X-Git-Url: http://lists.indexdata.com/cgi-bin?a=blobdiff_plain;f=test%2Ftest_termlist_block_9.res;h=be9c7decb30bfd27872878e618fefb7be2953cf9;hb=5b31ba8413c62e860eba83a58852d2af37af4397;hp=cbe4f17f8f270c46767ed52503b52452a3fca8fe;hpb=6ee45dde4163c36fcbf098189ef24cd0339196c9;p=pazpar2-moved-to-github.git diff --git a/test/test_termlist_block_9.res b/test/test_termlist_block_9.res index cbe4f17..be9c7de 100644 --- a/test/test_termlist_block_9.res +++ b/test/test_termlist_block_9.res @@ -6,36 +6,40 @@ 0 20 - -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -49512 - + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + 1 + 49512 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(1); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](6.000000) * idf[1](0.082521) (49512); score = relevance(49512); - -content: title adobe illustrator for the mac author woodward c michael + + content: title adobe illustrator for the mac author woodward c michael - -Advanced computer performance modeling and simulation -1998 -Advanced computer performance modeling and simulation -1998 -49512 - + Advanced computer performance modeling and simulation + 1998 + + Advanced computer performance modeling and simulation + 1998 + + 1 + 49512 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(3); @@ -44,24 +48,26 @@ computer: field=title vecf[1] += mult(6) / length(6); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](6.000000) * idf[1](0.082521) (49512); score = relevance(49512); - -content: title advanced computer performance modeling and simulation + + content: title advanced computer performance modeling and simulation - -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -49512 - + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + 1 + 49512 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); @@ -69,22 +75,24 @@ computer: field=title vecf[1] += mult(6) / length(4); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](6.000000) * idf[1](0.082521) (49512); score = relevance(49512); - -content: title cyberterrorism and computer crimes author aldrich richard w + + content: title cyberterrorism and computer crimes author aldrich richard w - -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -45386 - + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + 1 + 45386 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(3); @@ -92,22 +100,24 @@ computer: field=subject vecf[1] += mult(3) / length(2); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](5.500000) * idf[1](0.082521) (45386); score = relevance(45386); - -content: title software design and usability author kaasgaard klaus + + content: title software design and usability author kaasgaard klaus - -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -43403 - + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + 1 + 43403 + computer: field=description vecf[1] += mult(3) / length(14); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); @@ -116,41 +126,45 @@ computer: field=title vecf[1] += mult(6) / length(11); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](5.259740) * idf[1](0.082521) (43403); score = relevance(43403); - -content: title everything you need to know about the dangers of computer hacking author knittel john + + content: title everything you need to know about the dangers of computer hacking author knittel john - -Computer peripherals -1995 -Cook, Barry M -Computer peripherals -1995 -Cook, Barry M -43323 - + Computer peripherals + 1995 + Cook, Barry M + + Computer peripherals + 1995 + Cook, Barry M + + 1 + 43323 + computer: field=subject vecf[1] += mult(3) / length(4); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=title vecf[1] += mult(6) / length(2); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](5.250000) * idf[1](0.082521) (43323); score = relevance(43323); - -content: title computer peripherals author cook barry m + + content: title computer peripherals author cook barry m - -Kids' computer book -1994 -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -Kids' computer book -1994 -"For kids and their parents"--Cover -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -38051 - + Kids' computer book + 1994 + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + Kids' computer book + 1994 + "For kids and their parents"--Cover + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + 1 + 38051 + computer: field=description vecf[1] += mult(3) / length(27); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(3); @@ -158,169 +172,185 @@ computer: field=title vecf[1] += mult(6) / length(3); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.611111) * idf[1](0.082521) (38051); score = relevance(38051); - -content: title kids computer book + + content: title kids computer book - -Computer friendly -1999 -Steinbacher, Raymond -Computer friendly -1999 -Steinbacher, Raymond -37134 - + Computer friendly + 1999 + Steinbacher, Raymond + + Computer friendly + 1999 + Steinbacher, Raymond + + 1 + 37134 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=title vecf[1] += mult(6) / length(2); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); score = relevance(37134); - -content: title computer friendly author steinbacher raymond + + content: title computer friendly author steinbacher raymond - -Computer misuse -1999 -"Also published as Parliamentary Paper E 31AO"--T.p. verso -Computer misuse -1999 -"May 1999." -"NZLC R54"--T.p. verso -"Also published as Parliamentary Paper E 31AO"--T.p. verso -37134 - + Computer misuse + 1999 + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + Computer misuse + 1999 + "May 1999." + "NZLC R54"--T.p. verso + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + 1 + 37134 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=title vecf[1] += mult(6) / length(2); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); score = relevance(37134); - -content: title computer misuse + + content: title computer misuse - -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -37134 - + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + 1 + 37134 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=title vecf[1] += mult(6) / length(2); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); score = relevance(37134); - -content: title computer networking author ross keith w + + content: title computer networking author ross keith w - -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -37134 - + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + 1 + 37134 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); score = relevance(37134); - -content: title coreldraw for windows author davis phyllis + + content: title coreldraw for windows author davis phyllis - -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -"Covers Quicken deluxe 2000 for the Mac"--Cover -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -Includes index -"Covers Quicken deluxe 2000 for the Mac"--Cover -37134 - + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + "Covers Quicken deluxe 2000 for the Mac"--Cover + + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + Includes index + "Covers Quicken deluxe 2000 for the Mac"--Cover + + 1 + 37134 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(1); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); score = relevance(37134); - -content: title quicken for the mac author langer maria + + content: title quicken for the mac author langer maria - -Sicherheit und Schutz im Netz -1998 -Sicherheit und Schutz im Netz -1998 -37134 - + Sicherheit und Schutz im Netz + 1998 + + Sicherheit und Schutz im Netz + 1998 + + 1 + 37134 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); score = relevance(37134); - -content: title sicherheit und schutz im netz + + content: title sicherheit und schutz im netz - -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -37134 - + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + 1 + 37134 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134); score = relevance(37134); - -content: title unix secure shell author carasik anne h + + content: title unix secure shell author carasik anne h - -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -35071 - + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + 1 + 35071 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(3); computer: field=subject vecf[1] += mult(3) / length(3); @@ -328,116 +358,126 @@ computer: field=title vecf[1] += mult(6) / length(8); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.250000) * idf[1](0.082521) (35071); score = relevance(35071); - -content: title eight international conference on computer communications and networks + + content: title eight international conference on computer communications and networks - -Building storage networks -2000 -Farley, Marc -Includes index -Building storage networks -2000 -Farley, Marc -Includes index -33008 - + Building storage networks + 2000 + Farley, Marc + Includes index + + Building storage networks + 2000 + Farley, Marc + Includes index + + 1 + 33008 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(3); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); score = relevance(33008); - -content: title building storage networks author farley marc + + content: title building storage networks author farley marc - -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -33008 - + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + 1 + 33008 + computer: field=subject vecf[1] += mult(3) / length(1); computer: field=subject vecf[1] += mult(3) / length(3); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); score = relevance(33008); - -content: title complete cl author malaga ernie + + content: title complete cl author malaga ernie - -3D games -real-time rendering and software technology -2001 -Watt, Alan H -3D games -real-time rendering and software technology -2001 -Watt, Alan H -33008 - + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 1 + 33008 + computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(3); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); score = relevance(33008); - -content: title d games author watt alan h + + content: title d games author watt alan h - -Java applications strategies for the AS/400 -1999 -Denoncourt, Don -Java applications strategies for the AS/400 -1999 -Denoncourt, Don -33008 - + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + 1 + 33008 + computer: field=subject vecf[1] += mult(3) / length(3); computer: field=subject vecf[1] += mult(3) / length(1); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); score = relevance(33008); - -content: title java applications strategies for the as author denoncourt don + + content: title java applications strategies for the as author denoncourt don - -Mastering algorithms with C -1999 -Loudon, Kyle -"Useful techniques from sorting to encryption"--Cover -Mastering algorithms with C -1999 -Loudon, Kyle -"Useful techniques from sorting to encryption"--Cover -Includes index -33008 - + Mastering algorithms with C + 1999 + Loudon, Kyle + "Useful techniques from sorting to encryption"--Cover + + Mastering algorithms with C + 1999 + Loudon, Kyle + "Useful techniques from sorting to encryption"--Cover + Includes index + + 1 + 33008 + computer: field=subject vecf[1] += mult(3) / length(3); computer: field=subject vecf[1] += mult(3) / length(2); computer: field=subject vecf[1] += mult(3) / length(2); idf[1] = log(((1 + total(100))/termoccur(93)); computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008); score = relevance(33008); - -content: title mastering algorithms with c author loudon kyle + + content: title mastering algorithms with c author loudon kyle \ No newline at end of file