></term>
-<term><name>Computer programs</name><frequency>5</frequency></term>
-<term><name>Computer systems</name><frequency>5</frequency></term>
-<term><name>UNIX</name><frequency>5</frequency></term>
+<term><name>Computer</name><frequency>5</frequency></term>
+<term><name>Computer crimes</name><frequency>5</frequency></term>
+<term><name>Computer architecture</name><frequency>4</frequency></term>
 </list>
 <list name="date">
-<term><name>2000</name><frequency>48</frequency></term>
-<term><name>1999</name><frequency>20</frequency></term>
-<term><name>2001</name><frequency>14</frequency></term>
-<term><name>1998</name><frequency>11</frequency></term>
+<term><name>2000</name><frequency>47</frequency></term>
+<term><name>2001</name><frequency>20</frequency></term>
+<term><name>1999</name><frequency>16</frequency></term>
+<term><name>1998</name><frequency>10</frequency></term>
 <term><name>1977</name><frequency>3</frequency></term>
 <term><name>1971</name><frequency>2</frequency></term>
 <term><name>1974</name><frequency>2</frequency></term>
index eb9920b..9f9ccad 100644 (file)
@@ -1,7 +1,7 @@
 <?xml version="1.0" encoding="UTF-8"?>
 <show><status>OK</status>
 <activeclients>2</activeclients>
-<merged>40</merged>
+<merged>60</merged>
 <total>2015</total>
 <start>0</start>
 <num>20</num>
 </hit>
 <hit>
 
+<md-title>Everything you need to know about the dangers of computer hacking</md-title>
+<md-date>2000</md-date>
+<md-author>Knittel, John</md-author>
+<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="Target-2" name="LOC-SOLR">
+<md-title>Everything you need to know about the dangers of computer hacking</md-title>
+<md-date>2000</md-date>
+<md-author>Knittel, John</md-author>
+<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description></location>
+<relevance>26979</relevance>
+<recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
+</hit>
+<hit>
+
+<md-title>Kids&apos; computer book</md-title>
+<md-date>1994</md-date>
+<md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description><location id="Target-2" name="LOC-SOLR">
+<md-title>Kids&apos; computer book</md-title>
+<md-date>1994</md-date>
+<md-description>&quot;For kids and their parents&quot;--Cover</md-description>
+<md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description></location>
+<relevance>23651</relevance>
+<recid>content: title kids computer book</recid>
+</hit>
+<hit>
+
 <md-title>Computer friendly</md-title>
 <md-date>1999</md-date>
 <md-author>Steinbacher, Raymond</md-author><location id="Target-2" name="LOC-SOLR">
 </hit>
 <hit>
 
+<md-title>Quicken 2000 for the Mac</md-title>
+<md-title-remainder>the official guide</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Langer, Maria</md-author>
+<md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description><location id="Target-2" name="LOC-SOLR">
+<md-title>Quicken 2000 for the Mac</md-title>
+<md-title-remainder>the official guide</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Langer, Maria</md-author>
+<md-description>Includes index</md-description>
+<md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description></location>
+<relevance>23082</relevance>
+<recid>content: title quicken for the mac author langer maria</recid>
+</hit>
+<hit>
+
 <md-title>Unix Secure Shell</md-title>
 <md-date>1999</md-date>
 <md-author>Carasik, Anne H</md-author>
 </hit>
 <hit>
 
+<md-title>Eight International Conference on Computer Communications and Networks</md-title>
+<md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
+<md-date>1999</md-date>
+<md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
+<md-title>Eight International Conference on Computer Communications and Networks</md-title>
+<md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
+<md-date>1999</md-date>
+<md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description></location>
+<relevance>21799</relevance>
+<recid>content: title eight international conference on computer communications and networks</recid>
+</hit>
+<hit>
+
+<md-title>Complete CL</md-title>
+<md-title-remainder>the definitive control language programming guide</md-title-remainder>
+<md-date>1999</md-date>
+<md-author>Malaga, Ernie</md-author>
+<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
+<md-title>Complete CL</md-title>
+<md-title-remainder>the definitive control language programming guide</md-title-remainder>
+<md-date>1999</md-date>
+<md-author>Malaga, Ernie</md-author>
+<md-description>Includes index</md-description></location>
+<relevance>20517</relevance>
+<recid>content: title complete cl author malaga ernie</recid>
+</hit>
+<hit>
+
 <md-title>3D games</md-title>
 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
 <md-date>2001</md-date>
 </hit>
 <hit>
 
-<md-title>Java applications strategies for the AS/400</md-title>
-<md-date>1999</md-date>
-<md-author>Denoncourt, Don</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Java applications strategies for the AS/400</md-title>
-<md-date>1999</md-date>
-<md-author>Denoncourt, Don</md-author></location>
-<relevance>20517</relevance>
-<recid>content: title java applications strategies for the as author denoncourt don</recid>
-</hit>
-<hit>
-
 <md-title>Mastering algorithms with C</md-title>
 <md-date>1999</md-date>
 <md-author>Loudon, Kyle</md-author>
 </hit>
 <hit>
 
+<md-title>3D computer graphics</md-title>
+<md-date>2000</md-date>
+<md-author>Watt, Alan H</md-author><location id="Target-2" name="LOC-SOLR">
+<md-title>3D computer graphics</md-title>
+<md-date>2000</md-date>
+<md-author>Watt, Alan H</md-author></location>
+<relevance>17952</relevance>
+<recid>content: title d computer graphics author watt alan h</recid>
+</hit>
+<hit>
+
 <md-title>Insanely great</md-title>
 <md-title-remainder>the life and times of Macintosh, the computer that changed everything</md-title-remainder>
 <md-date>2000</md-date>
 <relevance>15388</relevance>
 <recid>content: title hackers beware author cole eric</recid>
 </hit>
-<hit>
-
-<md-title>How computer programming works</md-title>
-<md-date>2000</md-date>
-<md-author>Appleman, Daniel</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>How computer programming works</md-title>
-<md-date>2000</md-date>
-<md-author>Appleman, Daniel</md-author></location>
-<relevance>15388</relevance>
-<recid>content: title how computer programming works author appleman daniel</recid>
-</hit>
-<hit>
-
-<md-title>Icon design</md-title>
-<md-date>2001</md-date>
-<md-author>Caplin, Steve</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Icon design</md-title>
-<md-date>2001</md-date>
-<md-author>Caplin, Steve</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>15388</relevance>
-<recid>content: title icon design author caplin steve</recid>
-</hit>
-<hit>
-
-<md-title>Information security architecture</md-title>
-<md-date>2000</md-date>
-<md-author>Tudor, Jan Killmeyer</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Information security architecture</md-title>
-<md-date>2000</md-date>
-<md-author>Tudor, Jan Killmeyer</md-author></location>
-<relevance>15388</relevance>
-<recid>content: title information security architecture author tudor jan killmeyer</recid>
-</hit>
-<hit>
-
-<md-title>Windows 2000</md-title>
-<md-title-remainder>design &amp; migration</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Morimoto, Rand</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Windows 2000</md-title>
-<md-title-remainder>design &amp; migration</md-title-remainder>
-<md-date>2000</md-date>
-<md-author>Morimoto, Rand</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>15388</relevance>
-<recid>content: title windows author morimoto rand</recid>
-</hit>
-<hit>
-
-<md-title>The essence of computer graphics</md-title>
-<md-date>2000</md-date>
-<md-author>Cooley, Peter</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>The essence of computer graphics</md-title>
-<md-date>2000</md-date>
-<md-author>Cooley, Peter</md-author></location>
-<relevance>13849</relevance>
-<recid>content: title the essence of computer graphics author cooley peter</recid>
-</hit>
 </show>
\ No newline at end of file
index 3521921..64ca61c 100644 (file)
@@ -15,7 +15,7 @@
 <md-title-remainder>fast &amp; easy</md-title-remainder>
 <md-date>2001</md-date>
 <md-author>Woodward, C. Michael</md-author></location>
-<relevance>39450</relevance>
+<relevance>45304</relevance>
 <recid>content: title adobe illustrator for the mac author woodward c michael</recid>
 </hit>
 <hit>
@@ -24,7 +24,7 @@
 <md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
 <md-title>Advanced computer performance modeling and simulation</md-title>
 <md-date>1998</md-date></location>
-<relevance>39450</relevance>
+<relevance>45304</relevance>
 <recid>content: title advanced computer performance modeling and simulation</recid>
 </hit>
 <hit>
 <md-date>2000</md-date>
 <md-author>Aldrich, Richard W</md-author>
 <md-description>&quot;April 2000.&quot;</md-description></location>
-<relevance>39450</relevance>
+<relevance>45304</relevance>
 <recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
 </hit>
 <hit>
 
-<md-title>Computer interfacing</md-title>
-<md-date>2000</md-date>
-<md-author>Smith, George A</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>Computer interfacing</md-title>
-<md-date>2000</md-date>
-<md-author>Smith, George A</md-author></location>
-<relevance>36163</relevance>
-<recid>content: title computer interfacing author smith george a</recid>
-</hit>
-<hit>
-
 <md-title>Software design and usability</md-title>
 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
 <md-date>2000</md-date>
@@ -63,7 +52,7 @@
 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
 <md-date>2000</md-date>
 <md-author>Kaasgaard, Klaus</md-author></location>
-<relevance>36163</relevance>
+<relevance>41529</relevance>
 <recid>content: title software design and usability author kaasgaard klaus</recid>
 </hit>
 <hit>
@@ -76,7 +65,7 @@
 <md-date>2000</md-date>
 <md-author>Knittel, John</md-author>
 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description></location>
-<relevance>34583</relevance>
+<relevance>39715</relevance>
 <recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
 </hit>
 <hit>
@@ -87,7 +76,7 @@
 <md-title>Computer peripherals</md-title>
 <md-date>1995</md-date>
 <md-author>Cook, Barry M</md-author></location>
-<relevance>34519</relevance>
+<relevance>39641</relevance>
 <recid>content: title computer peripherals author cook barry m</recid>
 </hit>
 <hit>
@@ -99,7 +88,7 @@
 <md-date>1994</md-date>
 <md-description>&quot;For kids and their parents&quot;--Cover</md-description>
 <md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description></location>
-<relevance>30318</relevance>
+<relevance>34817</relevance>
 <recid>content: title kids computer book</recid>
 </hit>
 <hit>
 <md-title>Computer friendly</md-title>
 <md-date>1999</md-date>
 <md-author>Steinbacher, Raymond</md-author></location>
-<relevance>29588</relevance>
+<relevance>33978</relevance>
 <recid>content: title computer friendly author steinbacher raymond</recid>
 </hit>
 <hit>
 <md-description>&quot;May 1999.&quot;</md-description>
 <md-description>&quot;NZLC R54&quot;--T.p. verso</md-description>
 <md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description></location>
-<relevance>29588</relevance>
+<relevance>33978</relevance>
 <recid>content: title computer misuse</recid>
 </hit>
 <hit>
 <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
 <md-date>2001</md-date>
 <md-author>Ross, Keith W</md-author></location>
-<relevance>29588</relevance>
+<relevance>33978</relevance>
 <recid>content: title computer networking author ross keith w</recid>
 </hit>
 <hit>
 <md-date>1998</md-date>
 <md-author>Davis, Phyllis</md-author>
 <md-description>Includes index</md-description></location>
-<relevance>29588</relevance>
+<relevance>33978</relevance>
 <recid>content: title coreldraw for windows author davis phyllis</recid>
 </hit>
 <hit>
 
-<md-title>Quicken 2001 Deluxe for Macintosh</md-title>
-<md-title-remainder>the official guide</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Langer, Maria</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
-<md-title>Quicken 2001 Deluxe for Macintosh</md-title>
-<md-title-remainder>the official guide</md-title-remainder>
-<md-date>2001</md-date>
-<md-author>Langer, Maria</md-author>
-<md-description>Includes index</md-description></location>
-<relevance>29588</relevance>
-<recid>content: title quicken deluxe for macintosh author langer maria</recid>
-</hit>
-<hit>
-
 <md-title>Quicken 2000 for the Mac</md-title>
 <md-title-remainder>the official guide</md-title-remainder>
 <md-date>2000</md-date>
 <md-author>Langer, Maria</md-author>
 <md-description>Includes index</md-description>
 <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description></location>
-<relevance>29588</relevance>
+<relevance>33978</relevance>
 <recid>content: title quicken for the mac author langer maria</recid>
 </hit>
 <hit>
 <md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
 <md-title>Sicherheit und Schutz im Netz</md-title>
 <md-date>1998</md-date></location>
-<relevance>29588</relevance>
+<relevance>33978</relevance>
 <recid>content: title sicherheit und schutz im netz</recid>
 </hit>
 <hit>
 <md-date>1999</md-date>
 <md-author>Carasik, Anne H</md-author>
 <md-description>Includes index</md-description></location>
-<relevance>29588</relevance>
+<relevance>33978</relevance>
 <recid>content: title unix secure shell author carasik anne h</recid>
 </hit>
 <hit>
 
-<md-title>www.StopThief.net</md-title>
-<md-title-remainder>protecting your identity on the Web</md-title-remainder>
-<md-date>1999</md-date>
-<md-author>Marcella, Albert J</md-author><location id="Target-2" name="LOC-SOLR">
-<md-title>www.StopThief.net</md-title>
-<md-title-remainder>protecting your identity on the Web</md-title-remainder>
-<md-date>1999</md-date>
-<md-author>Marcella, Albert J</md-author></location>
-<relevance>29588</relevance>
-<recid>content: title www stopthief net author marcella albert j</recid>
-</hit>
-<hit>
-
 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
 <md-date>1999</md-date>
 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
 <md-date>1999</md-date>
 <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description></location>
-<relevance>27944</relevance>
+<relevance>32090</relevance>
 <recid>content: title eight international conference on computer communications and networks</recid>
 </hit>
 <hit>
 <md-date>2000</md-date>
 <md-author>Farley, Marc</md-author>
 <md-description>Includes index</md-description></location>
-<relevance>26300</relevance>
+<relevance>30203</relevance>
 <recid>content: title building storage networks author farley marc</recid>
 </hit>
 <hit>
 <md-date>1999</md-date>
 <md-author>Malaga, Ernie</md-author>
 <md-description>Includes index</md-description></location>
-<relevance>26300</relevance>
+<relevance>30203</relevance>
 <recid>content: title complete cl author malaga ernie</recid>
 </hit>
+<hit>
+
+<md-title>3D games</md-title>
+<md-title-remainder>real-time rendering and software technology</md-title-remainder>
+<md-date>2001</md-date>
+<md-author>Watt, Alan H</md-author><location id="Target-2" name="LOC-SOLR">
+<md-title>3D games</md-title>
+<md-title-remainder>real-time rendering and software technology</md-title-remainder>
+<md-date>2001</md-date>
+<md-author>Watt, Alan H</md-author></location>
+<relevance>30203</relevance>
+<recid>content: title d games author watt alan h</recid>
+</hit>
+<hit>
+
+<md-title>Java applications strategies for the AS/400</md-title>
+<md-date>1999</md-date>
+<md-author>Denoncourt, Don</md-author><location id="Target-2" name="LOC-SOLR">
+<md-title>Java applications strategies for the AS/400</md-title>
+<md-date>1999</md-date>
+<md-author>Denoncourt, Don</md-author></location>
+<relevance>30203</relevance>
+<recid>content: title java applications strategies for the as author denoncourt don</recid>
+</hit>
+<hit>
+
+<md-title>Mastering algorithms with C</md-title>
+<md-date>1999</md-date>
+<md-author>Loudon, Kyle</md-author>
+<md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description><location id="Target-2" name="LOC-SOLR">
+<md-title>Mastering algorithms with C</md-title>
+<md-date>1999</md-date>
+<md-author>Loudon, Kyle</md-author>
+<md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description>
+<md-description>Includes index</md-description></location>
+<relevance>30203</relevance>
+<recid>content: title mastering algorithms with c author loudon kyle</recid>
+</hit>
 </show>
\ No newline at end of file