Check out the new USENIX Web site. next up previous
Next: About this document Up: The Ninja Jukebox Previous: 6 Conclusions

References

1
K. Almeroth and M. Ammar. The Interactive Multimedia Jukebox (IMJ): A New Paradigm for the On-Demand Delivery of Audio/Video. In Seventh International World Wide Web Conference (WWW-7). World Wide Web Consortium, April 1998.

2
K. Almeroth and M. Ammar. An Alternative Paradigm for Scalable On-Demand Applications: Evaluating and Deploying the Interactive Multimedia Jukebox. IEEE Transactions on Knowledge and Data Engineering Special Issue on Web Technologies, July/August 1999.

3
Thomas E. Anderson, David E. Culler, and David Patterson. A Case for NOW (Networks of Workstations). IEEE Micro, 12(1):54-64, February 1995.

4
Andrew D. Birrell and Bruce Jay Nelson. Implementing Remote Procedure Call. ACM Transactions on Computing Systems, 2(1):39-59, February 1984.

5
William J. Bolosky, Joseph S. Barrera III, Richard P. Draves, Robert P. Fitzgerald, Garth A. Gibson, Michael B. Jones, Steven P. Levi, Nathan P. Myhrvold, and Richard F. Rashid. The Tiger Video Fileserver. Technical Report MSR-TR-96-09, Microsoft Research, Advanced Technology Division, April 1996.

6
The World Wide Web Consortium. Extensible Markup Language (XML) version 1.0. https://www.w3.org/XML, Feb 1998.

7
Stephen E. Deering, Deborah Estrin, Dino Farinacci, Van Jacobson, Ching-Gung Liu, and Liming Wei. An Architecture for Wide-Area Multicast Routing. In Proceedings of SIGCOMM '94, University College London, London, U.K., September 1994.

8
Li Gong. New Security Architectural Directions for Java. In Proceedings of IEEE COMPCON. IEEE, February 1997.

9
Steven D. Gribble. Simplifying Cluster-Based Internet Service Construction with Scalable Distributed Data Structures. Ph.D. Qualifying exam, available at https://www.cs.berkeley.edu/ gribble/papers/quals/sdds-cluster.ps.gz, April 1999.

10
Steven D. Gribble, Matt Welsh, Eric A. Brewer, and David Culler. The MultiSpace: an Evolutionary Platform for Infrastructural Services. In Proceedings of the 1999 Usenix Annual Technical Conference, Monterey, California, USA, Jun 1999.

11
Nullsoft Inc. SHOUTcast Service home page. https://www.shoutcast.com/.

12
WebMethods Inc. WIDL--Web Interface Description Language. World Wide Web Journal, 1997. Special issue--XML: Principles, Tools, and Techniques.

13
Game Spy Industries. The MP3Spy Client home page. https://www.mp3spy.com/.

14
Secure Digital Music Initiative. SDMI Portable Device Specification, part 1, version 1.0, July 1999. https://www.sdmi.org/.

15
Ti Kan and Steve Scherf. CDDB Specificaton. https://www.cddb.com/ftp/cddb-docs/cddb_howto.gz.

16
Thomas Kistlera and Hannes Marais. WebL--A Programming Language for the Web. In Computer Networks and ISDN Systems (Proceedings of the WWW7 Conference), volume 30, pages 259-270, Brisbane, Australia, April 1998.

17
Sun Microsystems. Java Remote Method Invocation--Distributed Computing for Java. https://java.sun.com/.

18
R.M. Needham and M.D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. CACM, 21(12):993-999, December 1978.

19
Firefly Network. Firefly Passport. https://www.firefly.net, 1995.

20
The Object Management Group (OMG). The Common Object Request Broker: Architecture and Specification, February 1998. https://www.omg.org/library/c2indx.html.

21
Jim Waldo. Jini Architecture Overview. Available at https://java.sun.com/products/jini/whitepapers.

22
Edward Wobber, Martin Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos Operating System. ACM Transactions on Computer Systems, 12(1):3-32, Feb 1994.



The Ninja Jukebox, available from https://www.cs.berkeley.edu/~gribble/papers/papers.html