record parameter checksum
[pazpar2-moved-to-github.git] / test / test_limit_limitmap_9.res
index 64ca61c..7eed3b1 100644 (file)
@@ -10,7 +10,8 @@
 <md-title>Adobe Illustrator for the Mac</md-title>
 <md-title-remainder>fast &amp; easy</md-title-remainder>
 <md-date>2001</md-date>
-<md-author>Woodward, C. Michael</md-author><location id="Target-2" name="LOC-SOLR">
+<md-author>Woodward, C. Michael</md-author><location id="Target-2"
+ name="LOC-SOLR" checksum="739120627">
 <md-title>Adobe Illustrator for the Mac</md-title>
 <md-title-remainder>fast &amp; easy</md-title-remainder>
 <md-date>2001</md-date>
@@ -21,7 +22,8 @@
 <hit>
 
 <md-title>Advanced computer performance modeling and simulation</md-title>
-<md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
+<md-date>1998</md-date><location id="Target-2"
+ name="LOC-SOLR" checksum="3541567482">
 <md-title>Advanced computer performance modeling and simulation</md-title>
 <md-date>1998</md-date></location>
 <relevance>45304</relevance>
@@ -33,7 +35,8 @@
 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
 <md-date>2000</md-date>
 <md-author>Aldrich, Richard W</md-author>
-<md-description>&quot;April 2000.&quot;</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>&quot;April 2000.&quot;</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="4100786124">
 <md-title>Cyberterrorism and computer crimes</md-title>
 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
 <md-date>2000</md-date>
@@ -47,7 +50,8 @@
 <md-title>Software design and usability</md-title>
 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
 <md-date>2000</md-date>
-<md-author>Kaasgaard, Klaus</md-author><location id="Target-2" name="LOC-SOLR">
+<md-author>Kaasgaard, Klaus</md-author><location id="Target-2"
+ name="LOC-SOLR" checksum="552714413">
 <md-title>Software design and usability</md-title>
 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
 <md-date>2000</md-date>
@@ -60,7 +64,8 @@
 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
 <md-date>2000</md-date>
 <md-author>Knittel, John</md-author>
-<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="1672422426">
 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
 <md-date>2000</md-date>
 <md-author>Knittel, John</md-author>
@@ -72,7 +77,8 @@
 
 <md-title>Computer peripherals</md-title>
 <md-date>1995</md-date>
-<md-author>Cook, Barry M</md-author><location id="Target-2" name="LOC-SOLR">
+<md-author>Cook, Barry M</md-author><location id="Target-2"
+ name="LOC-SOLR" checksum="550172955">
 <md-title>Computer peripherals</md-title>
 <md-date>1995</md-date>
 <md-author>Cook, Barry M</md-author></location>
@@ -83,7 +89,8 @@
 
 <md-title>Kids&apos; computer book</md-title>
 <md-date>1994</md-date>
-<md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>Discusses a variety of educational and game software for children  with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="2419318011">
 <md-title>Kids&apos; computer book</md-title>
 <md-date>1994</md-date>
 <md-description>&quot;For kids and their parents&quot;--Cover</md-description>
 
 <md-title>Computer friendly</md-title>
 <md-date>1999</md-date>
-<md-author>Steinbacher, Raymond</md-author><location id="Target-2" name="LOC-SOLR">
+<md-author>Steinbacher, Raymond</md-author><location id="Target-2"
+ name="LOC-SOLR" checksum="3353890539">
 <md-title>Computer friendly</md-title>
 <md-date>1999</md-date>
 <md-author>Steinbacher, Raymond</md-author></location>
 
 <md-title>Computer misuse</md-title>
 <md-date>1999</md-date>
-<md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>&quot;Also published as Parliamentary Paper E 31AO&quot;--T.p. verso</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="2234182526">
 <md-title>Computer misuse</md-title>
 <md-date>1999</md-date>
 <md-description>&quot;May 1999.&quot;</md-description>
 <md-title>Computer networking</md-title>
 <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
 <md-date>2001</md-date>
-<md-author>Ross, Keith W</md-author><location id="Target-2" name="LOC-SOLR">
+<md-author>Ross, Keith W</md-author><location id="Target-2"
+ name="LOC-SOLR" checksum="1669880968">
 <md-title>Computer networking</md-title>
 <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
 <md-date>2001</md-date>
 <md-title>CorelDRAW 8 for Windows</md-title>
 <md-date>1998</md-date>
 <md-author>Davis, Phyllis</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>Includes index</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="1297068540">
 <md-title>CorelDRAW 8 for Windows</md-title>
 <md-date>1998</md-date>
 <md-author>Davis, Phyllis</md-author>
 <md-title-remainder>the official guide</md-title-remainder>
 <md-date>2000</md-date>
 <md-author>Langer, Maria</md-author>
-<md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="2605724225">
 <md-title>Quicken 2000 for the Mac</md-title>
 <md-title-remainder>the official guide</md-title-remainder>
 <md-date>2000</md-date>
 <hit>
 
 <md-title>Sicherheit und Schutz im Netz</md-title>
-<md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
+<md-date>1998</md-date><location id="Target-2"
+ name="LOC-SOLR" checksum="2604453496">
 <md-title>Sicherheit und Schutz im Netz</md-title>
 <md-date>1998</md-date></location>
 <relevance>33978</relevance>
 <md-title>Unix Secure Shell</md-title>
 <md-date>1999</md-date>
 <md-author>Carasik, Anne H</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>Includes index</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="3726702967">
 <md-title>Unix Secure Shell</md-title>
 <md-date>1999</md-date>
 <md-author>Carasik, Anne H</md-author>
 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
 <md-date>1999</md-date>
-<md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="3166213596">
 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
 <md-date>1999</md-date>
 <md-title>Building storage networks</md-title>
 <md-date>2000</md-date>
 <md-author>Farley, Marc</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>Includes index</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="3164942867">
 <md-title>Building storage networks</md-title>
 <md-date>2000</md-date>
 <md-author>Farley, Marc</md-author>
 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
 <md-date>1999</md-date>
 <md-author>Malaga, Ernie</md-author>
-<md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>Includes index</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="551443684">
 <md-title>Complete CL</md-title>
 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
 <md-date>1999</md-date>
 <md-title>3D games</md-title>
 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
 <md-date>2001</md-date>
-<md-author>Watt, Alan H</md-author><location id="Target-2" name="LOC-SOLR">
+<md-author>Watt, Alan H</md-author><location id="Target-2"
+ name="LOC-SOLR" checksum="4287192338">
 <md-title>3D games</md-title>
 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
 <md-date>2001</md-date>
 
 <md-title>Java applications strategies for the AS/400</md-title>
 <md-date>1999</md-date>
-<md-author>Denoncourt, Don</md-author><location id="Target-2" name="LOC-SOLR">
+<md-author>Denoncourt, Don</md-author><location id="Target-2"
+ name="LOC-SOLR" checksum="3351349081">
 <md-title>Java applications strategies for the AS/400</md-title>
 <md-date>1999</md-date>
 <md-author>Denoncourt, Don</md-author></location>
 <md-title>Mastering algorithms with C</md-title>
 <md-date>1999</md-date>
 <md-author>Loudon, Kyle</md-author>
-<md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description><location id="Target-2" name="LOC-SOLR">
+<md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description><location id="Target-2"
+ name="LOC-SOLR" checksum="178631256">
 <md-title>Mastering algorithms with C</md-title>
 <md-date>1999</md-date>
 <md-author>Loudon, Kyle</md-author>