2013 Apia International Sydney – Women's Doubles
Květa Peschke and Katarina Srebotnik were the defending champions, but decided not to participate together.
Peschke played alongside Anna-Lena Grönefeld, but lost to Sara Errani and Roberta Vinci in the quarterfinals, while Srebotnik partnered up with Nadia Petrova.
Srebotnik successfully defended her title, defeating Errani and Vinci in the final, 6–3, 6–4.
Women's Doubles | |
---|---|
2013 Apia International Sydney | |
Champions | |
Runners-up | |
Final score | 6–3, 6–4 |
Seeds
Sara Errani / Roberta Vinci (Final) Andrea Hlaváčková / Lucie Hradecká (Semifinals) Maria Kirilenko / Lisa Raymond (Quarterfinals) Liezel Huber / Sania Mirza (Quarterfinals)
Draw
Key
- Q = Qualifier
- WC = Wild Card
- LL = Lucky Loser
- Alt = Alternate
- SE = Special Exempt
- PR = Protected Ranking
- ITF = ITF entry
- JE = Junior Exempt
- w/o = Walkover
- r = Retired
- d = Defaulted
Draw
First Round | Quarterfinals | Semifinals | Final | ||||||||||||||||||||||||
1 | 6 | 6 | |||||||||||||||||||||||||
2 | 1 | 1 | 7 | 2 | [18] | ||||||||||||||||||||||
6 | 4 | [2] | 5 | 6 | [16] | ||||||||||||||||||||||
4 | 6 | [10] | 1 | 7 | 6 | ||||||||||||||||||||||
3 | 7 | 6 | 5 | 4 | |||||||||||||||||||||||
5 | 4 | 3 | 4 | 2 | |||||||||||||||||||||||
2 | 6 | [10] | 6 | 6 | |||||||||||||||||||||||
WC | 6 | 4 | [4] | 1 | 3 | 4 | |||||||||||||||||||||
1 | 3 | 6 | 6 | ||||||||||||||||||||||||
6 | 6 | 6 | 7 | ||||||||||||||||||||||||
6 | 0 | [9] | 4 | 2 | 5 | ||||||||||||||||||||||
4 | 1 | 6 | [11] | 6 | 6 | ||||||||||||||||||||||
2 | 66 | 2 | 4 | 3 | |||||||||||||||||||||||
6 | 78 | 2 | 4 | ||||||||||||||||||||||||
64 | 5 | 2 | 6 | 6 | |||||||||||||||||||||||
2 | 77 | 7 |
gollark: Anyway, I meant security regardiing "you can't just send a bunch of wireless messages and get all the moneys".
gollark: The OpenSecurity ones are wireless, don't know about "SecurityCraft".
gollark: You'd even get no users!
gollark: You can even start your own node with cool different configs!
gollark: Okay, even if you don't need ATM-stolen levels of security, it still needs to be ridiculously secure.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.