<md-title>How to program a computer</md-title>
<md-author>Jack Collins</md-author></location>
<count>2</count>
-<relevance>28267</relevance>
+<relevance>53554</relevance>
<recid>content: title how to program a computer author jack collins</recid>
</hit>
<hit>
<md-title>Computer science & technology</md-title>
<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
<md-date>1977</md-date></location>
-<relevance>23556</relevance>
+<relevance>44628</relevance>
<recid>content: title computer science technology</recid>
</hit>
<hit>
<md-date>1973-1980</md-date>
<md-description>Hebrew and Greek; introductions in English</md-description>
<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description></location>
-<relevance>23556</relevance>
+<relevance>44628</relevance>
<recid>content: title the computer bible</recid>
</hit>
<hit>
<md-date>1971</md-date>
<md-author>Englund, Carl R</md-author>
<md-description>"Contract DOT-UT-10003."</md-description></location>
-<relevance>10095</relevance>
+<relevance>19126</relevance>
<recid>content: title washington metropolitan area rail computer feasibility study author englund carl r</recid>
</hit>
<hit>
<md-date>1974</md-date>
<md-author>Mairs, John W</md-author>
<md-description>Scale of maps ca. 1:1,000,000</md-description></location>
-<relevance>9815</relevance>
+<relevance>18595</relevance>
<recid>content: title the puget sound region author mairs john w</recid>
</hit>
<hit>
<md-title>Computer processing of dynamic images from an Anger scintillation camera</md-title>
<md-title-remainder>the proceedings of a workshop</md-title-remainder>
<md-date>1974</md-date></location>
-<relevance>7067</relevance>
+<relevance>13388</relevance>
<recid>content: title computer processing of dynamic images from an anger scintillation camera</recid>
</hit>
<hit>
<md-title>The use of passwords for controlled access to computer resources</md-title>
<md-date>1977</md-date>
<md-author>Wood, Helen M</md-author></location>
-<relevance>7067</relevance>
+<relevance>13388</relevance>
<recid>content: title the use of passwords for controlled access to computer resources author wood helen m</recid>
</hit>
<hit>