1994 Virginia Slims of Houston – Singles
Conchita Martínez was the defending champion but lost in the semifinals to Sabine Hack.
Singles | |
---|---|
1994 Virginia Slims of Houston | |
1993 Champion | ![]() |
Champion | ![]() |
Runner-up | ![]() |
Final score | 7–5, 6–4 |
Hack won in the final 7–5, 6–4 against Mary Pierce.
Seeds
A champion seed is indicated in bold text while text in italics indicates the round in which that seed was eliminated. The top four seeds received a bye to the second round.
Conchita Martínez (Semifinals) Martina Navratilova (Second Round) Magdalena Maleeva (Second Round) Mary Pierce (Final) Lindsay Davenport (Second Round) Zina Garrison-Jackson (First Round) Sabine Hack (Champion) Barbara Rittner (First Round)
Draw
Key
- Q = Qualifier
- WC = Wild Card
- LL = Lucky Loser
- Alt = Alternate
- SE = Special Exempt
- PR = Protected Ranking
- ITF = ITF entry
- JE = Junior Exempt
- w/o = Walkover
- r = Retired
- d = Defaulted
Final
Final | ||||||
7 | ![]() | 7 | 6 | |||
4 | ![]() | 5 | 4 |
Section 1
First Round | Second Round | Quarterfinals | Semifinals | ||||||||||||||||||||||||
1 | ![]() | 6 | 6 | ||||||||||||||||||||||||
![]() | 1 | 4 | ![]() | 3 | 2 | ||||||||||||||||||||||
![]() | 6 | 6 | 1 | ![]() | 6 | 6 | |||||||||||||||||||||
LL | ![]() | 0 | 1 | Q | ![]() | 3 | 1 | ||||||||||||||||||||
Q | ![]() | 6 | 6 | Q | ![]() | 6 | 6 | ||||||||||||||||||||
![]() | 2 | 1 | 5 | ![]() | 3 | 4 | |||||||||||||||||||||
5 | ![]() | 6 | 6 | 1 | ![]() | 6 | 4 | 4 | |||||||||||||||||||
7 | ![]() | 2 | 6 | 6 | |||||||||||||||||||||||
3 | ![]() | 6 | 6 | 6 | |||||||||||||||||||||||
Q | ![]() | 6 | 6 | Q | ![]() | 4 | 7 | 7 | |||||||||||||||||||
![]() | 2 | 3 | Q | ![]() | 2 | 1 | |||||||||||||||||||||
![]() | 3 | 6 | 6 | 7 | ![]() | 6 | 6 | ||||||||||||||||||||
WC | ![]() | 6 | 4 | 3 | ![]() | 1 | 0 | ||||||||||||||||||||
![]() | 4 | 6 | 3 | 7 | ![]() | 6 | 6 | ||||||||||||||||||||
7 | ![]() | 6 | 4 | 6 |
Section 2
First Round | Second Round | Quarterfinals | Semifinals | ||||||||||||||||||||||||
6 | ![]() | 2 | 4 | ||||||||||||||||||||||||
![]() | 6 | 6 | ![]() | 5 | 6 | 2 | |||||||||||||||||||||
Q | ![]() | 5 | 0 | ![]() | 7 | 4 | 6 | ||||||||||||||||||||
![]() | 7 | 6 | ![]() | 0 | 1 | ||||||||||||||||||||||
![]() | 3 | 3 | 4 | ![]() | 6 | 6 | |||||||||||||||||||||
![]() | 6 | 6 | ![]() | 1 | 4 | ||||||||||||||||||||||
4 | ![]() | 6 | 6 | ||||||||||||||||||||||||
4 | ![]() | 6 | 6 | ||||||||||||||||||||||||
8 | ![]() | 2 | 4 | WC | ![]() | 2 | 2 | ||||||||||||||||||||
WC | ![]() | 6 | 6 | WC | ![]() | 6 | 6 | ||||||||||||||||||||
![]() | 6 | 6 | ![]() | 4 | 3 | ||||||||||||||||||||||
![]() | 3 | 4 | WC | ![]() | 6 | 6 | |||||||||||||||||||||
![]() | 6 | 3 | 4 | Q | ![]() | 2 | 4 | ||||||||||||||||||||
Q | ![]() | 3 | 6 | 6 | Q | ![]() | 1 | 6 | 6 | ||||||||||||||||||
2 | ![]() | 6 | 4 | 3 | |||||||||||||||||||||||
gollark: It might actually be worth implementing a better signing/trust system than "everything is signed with the master key".
gollark: I could probably make the PX signing program stick `return` on the end, but then I would have to revoke existing programs and I didn't add a mechanism for that.
gollark: You know, most of the sandbox exploits have just focused on finding the many logic errors/weird environment issues, not exploiting crypto. This is an interesting change, at least.
gollark: Or sticking `return` at the end?
gollark: Should I be limiting signature length or something?
External links
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.