X-Git-Url: http://lists.indexdata.com/cgi-bin?a=blobdiff_plain;f=test%2Ftest_limit_limitmap_30.res;h=b56827542dd0ce8344ca989e8746b417ab948936;hb=e5f6d1c95b99e5716f47765f2c131e415ab6b7ce;hp=ab63fe673d7b4b21048e2ac5983820e44c8d5b54;hpb=9ca12b83de76e7b30b71e8b8c504deb21d8a09fd;p=pazpar2-moved-to-github.git diff --git a/test/test_limit_limitmap_30.res b/test/test_limit_limitmap_30.res index ab63fe6..b568275 100644 --- a/test/test_limit_limitmap_30.res +++ b/test/test_limit_limitmap_30.res @@ -1,2 +1,58 @@ -OK \ No newline at end of file +OK +0 +4 +10 +4 +0 +4 + + +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +Computer science & technology +proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 +1977 +XXXXXXXXXX +57536 +content: title computer science technology + + + +The Computer Bible +1973-1980 +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +The Computer Bible +1973-1980 +Hebrew and Greek; introductions in English +Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates +XXXXXXXXXX +57536 +content: title the computer bible + + + +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +The use of passwords for controlled access to computer resources +1977 +Wood, Helen M +XXXXXXXXXX +17260 +content: title the use of passwords for controlled access to computer resources author wood helen m + + + +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +Reconstruction tomography in diagnostic radiology and nuclear medicine +proceedings of the workshop +1977 +XXXXXXXXXX +0 +content: title reconstruction tomography in diagnostic radiology and nuclear medicine + + \ No newline at end of file