<md-title>Computer science & technology</md-title>
<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
-<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
+<md-date>1977</md-date><location id="Target-1"
+ name="ztest-db1" checksum="1487286940">
<md-title>Computer science & technology</md-title>
<md-title-remainder>proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976</md-title-remainder>
<md-date>1977</md-date>
<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>57536</relevance>
+<relevance>102165</relevance>
<recid>content: title computer science technology</recid>
</hit>
<hit>
<md-title>The Computer Bible</md-title>
<md-date>1973-1980</md-date>
-<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description><location id="Target-1" name="ztest-db1">
+<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description><location id="Target-1"
+ name="ztest-db1" checksum="3541567481">
<md-title>The Computer Bible</md-title>
<md-date>1973-1980</md-date>
<md-description>Hebrew and Greek; introductions in English</md-description>
<md-description>Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates</md-description>
<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>57536</relevance>
+<relevance>102165</relevance>
<recid>content: title the computer bible</recid>
</hit>
<hit>
<md-title>The use of passwords for controlled access to computer resources</md-title>
<md-date>1977</md-date>
-<md-author>Wood, Helen M</md-author><location id="Target-1" name="ztest-db1">
+<md-author>Wood, Helen M</md-author><location id="Target-1"
+ name="ztest-db1" checksum="2234182525">
<md-title>The use of passwords for controlled access to computer resources</md-title>
<md-date>1977</md-date>
<md-author>Wood, Helen M</md-author>
<md-test-usersetting>XXXXXXXXXX</md-test-usersetting></location>
-<relevance>17260</relevance>
+<relevance>30649</relevance>
<recid>content: title the use of passwords for controlled access to computer resources author wood helen m</recid>
</hit>
<hit>
<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
<md-title-remainder>proceedings of the workshop</md-title-remainder>
-<md-date>1977</md-date><location id="Target-1" name="ztest-db1">
+<md-date>1977</md-date><location id="Target-1"
+ name="ztest-db1" checksum="740391355">
<md-title>Reconstruction tomography in diagnostic radiology and nuclear medicine</md-title>
<md-title-remainder>proceedings of the workshop</md-title-remainder>
<md-date>1977</md-date>