{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T06:29:03Z","timestamp":1744871343784},"reference-count":51,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2001,3,1]],"date-time":"2001-03-01T00:00:00Z","timestamp":983404800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2001,3]]},"DOI":"10.1016\/s1389-1286(00)00179-1","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T19:45:13Z","timestamp":1027626313000},"page":"473-497","source":"Crossref","is-referenced-by-count":159,"title":["The Ninja architecture for robust Internet-scale systems and services"],"prefix":"10.1016","volume":"35","author":[{"given":"Steven D","family":"Gribble","sequence":"first","affiliation":[]},{"given":"Matt","family":"Welsh","sequence":"additional","affiliation":[]},{"given":"Rob","family":"von Behren","sequence":"additional","affiliation":[]},{"given":"Eric A","family":"Brewer","sequence":"additional","affiliation":[]},{"given":"David","family":"Culler","sequence":"additional","affiliation":[]},{"given":"N","family":"Borisov","sequence":"additional","affiliation":[]},{"given":"S","family":"Czerwinski","sequence":"additional","affiliation":[]},{"given":"R","family":"Gummadi","sequence":"additional","affiliation":[]},{"given":"J","family":"Hill","sequence":"additional","affiliation":[]},{"given":"A","family":"Joseph","sequence":"additional","affiliation":[]},{"given":"R.H","family":"Katz","sequence":"additional","affiliation":[]},{"given":"Z.M","family":"Mao","sequence":"additional","affiliation":[]},{"given":"S","family":"Ross","sequence":"additional","affiliation":[]},{"given":"B","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(00)00179-1_BIB1","unstructured":"America Online, The AOL Instant Messaging (AIM) Network. http:\/\/aim.aol.com\/"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB2","doi-asserted-by":"crossref","unstructured":"E. Amir, S. McCanne, R. Katz, An active service framework and its application to real-time multimedia transcoding, in: Proceedings of ACM SIGCOMM '98, October 1998, pp. 178\u2013189","DOI":"10.1145\/285237.285281"},{"issue":"1","key":"10.1016\/S1389-1286(00)00179-1_BIB3","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/40.342018","article-title":"A case for NOW (networks of workstations)","volume":"12","author":"Anderson","year":"1995","journal-title":"IEEE Micro."},{"key":"10.1016\/S1389-1286(00)00179-1_BIB4","unstructured":"BEA Systems, BEA WebLogic Application Servers. http:\/\/www.bea.com\/products\/weblogic\/"},{"issue":"7","key":"10.1016\/S1389-1286(00)00179-1_BIB5","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","article-title":"Space\/time tradeoffs in hash coding with allowable errors","volume":"13","author":"Bloom","year":"1970","journal-title":"Commun. ACM"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB6","doi-asserted-by":"crossref","unstructured":"C. Brooks, M.S. Mazer, S. Meeks, J. Miller, Application-specific proxy servers as HTTP stream transducers, in: Proceedings of the Fourth International World Wide Web Conference, December 1995","DOI":"10.1145\/3592626.3592670"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB7","doi-asserted-by":"crossref","unstructured":"P. Buonadonna, A. Geweke, D. Culler, An implementation and analysis of the virtual interface architecture, in: Proceedings of SC'98, November 1998","DOI":"10.1109\/SC.1998.10052"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB8","unstructured":"Certicom, Elliptic Curve Cryptography for Palm VII. http:\/\/www.certicom.com\/press\/98\/dec0298.htm, December 1998"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB9","doi-asserted-by":"crossref","unstructured":"Y. Chawathe, E.A. Brewer, System support for scalable and fault tolerant Internet services, in: Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing (Middleware '98), Lake District, UK, September 1998","DOI":"10.1007\/978-1-4471-1283-9_5"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB10","doi-asserted-by":"crossref","unstructured":"S. Czerwinski, B.Y. Zhao, T. Hodes, A. Joseph, R. Katz, An architecture for a secure service discovery service, in: Proceedings of MobiCom '99, ACM, Seattle, WA, August 1999","DOI":"10.1145\/313451.313462"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB11","unstructured":"Dallas Semiconductor Designs, The Java Ring. http:\/\/www.ibutton.com\/store\/jringfacts.html"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB12","unstructured":"Datek Corporation. Datek Online Trading Service. http:\/\/www.datek.com, January 2000"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB13","unstructured":"UC Berkeley CS Division, The Millennium Project (home page), 1999. http:\/\/millennium.berkeley.edu"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB14","series-title":"Inside Distributed COM","author":"Eddon","year":"1998"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB15","doi-asserted-by":"crossref","unstructured":"A. Fox, S.D. Gribble, Y. Chawathe, E.A. Brewer, P. Gauthier, Cluster-based scalable network services, in: Proceedings of the 16th ACM Symposium on Operating Systems Principles, St.-Malo, France, October 1997","DOI":"10.1145\/268998.266662"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB16","doi-asserted-by":"crossref","unstructured":"A. Fox, S.D. Gribble, Security on the move: indirect authentication using Kerberos, in: Proceedings of the Second International Conference on Wireless Networking and Mobile Computing (MobiCom '96), Rye, NY, November 1996","DOI":"10.1145\/236387.236439"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB17","doi-asserted-by":"crossref","unstructured":"A. Fox, S.D. Gribble, E.A. Brewer, E. Amir, Adapting to network and client variability via on-demand dynamic distillation, in: Procedings of the Seventh International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-VII), Cambridge, MA, October 1996","DOI":"10.1145\/237090.237177"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB18","unstructured":"I. Goldberg, S.D. Gribble, D. Wagner, E.A. Brewer, The Ninja Jukebox, in: Proceedings of the Second USENIX Symposium on Internet Technologies and Systems, Boulder, CO, USA, October 1999"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB19","series-title":"The Java Language Specification","author":"Gosling","year":"1996"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB20","unstructured":"S.D. Gribble, E.A. Brewer, J.M. Hellerstein, D. Culler, Scalable, distributed data structures for Internet service construction, in: Proceedings of the Fourth USENIX Symposium on Operating System Design and Implementation (OSDI 2000), San Diego, CA, USA, October 2000"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB21","unstructured":"S.D. Gribble, M. Welsh, E.A. Brewer, D. Culler, The MultiSpace: an evolutionary platform for infrastructural services, in: Proceedings of the 1999 Usenix Annual Technical Conference, Monterey, CA, USA, June 1999"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB22","unstructured":"Hewlett Packard, eSpeak: The Universal Language of E-Services. http:\/\/www.e-speak.net\/"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB23","unstructured":"J. Hill, S. Ross, D. Culler, A. Joseph, A security architecture for the post-PC world. Available at http:\/\/www.cs.berkeley.edu\/\u223cjhill\/papers\/SecPaper.ps"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB24","unstructured":"IBM Corporation, IBM WebSphere Application Server. http:\/\/www-4.ibm.com\/software\/webservers\/"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB25","unstructured":"InfoWorld, Boeing to Put Net in the Air. http:\/\/www.infoworld.com\/articles\/hn\/xml\/00\/04\/27\/000427enboeing.xml, April 2000"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB26","unstructured":"InfoWorld, E-cars take to the streets; wireless connections link road warriors to the Net. http:\/\/www.infoworld.com\/articles\/hn\/xml\/00\/03\/13\/000313hnauto.xml, March 2000"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB27","doi-asserted-by":"crossref","unstructured":"Kazuaki Ishizaki, Motohiro Kawahito, Toshiaki Yasue, Mikio Takeuchi, Takeshi Ogasawara, Toshio Suganuma, Tamiya Onodera, Hideaki Komatsu, and Toshio Nakatani, Design, implementation, and evaluation of optimizations in a just-in-time compiler, in: Proceedings of the ACM 1999 Java Grande Conference, June 1999","DOI":"10.1145\/304065.304111"},{"issue":"1","key":"10.1016\/S1389-1286(00)00179-1_BIB28","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1023\/A:1010090405266","article-title":"A roadmap of agent research and development","volume":"1","author":"Jennings","year":"1998","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB29","unstructured":"M. Liljeberg et al., Enhanced services for World Wide Web in mobile WAN environment, Technical Report C-1996-28, University of Helsinki CS Department, April 1996"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB30","unstructured":"S. Matsuoka, H. Ogawa, K. Shimura, Y. Kimura, K. Hotta, H. Takagi, OpenJIT: a reflective Java JIT compiler, in: Proceedings of OOPSLA '98, Workshop on Reflective Programming in C++ and Java, 1998. http:\/\/openjit.is.titech.ac.jp\/"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB31","series-title":"The Ecology of Computation","article-title":"Markets and computation: agorics open systems","author":"Miller","year":"1998"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB32","unstructured":"Myricom Corporation, Myrinet: a gigabit per second local area network, IEEE Micro, February 1995"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB33","unstructured":"PC World Communications, April 2000. http:\/\/www.pcworld.com\/pcwtoday\/article\/0,1510,16045+1+0,00.html"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB34","unstructured":"Y. Sato, Dele Gate Server, March 1994. http:\/\/wall.etl.go.jp\/delegate\/"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB35","doi-asserted-by":"crossref","unstructured":"M.A. Schickler, M.S. Mazer, C. Brooks, Pan-browser support for annotations and other meta-information on the World Wide Web, in: Proceedings of the Fifth International World Wide Web Conference (WWW-5), May 1996","DOI":"10.1016\/0169-7552(96)00060-8"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB36","doi-asserted-by":"crossref","unstructured":"B. Schilit, T. Bickmore, Digestor: device-independent access to the World Wide Web, in: Proceedings of the Sixth International World Wide Web Conference (WWW-6), Santa Clara, CA, April 1997","DOI":"10.1016\/S0169-7552(97)00026-3"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB37","unstructured":"Sun Microsystems, Enterprise Java Beans Technology. http:\/\/java.sun.com\/products\/ejb\/"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB38","unstructured":"Sun Microsystems, Java Remote Method Invocation \u2013Distributed Computing for Java. http:\/\/java.sun.com\/"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB39","unstructured":"Sun Microsystems, Jini Connection Technology. http:\/\/www.sun.com\/jini\/"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB40","unstructured":"The Object Management Group (OMG), The Common Object Request Broker Architecture. http:\/\/www.corba.org"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB41","unstructured":"Virtual Interface Architecture Organization, Virtual Interface Architecture Specification version 1.0, December 1997. http:\/\/www.viarch.org"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB42","doi-asserted-by":"crossref","unstructured":"J.R. von Behren, S. Czerwinski, A.D. Joseph, E.A. Brewer, J. Kubiatowicz, NinjaMail: the design of a high-performance clustered, distributed e-mail system, in: Proceedings of the First International Workshop on Scalable Web Services, Toronto, Canada, August 2000","DOI":"10.1109\/ICPPW.2000.869099"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB43","unstructured":"J. Waldo, Jini Architecture Overview. Available at http:\/\/java.sun.com\/products\/jini\/whitepapers"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB44","unstructured":"WAP Forum, Wireless Application Protocol (WAP) Forum. http:\/\/www.wapforum.org"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB45","unstructured":"M. Welsh, N. Borisov, J. Hill, R. von Behren, A. Woo, Querying large collections of music for similarity. Technical Report UCB\/CSD-00-1096, U.C. Berkeley Computer Science Division, November 1999"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB46","doi-asserted-by":"crossref","unstructured":"M. Welsh, D. Culler, Jaguar: enabling efficient communication and I\/O in Java, Concurrency: Practice and Experience, 2000, Java for High-Performance Network Computing (special issue). http:\/\/www.cs.berkeley.edu\/\u223cmdw\/papers\/jaguar-journal.ps.gz","DOI":"10.1002\/1096-9128(200005)12:7<519::AID-CPE497>3.0.CO;2-M"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB47","doi-asserted-by":"crossref","unstructured":"D.J. Wetherall, J. Guttag, D.L. Tennenhouse, ANTS: a toolkit for building and dynamically deploying network protocols, in: Proceedings of IEEE OPENARCH'98, San Francisco, CA, April 1998","DOI":"10.1109\/OPNARC.1998.662048"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB48","unstructured":"Yahoo Finance, Yahoo Finance Investment Challenge, 2000. http:\/\/contest.finance.yahoo.com\/t1?u\/"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB49","unstructured":"Ka-Ping Yee, Shoduoka Mediator Service, 1995. http:\/\/www.shoduoka.com"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB50","doi-asserted-by":"crossref","unstructured":"Bruce Zenel, Dan Duchamp, A general purpose proxy filtering mechanism applied to the mobile environment, in: Proceedings of the Third Annual ACM\/IEEE Conference on Mobile Computing and Networking (Mobicom '97), ACM, New York, USA, 1997","DOI":"10.1145\/262116.262153"},{"key":"10.1016\/S1389-1286(00)00179-1_BIB51","unstructured":"B.Y. Zhao, A.D. Joseph, XSet: a lightweight database for Internet applications, May 2000. http:\/\/www.cs.berkeley.edu\/\u223cravenben\/publications\/saint.pdf"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600001791?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600001791?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T07:39:06Z","timestamp":1704094746000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128600001791"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,3]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2001,3]]}},"alternative-id":["S1389128600001791"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(00)00179-1","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2001,3]]}}}