X-Git-Url: http://lists.indexdata.com/cgi-bin?a=blobdiff_plain;f=test%2Ftest_termlist_block_9.res;h=be9c7decb30bfd27872878e618fefb7be2953cf9;hb=5b31ba8413c62e860eba83a58852d2af37af4397;hp=cbe4f17f8f270c46767ed52503b52452a3fca8fe;hpb=6ee45dde4163c36fcbf098189ef24cd0339196c9;p=pazpar2-moved-to-github.git
diff --git a/test/test_termlist_block_9.res b/test/test_termlist_block_9.res
index cbe4f17..be9c7de 100644
--- a/test/test_termlist_block_9.res
+++ b/test/test_termlist_block_9.res
@@ -6,36 +6,40 @@
0
20
-
-Adobe Illustrator for the Mac
-fast & easy
-2001
-Woodward, C. Michael
-Adobe Illustrator for the Mac
-fast & easy
-2001
-Woodward, C. Michael
-49512
-
+ Adobe Illustrator for the Mac
+ fast & easy
+ 2001
+ Woodward, C. Michael
+
+ Adobe Illustrator for the Mac
+ fast & easy
+ 2001
+ Woodward, C. Michael
+
+ 1
+ 49512
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(1);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](6.000000) * idf[1](0.082521) (49512);
score = relevance(49512);
-
-content: title adobe illustrator for the mac author woodward c michael
+
+ content: title adobe illustrator for the mac author woodward c michael
-
-Advanced computer performance modeling and simulation
-1998
-Advanced computer performance modeling and simulation
-1998
-49512
-
+ Advanced computer performance modeling and simulation
+ 1998
+
+ Advanced computer performance modeling and simulation
+ 1998
+
+ 1
+ 49512
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(3);
@@ -44,24 +48,26 @@ computer: field=title vecf[1] += mult(6) / length(6);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](6.000000) * idf[1](0.082521) (49512);
score = relevance(49512);
-
-content: title advanced computer performance modeling and simulation
+
+ content: title advanced computer performance modeling and simulation
-
-Cyberterrorism and computer crimes
-issues surrounding the establishment of an international regime
-2000
-Aldrich, Richard W
-"April 2000."
-Cyberterrorism and computer crimes
-issues surrounding the establishment of an international regime
-2000
-Aldrich, Richard W
-"April 2000."
-49512
-
+ Cyberterrorism and computer crimes
+ issues surrounding the establishment of an international regime
+ 2000
+ Aldrich, Richard W
+ "April 2000."
+
+ Cyberterrorism and computer crimes
+ issues surrounding the establishment of an international regime
+ 2000
+ Aldrich, Richard W
+ "April 2000."
+
+ 1
+ 49512
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
@@ -69,22 +75,24 @@ computer: field=title vecf[1] += mult(6) / length(4);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](6.000000) * idf[1](0.082521) (49512);
score = relevance(49512);
-
-content: title cyberterrorism and computer crimes author aldrich richard w
+
+ content: title cyberterrorism and computer crimes author aldrich richard w
-
-Software design and usability
-talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum
-2000
-Kaasgaard, Klaus
-Software design and usability
-talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum
-2000
-Kaasgaard, Klaus
-45386
-
+ Software design and usability
+ talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum
+ 2000
+ Kaasgaard, Klaus
+
+ Software design and usability
+ talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum
+ 2000
+ Kaasgaard, Klaus
+
+ 1
+ 45386
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(3);
@@ -92,22 +100,24 @@ computer: field=subject vecf[1] += mult(3) / length(2);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](5.500000) * idf[1](0.082521) (45386);
score = relevance(45386);
-
-content: title software design and usability author kaasgaard klaus
+
+ content: title software design and usability author kaasgaard klaus
-
-Everything you need to know about the dangers of computer hacking
-2000
-Knittel, John
-Explains what computer hacking is, who does it, and how dangerous it can be
-Everything you need to know about the dangers of computer hacking
-2000
-Knittel, John
-Explains what computer hacking is, who does it, and how dangerous it can be
-43403
-
+ Everything you need to know about the dangers of computer hacking
+ 2000
+ Knittel, John
+ Explains what computer hacking is, who does it, and how dangerous it can be
+
+ Everything you need to know about the dangers of computer hacking
+ 2000
+ Knittel, John
+ Explains what computer hacking is, who does it, and how dangerous it can be
+
+ 1
+ 43403
+
computer: field=description vecf[1] += mult(3) / length(14);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
@@ -116,41 +126,45 @@ computer: field=title vecf[1] += mult(6) / length(11);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](5.259740) * idf[1](0.082521) (43403);
score = relevance(43403);
-
-content: title everything you need to know about the dangers of computer hacking author knittel john
+
+ content: title everything you need to know about the dangers of computer hacking author knittel john
-
-Computer peripherals
-1995
-Cook, Barry M
-Computer peripherals
-1995
-Cook, Barry M
-43323
-
+ Computer peripherals
+ 1995
+ Cook, Barry M
+
+ Computer peripherals
+ 1995
+ Cook, Barry M
+
+ 1
+ 43323
+
computer: field=subject vecf[1] += mult(3) / length(4);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=title vecf[1] += mult(6) / length(2);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](5.250000) * idf[1](0.082521) (43323);
score = relevance(43323);
-
-content: title computer peripherals author cook barry m
+
+ content: title computer peripherals author cook barry m
-
-Kids' computer book
-1994
-Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children
-Kids' computer book
-1994
-"For kids and their parents"--Cover
-Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children
-38051
-
+ Kids' computer book
+ 1994
+ Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children
+
+ Kids' computer book
+ 1994
+ "For kids and their parents"--Cover
+ Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children
+
+ 1
+ 38051
+
computer: field=description vecf[1] += mult(3) / length(27);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(3);
@@ -158,169 +172,185 @@ computer: field=title vecf[1] += mult(6) / length(3);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.611111) * idf[1](0.082521) (38051);
score = relevance(38051);
-
-content: title kids computer book
+
+ content: title kids computer book
-
-Computer friendly
-1999
-Steinbacher, Raymond
-Computer friendly
-1999
-Steinbacher, Raymond
-37134
-
+ Computer friendly
+ 1999
+ Steinbacher, Raymond
+
+ Computer friendly
+ 1999
+ Steinbacher, Raymond
+
+ 1
+ 37134
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=title vecf[1] += mult(6) / length(2);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134);
score = relevance(37134);
-
-content: title computer friendly author steinbacher raymond
+
+ content: title computer friendly author steinbacher raymond
-
-Computer misuse
-1999
-"Also published as Parliamentary Paper E 31AO"--T.p. verso
-Computer misuse
-1999
-"May 1999."
-"NZLC R54"--T.p. verso
-"Also published as Parliamentary Paper E 31AO"--T.p. verso
-37134
-
+ Computer misuse
+ 1999
+ "Also published as Parliamentary Paper E 31AO"--T.p. verso
+
+ Computer misuse
+ 1999
+ "May 1999."
+ "NZLC R54"--T.p. verso
+ "Also published as Parliamentary Paper E 31AO"--T.p. verso
+
+ 1
+ 37134
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=title vecf[1] += mult(6) / length(2);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134);
score = relevance(37134);
-
-content: title computer misuse
+
+ content: title computer misuse
-
-Computer networking
-a top-down approach featuring the Internet
-2001
-Ross, Keith W
-Computer networking
-a top-down approach featuring the Internet
-2001
-Ross, Keith W
-37134
-
+ Computer networking
+ a top-down approach featuring the Internet
+ 2001
+ Ross, Keith W
+
+ Computer networking
+ a top-down approach featuring the Internet
+ 2001
+ Ross, Keith W
+
+ 1
+ 37134
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=title vecf[1] += mult(6) / length(2);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134);
score = relevance(37134);
-
-content: title computer networking author ross keith w
+
+ content: title computer networking author ross keith w
-
-CorelDRAW 8 for Windows
-1998
-Davis, Phyllis
-Includes index
-CorelDRAW 8 for Windows
-1998
-Davis, Phyllis
-Includes index
-37134
-
+ CorelDRAW 8 for Windows
+ 1998
+ Davis, Phyllis
+ Includes index
+
+ CorelDRAW 8 for Windows
+ 1998
+ Davis, Phyllis
+ Includes index
+
+ 1
+ 37134
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134);
score = relevance(37134);
-
-content: title coreldraw for windows author davis phyllis
+
+ content: title coreldraw for windows author davis phyllis
-
-Quicken 2000 for the Mac
-the official guide
-2000
-Langer, Maria
-"Covers Quicken deluxe 2000 for the Mac"--Cover
-Quicken 2000 for the Mac
-the official guide
-2000
-Langer, Maria
-Includes index
-"Covers Quicken deluxe 2000 for the Mac"--Cover
-37134
-
+ Quicken 2000 for the Mac
+ the official guide
+ 2000
+ Langer, Maria
+ "Covers Quicken deluxe 2000 for the Mac"--Cover
+
+ Quicken 2000 for the Mac
+ the official guide
+ 2000
+ Langer, Maria
+ Includes index
+ "Covers Quicken deluxe 2000 for the Mac"--Cover
+
+ 1
+ 37134
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(1);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134);
score = relevance(37134);
-
-content: title quicken for the mac author langer maria
+
+ content: title quicken for the mac author langer maria
-
-Sicherheit und Schutz im Netz
-1998
-Sicherheit und Schutz im Netz
-1998
-37134
-
+ Sicherheit und Schutz im Netz
+ 1998
+
+ Sicherheit und Schutz im Netz
+ 1998
+
+ 1
+ 37134
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134);
score = relevance(37134);
-
-content: title sicherheit und schutz im netz
+
+ content: title sicherheit und schutz im netz
-
-Unix Secure Shell
-1999
-Carasik, Anne H
-Includes index
-Unix Secure Shell
-1999
-Carasik, Anne H
-Includes index
-37134
-
+ Unix Secure Shell
+ 1999
+ Carasik, Anne H
+ Includes index
+
+ Unix Secure Shell
+ 1999
+ Carasik, Anne H
+ Includes index
+
+ 1
+ 37134
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.500000) * idf[1](0.082521) (37134);
score = relevance(37134);
-
-content: title unix secure shell author carasik anne h
+
+ content: title unix secure shell author carasik anne h
-
-Eight International Conference on Computer Communications and Networks
-proceedings, 11-13 October 1999, Boston, Massachusetts
-1999
-"IEEE catalog number 99EX370"--T.p. verso
-Eight International Conference on Computer Communications and Networks
-proceedings, 11-13 October 1999, Boston, Massachusetts
-1999
-"IEEE catalog number 99EX370"--T.p. verso
-35071
-
+ Eight International Conference on Computer Communications and Networks
+ proceedings, 11-13 October 1999, Boston, Massachusetts
+ 1999
+ "IEEE catalog number 99EX370"--T.p. verso
+
+ Eight International Conference on Computer Communications and Networks
+ proceedings, 11-13 October 1999, Boston, Massachusetts
+ 1999
+ "IEEE catalog number 99EX370"--T.p. verso
+
+ 1
+ 35071
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(3);
computer: field=subject vecf[1] += mult(3) / length(3);
@@ -328,116 +358,126 @@ computer: field=title vecf[1] += mult(6) / length(8);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.250000) * idf[1](0.082521) (35071);
score = relevance(35071);
-
-content: title eight international conference on computer communications and networks
+
+ content: title eight international conference on computer communications and networks
-
-Building storage networks
-2000
-Farley, Marc
-Includes index
-Building storage networks
-2000
-Farley, Marc
-Includes index
-33008
-
+ Building storage networks
+ 2000
+ Farley, Marc
+ Includes index
+
+ Building storage networks
+ 2000
+ Farley, Marc
+ Includes index
+
+ 1
+ 33008
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(3);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008);
score = relevance(33008);
-
-content: title building storage networks author farley marc
+
+ content: title building storage networks author farley marc
-
-Complete CL
-the definitive control language programming guide
-1999
-Malaga, Ernie
-Includes index
-Complete CL
-the definitive control language programming guide
-1999
-Malaga, Ernie
-Includes index
-33008
-
+ Complete CL
+ the definitive control language programming guide
+ 1999
+ Malaga, Ernie
+ Includes index
+
+ Complete CL
+ the definitive control language programming guide
+ 1999
+ Malaga, Ernie
+ Includes index
+
+ 1
+ 33008
+
computer: field=subject vecf[1] += mult(3) / length(1);
computer: field=subject vecf[1] += mult(3) / length(3);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008);
score = relevance(33008);
-
-content: title complete cl author malaga ernie
+
+ content: title complete cl author malaga ernie
-
-3D games
-real-time rendering and software technology
-2001
-Watt, Alan H
-3D games
-real-time rendering and software technology
-2001
-Watt, Alan H
-33008
-
+ 3D games
+ real-time rendering and software technology
+ 2001
+ Watt, Alan H
+
+ 3D games
+ real-time rendering and software technology
+ 2001
+ Watt, Alan H
+
+ 1
+ 33008
+
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(3);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008);
score = relevance(33008);
-
-content: title d games author watt alan h
+
+ content: title d games author watt alan h
-
-Java applications strategies for the AS/400
-1999
-Denoncourt, Don
-Java applications strategies for the AS/400
-1999
-Denoncourt, Don
-33008
-
+ Java applications strategies for the AS/400
+ 1999
+ Denoncourt, Don
+
+ Java applications strategies for the AS/400
+ 1999
+ Denoncourt, Don
+
+ 1
+ 33008
+
computer: field=subject vecf[1] += mult(3) / length(3);
computer: field=subject vecf[1] += mult(3) / length(1);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008);
score = relevance(33008);
-
-content: title java applications strategies for the as author denoncourt don
+
+ content: title java applications strategies for the as author denoncourt don
-
-Mastering algorithms with C
-1999
-Loudon, Kyle
-"Useful techniques from sorting to encryption"--Cover
-Mastering algorithms with C
-1999
-Loudon, Kyle
-"Useful techniques from sorting to encryption"--Cover
-Includes index
-33008
-
+ Mastering algorithms with C
+ 1999
+ Loudon, Kyle
+ "Useful techniques from sorting to encryption"--Cover
+
+ Mastering algorithms with C
+ 1999
+ Loudon, Kyle
+ "Useful techniques from sorting to encryption"--Cover
+ Includes index
+
+ 1
+ 33008
+
computer: field=subject vecf[1] += mult(3) / length(3);
computer: field=subject vecf[1] += mult(3) / length(2);
computer: field=subject vecf[1] += mult(3) / length(2);
idf[1] = log(((1 + total(100))/termoccur(93));
computer: relevance += 100000 * vecf[1](4.000000) * idf[1](0.082521) (33008);
score = relevance(33008);
-
-content: title mastering algorithms with c author loudon kyle
+
+ content: title mastering algorithms with c author loudon kyle
\ No newline at end of file