X-Git-Url: http://lists.indexdata.com/cgi-bin?a=blobdiff_plain;f=test%2Ftest_limit_limitmap_26.res;h=e69d6ea5fd8fa86db3eda6a00e51480314560d44;hb=f1200fd1cab4fa57feacd43046997ce2d23edbd5;hp=ae42f75493525a2be774962f1fdf72b4a5e25c70;hpb=bfe528b216abd25cab78d8764a771f1abcc997ec;p=pazpar2-moved-to-github.git diff --git a/test/test_limit_limitmap_26.res b/test/test_limit_limitmap_26.res index ae42f75..e69d6ea 100644 --- a/test/test_limit_limitmap_26.res +++ b/test/test_limit_limitmap_26.res @@ -1,16 +1,61 @@ -OK -Target-1 -ztest-db1 -1 -0 -1 -Client_Idle - -Target-2 -LOC-SOLR -0 -0 -0 -Client_Error - \ No newline at end of file +OK +0 +4 +10 +0 +4 + + +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +XXXXXXXXXX +102165 +content: title computer science technology + + + +The Computer Bible +1973-1980 +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +The Computer Bible +1973-1980 +Hebrew and Greek; introductions in English +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +XXXXXXXXXX +102165 +content: title the computer bible + + + +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +XXXXXXXXXX +30649 +content: title the use of passwords for controlled access to computer resources author wood helen m + + + +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +XXXXXXXXXX +0 +content: title reconstruction tomography in diagnostic radiology and nuclear medicine + + \ No newline at end of file