2010 Brisbane International – Women's Doubles
Anna-Lena Grönefeld and Vania King were the defending champions, but they lost to Timea Bacsinszky and Tathiana Garbin in the first round.
Women's Doubles | |
---|---|
2010 Brisbane International | |
Champions | |
Runners-up | |
Final score | 2–6, 7–6(3), 10–4 |
Andrea Hlaváčková and Lucie Hradecká won in the final 2–6, 7–6(3), 10–4, against Melinda Czink and Arantxa Parra Santonja.
Seeds
Alla Kudryavtseva / Ekaterina Makarova (First Round) Anna-Lena Grönefeld / Vania King (First Round) Akgul Amanmuradova / Chan Yung-jan (Semifinals) Klaudia Jans / Alicja Rosolska (First Round)
Draw
Key
- Q = Qualifier
- WC = Wild Card
- LL = Lucky Loser
- Alt = Alternate
- SE = Special Exempt
- PR = Protected Ranking
- ITF = ITF entry
- JE = Junior Exempt
- w/o = Walkover
- r = Retired
- d = Defaulted
Draw
First Round | Quarterfinals | Semifinals | Finals | ||||||||||||||||||||||||
1 | 6 | 4 | [8] | ||||||||||||||||||||||||
4 | 6 | [10] | 62 | 2 | |||||||||||||||||||||||
6 | 2 | [6] | 7 | 6 | |||||||||||||||||||||||
3 | 6 | [10] | 2 | 6 | [10] | ||||||||||||||||||||||
3 | 2 | 6 | [12] | 3 | 6 | 4 | [7] | ||||||||||||||||||||
6 | 3 | [10] | 3 | 6 | 6 | ||||||||||||||||||||||
WC | 2 | 5 | 2 | 1 | |||||||||||||||||||||||
6 | 7 | 2 | 7 | [10] | |||||||||||||||||||||||
WC | 4 | 2 | 6 | 63 | [4] | ||||||||||||||||||||||
6 | 6 | 5 | 6 | [10] | |||||||||||||||||||||||
6 | 6 | 7 | 4 | [12] | |||||||||||||||||||||||
4 | 4 | 1 | 6 | 6 | |||||||||||||||||||||||
1 | 1 | 2 | 1 | ||||||||||||||||||||||||
6 | 6 | 7 | 6 | ||||||||||||||||||||||||
7 | 4 | [12] | 5 | 0 | |||||||||||||||||||||||
2 | 5 | 6 | [10] |
gollark: ddg! chunks
gollark: What?
gollark: Anyway, norcam ekam ciryl, is just size probably fine for now™?
gollark: And yet they still have to do chunks?
gollark: See, using SQLite has a bunch of advantages:- faster than filesystems on smaller blobby data- relational and not just effectively a mapping of path to blobs (or textual data as git dislikes blobs)- eventually can swap in SQLCipher and encrypt everything
External links
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.