X-Git-Url: http://jsfdemo.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_limit_limitmap_9.res;h=b8489642287e0b97afbd82bc7543769ae7204106;hb=4d9560ce57f894e3d72c819d378860643f106a92;hp=05c0ac8ee0ba3bc1f6e0ba1ef82a78fea691bfeb;hpb=f1200fd1cab4fa57feacd43046997ce2d23edbd5;p=pazpar2-moved-to-github.git
diff --git a/test/test_limit_limitmap_9.res b/test/test_limit_limitmap_9.res
index 05c0ac8..b848964 100644
--- a/test/test_limit_limitmap_9.res
+++ b/test/test_limit_limitmap_9.res
@@ -6,276 +6,316 @@
0
20
-
-Adobe Illustrator for the Mac
-fast & easy
-2001
-Woodward, C. Michael
-Adobe Illustrator for the Mac
-fast & easy
-2001
-Woodward, C. Michael
-50734
-content: title adobe illustrator for the mac author woodward c michael
+ Adobe Illustrator for the Mac
+ fast & easy
+ 2001
+ Woodward, C. Michael
+
+ Adobe Illustrator for the Mac
+ fast & easy
+ 2001
+ Woodward, C. Michael
+
+ 1
+ 50734
+ content: title adobe illustrator for the mac author woodward c michael
-
-Advanced computer performance modeling and simulation
-1998
-Advanced computer performance modeling and simulation
-1998
-50734
-content: title advanced computer performance modeling and simulation
+ Advanced computer performance modeling and simulation
+ 1998
+
+ Advanced computer performance modeling and simulation
+ 1998
+
+ 1
+ 50734
+ content: title advanced computer performance modeling and simulation
-
-Cyberterrorism and computer crimes
-issues surrounding the establishment of an international regime
-2000
-Aldrich, Richard W
-"April 2000."
-Cyberterrorism and computer crimes
-issues surrounding the establishment of an international regime
-2000
-Aldrich, Richard W
-"April 2000."
-50734
-content: title cyberterrorism and computer crimes author aldrich richard w
+ Cyberterrorism and computer crimes
+ issues surrounding the establishment of an international regime
+ 2000
+ Aldrich, Richard W
+ "April 2000."
+
+ Cyberterrorism and computer crimes
+ issues surrounding the establishment of an international regime
+ 2000
+ Aldrich, Richard W
+ "April 2000."
+
+ 1
+ 50734
+ content: title cyberterrorism and computer crimes author aldrich richard w
-
-Software design and usability
-talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum
-2000
-Kaasgaard, Klaus
-Software design and usability
-talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum
-2000
-Kaasgaard, Klaus
-46506
-content: title software design and usability author kaasgaard klaus
+ Software design and usability
+ talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum
+ 2000
+ Kaasgaard, Klaus
+
+ Software design and usability
+ talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum
+ 2000
+ Kaasgaard, Klaus
+
+ 1
+ 46506
+ content: title software design and usability author kaasgaard klaus
-
-Everything you need to know about the dangers of computer hacking
-2000
-Knittel, John
-Explains what computer hacking is, who does it, and how dangerous it can be
-Everything you need to know about the dangers of computer hacking
-2000
-Knittel, John
-Explains what computer hacking is, who does it, and how dangerous it can be
-44474
-content: title everything you need to know about the dangers of computer hacking author knittel john
+ Everything you need to know about the dangers of computer hacking
+ 2000
+ Knittel, John
+ Explains what computer hacking is, who does it, and how dangerous it can be
+
+ Everything you need to know about the dangers of computer hacking
+ 2000
+ Knittel, John
+ Explains what computer hacking is, who does it, and how dangerous it can be
+
+ 1
+ 44474
+ content: title everything you need to know about the dangers of computer hacking author knittel john
-
-Computer peripherals
-1995
-Cook, Barry M
-Computer peripherals
-1995
-Cook, Barry M
-44392
-content: title computer peripherals author cook barry m
+ Computer peripherals
+ 1995
+ Cook, Barry M
+
+ Computer peripherals
+ 1995
+ Cook, Barry M
+
+ 1
+ 44392
+ content: title computer peripherals author cook barry m
-
-Kids' computer book
-1994
-Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children
-Kids' computer book
-1994
-"For kids and their parents"--Cover
-Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children
-38990
-content: title kids computer book
+ Kids' computer book
+ 1994
+ Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children
+
+ Kids' computer book
+ 1994
+ "For kids and their parents"--Cover
+ Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children
+
+ 1
+ 38990
+ content: title kids computer book
-
-Computer friendly
-1999
-Steinbacher, Raymond
-Computer friendly
-1999
-Steinbacher, Raymond
-38050
-content: title computer friendly author steinbacher raymond
+ Computer friendly
+ 1999
+ Steinbacher, Raymond
+
+ Computer friendly
+ 1999
+ Steinbacher, Raymond
+
+ 1
+ 38050
+ content: title computer friendly author steinbacher raymond
-
-Computer misuse
-1999
-"Also published as Parliamentary Paper E 31AO"--T.p. verso
-Computer misuse
-1999
-"May 1999."
-"NZLC R54"--T.p. verso
-"Also published as Parliamentary Paper E 31AO"--T.p. verso
-38050
-content: title computer misuse
+ Computer misuse
+ 1999
+ "Also published as Parliamentary Paper E 31AO"--T.p. verso
+
+ Computer misuse
+ 1999
+ "May 1999."
+ "NZLC R54"--T.p. verso
+ "Also published as Parliamentary Paper E 31AO"--T.p. verso
+
+ 1
+ 38050
+ content: title computer misuse
-
-Computer networking
-a top-down approach featuring the Internet
-2001
-Ross, Keith W
-Computer networking
-a top-down approach featuring the Internet
-2001
-Ross, Keith W
-38050
-content: title computer networking author ross keith w
+ Computer networking
+ a top-down approach featuring the Internet
+ 2001
+ Ross, Keith W
+
+ Computer networking
+ a top-down approach featuring the Internet
+ 2001
+ Ross, Keith W
+
+ 1
+ 38050
+ content: title computer networking author ross keith w
-
-CorelDRAW 8 for Windows
-1998
-Davis, Phyllis
-Includes index
-CorelDRAW 8 for Windows
-1998
-Davis, Phyllis
-Includes index
-38050
-content: title coreldraw for windows author davis phyllis
+ CorelDRAW 8 for Windows
+ 1998
+ Davis, Phyllis
+ Includes index
+
+ CorelDRAW 8 for Windows
+ 1998
+ Davis, Phyllis
+ Includes index
+
+ 1
+ 38050
+ content: title coreldraw for windows author davis phyllis
-
-Quicken 2000 for the Mac
-the official guide
-2000
-Langer, Maria
-"Covers Quicken deluxe 2000 for the Mac"--Cover
-Quicken 2000 for the Mac
-the official guide
-2000
-Langer, Maria
-Includes index
-"Covers Quicken deluxe 2000 for the Mac"--Cover
-38050
-content: title quicken for the mac author langer maria
+ Quicken 2000 for the Mac
+ the official guide
+ 2000
+ Langer, Maria
+ "Covers Quicken deluxe 2000 for the Mac"--Cover
+
+ Quicken 2000 for the Mac
+ the official guide
+ 2000
+ Langer, Maria
+ Includes index
+ "Covers Quicken deluxe 2000 for the Mac"--Cover
+
+ 1
+ 38050
+ content: title quicken for the mac author langer maria
-
-Sicherheit und Schutz im Netz
-1998
-Sicherheit und Schutz im Netz
-1998
-38050
-content: title sicherheit und schutz im netz
+ Sicherheit und Schutz im Netz
+ 1998
+
+ Sicherheit und Schutz im Netz
+ 1998
+
+ 1
+ 38050
+ content: title sicherheit und schutz im netz
-
-Unix Secure Shell
-1999
-Carasik, Anne H
-Includes index
-Unix Secure Shell
-1999
-Carasik, Anne H
-Includes index
-38050
-content: title unix secure shell author carasik anne h
+ Unix Secure Shell
+ 1999
+ Carasik, Anne H
+ Includes index
+
+ Unix Secure Shell
+ 1999
+ Carasik, Anne H
+ Includes index
+
+ 1
+ 38050
+ content: title unix secure shell author carasik anne h
-
-Eight International Conference on Computer Communications and Networks
-proceedings, 11-13 October 1999, Boston, Massachusetts
-1999
-"IEEE catalog number 99EX370"--T.p. verso
-Eight International Conference on Computer Communications and Networks
-proceedings, 11-13 October 1999, Boston, Massachusetts
-1999
-"IEEE catalog number 99EX370"--T.p. verso
-35936
-content: title eight international conference on computer communications and networks
+ Eight International Conference on Computer Communications and Networks
+ proceedings, 11-13 October 1999, Boston, Massachusetts
+ 1999
+ "IEEE catalog number 99EX370"--T.p. verso
+
+ Eight International Conference on Computer Communications and Networks
+ proceedings, 11-13 October 1999, Boston, Massachusetts
+ 1999
+ "IEEE catalog number 99EX370"--T.p. verso
+
+ 1
+ 35936
+ content: title eight international conference on computer communications and networks
-
-Building storage networks
-2000
-Farley, Marc
-Includes index
-Building storage networks
-2000
-Farley, Marc
-Includes index
-33822
-content: title building storage networks author farley marc
+ Building storage networks
+ 2000
+ Farley, Marc
+ Includes index
+
+ Building storage networks
+ 2000
+ Farley, Marc
+ Includes index
+
+ 1
+ 33822
+ content: title building storage networks author farley marc
-
-Complete CL
-the definitive control language programming guide
-1999
-Malaga, Ernie
-Includes index
-Complete CL
-the definitive control language programming guide
-1999
-Malaga, Ernie
-Includes index
-33822
-content: title complete cl author malaga ernie
+ Complete CL
+ the definitive control language programming guide
+ 1999
+ Malaga, Ernie
+ Includes index
+
+ Complete CL
+ the definitive control language programming guide
+ 1999
+ Malaga, Ernie
+ Includes index
+
+ 1
+ 33822
+ content: title complete cl author malaga ernie
-
-3D games
-real-time rendering and software technology
-2001
-Watt, Alan H
-3D games
-real-time rendering and software technology
-2001
-Watt, Alan H
-33822
-content: title d games author watt alan h
+ 3D games
+ real-time rendering and software technology
+ 2001
+ Watt, Alan H
+
+ 3D games
+ real-time rendering and software technology
+ 2001
+ Watt, Alan H
+
+ 1
+ 33822
+ content: title d games author watt alan h
-
-Java applications strategies for the AS/400
-1999
-Denoncourt, Don
-Java applications strategies for the AS/400
-1999
-Denoncourt, Don
-33822
-content: title java applications strategies for the as author denoncourt don
+ Java applications strategies for the AS/400
+ 1999
+ Denoncourt, Don
+
+ Java applications strategies for the AS/400
+ 1999
+ Denoncourt, Don
+
+ 1
+ 33822
+ content: title java applications strategies for the as author denoncourt don
-
-Mastering algorithms with C
-1999
-Loudon, Kyle
-"Useful techniques from sorting to encryption"--Cover
-Mastering algorithms with C
-1999
-Loudon, Kyle
-"Useful techniques from sorting to encryption"--Cover
-Includes index
-33822
-content: title mastering algorithms with c author loudon kyle
+ Mastering algorithms with C
+ 1999
+ Loudon, Kyle
+ "Useful techniques from sorting to encryption"--Cover
+
+ Mastering algorithms with C
+ 1999
+ Loudon, Kyle
+ "Useful techniques from sorting to encryption"--Cover
+ Includes index
+
+ 1
+ 33822
+ content: title mastering algorithms with c author loudon kyle
\ No newline at end of file