The Ninja architecture for robust Internet-scale systems and services
暂无分享,去创建一个
Ben Y. Zhao | Randy H. Katz | David E. Culler | Nikita Borisov | Eric A. Brewer | Matt Welsh | Steven D. Gribble | Zhuoqing Morley Mao | J. Robert von Behren | Steven E. Czerwinski | Anthony D. Joseph | Ramakrishna Gummadi | Z. Morley Mao | Steven J. Ross | Jon R. Hill | S. Gribble | S. Czerwinski | D. Culler | A. Joseph | R. Katz | M. Welsh | E. Brewer | R. Gummadi | N. Borisov | J. Behren | Jon R. Hill | Steven J. Ross
[1] Murray S. Mazer,et al. Pan-Browser Support for Annotations and Other Meta-Information on the World Wide Web , 1996, Comput. Networks.
[2] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[3] Bill N. Schilit,et al. Digestor: Device-Independent Access to the World Wide Web , 1997, Comput. Networks.
[4] Guy L. Steele,et al. The Java Language Specification , 1996 .
[5] Ben Y. Zhao,et al. Xset: A lightweight database for internet applications , 2000 .
[6] Eric A. Brewer,et al. System support for scalable and fault tolerant Internet services , 1999, Distributed Syst. Eng..
[7] Charles L. Seitz,et al. Myrinet: A Gigabit-per-Second Local Area Network , 1995, IEEE Micro.
[8] David E. Culler,et al. An Implementation and Analysis of the Virtual Interface Architecture , 1998, Proceedings of the IEEE/ACM SC98 Conference.
[9] David E. Culler,et al. A case for NOW (networks of workstation) , 1995, PODC '95.
[10] Anton Sauer,et al. European activities for EDA standardization , 1992, IEEE Micro.
[11] Cindy Melzer,et al. Wireless Application Protocol (WAP) , 2000 .
[12] Armando Fox,et al. Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.
[13] Toshiaki Yasue,et al. Design, implementation, and evaluation of optimizations in a just-in-time compiler , 1999, JAVA '99.
[14] Eric A. Brewer,et al. Cluster-based scalable network services , 1997, SOSP.
[15] John V. Guttag,et al. ANTS: a toolkit for building and dynamically deploying network protocols , 1998, 1998 IEEE Open Architectures and Network Programming.
[16] David A. Wagner,et al. The Ninja Jukebox , 1999, USENIX Symposium on Internet Technologies and Systems.
[17] David E. Culler,et al. Scalable, distributed data structures for internet service construction , 2000, OSDI.
[18] Bruce Zenel. A general purpose proxy filtering mechanism applied to the mobile environment , 1999, Wirel. Networks.
[19] Nikita Borisov,et al. Querying Large Collections of Music for Similarity , 2000 .
[20] Guy Eddon,et al. Inside Distributed COM , 1998 .
[21] K. Eric Drexler,et al. Markets and computation: agoric open systems , 1988 .
[22] Kimmo E. E. Raatikainen,et al. Enhanced Services for World-Wide Web in Mobile WAN Environment , 1996 .
[23] Eric A. Brewer,et al. NinjaMail: the design of a high-performance clustered, distributed e-mail system , 2000, Proceedings 2000. International Workshop on Parallel Processing.
[24] David E. Culler,et al. The multispace: an evolutionary platform for infrastructural services , 1999 .
[25] Eric A. Brewer,et al. Adapting to network and client variability via on-demand dynamic distillation , 1996, ASPLOS VII.
[26] Satoshi Matsuoka,et al. OpenJIT—A Reflective Java JIT Compiler , 2000 .
[27] David E. Culler,et al. Jaguar: enabling efficient communication and I/O in Java , 2000, Concurr. Pract. Exp..
[28] Steven McCanne,et al. An active service framework and its application to real-time multimedia transcoding , 1998, SIGCOMM '98.
[29] David E. Culler,et al. Jaguar: enabling efficient communication and I/O in Java , 2000 .
[30] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[31] Bernardo A. Huberman,et al. The ecology of computation , 1988, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[32] Liwu Li,et al. The Java Language , 1998 .
[33] Jim Miller,et al. Application-Specific Proxy Servers as HTTP Stream Transducers , 1996, World Wide Web journal.