- ...project
- Project home page:
https://ninja.cs.berkeley.edu
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...functionality.
- JDK 1.2 includes hooks so you can encrypt RMI
communications with SSL, if you have a SSL library; but we do not know of
any free SSL implementations for Java [8].
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...database
- We
actually used a distributed, persistent hash table to keep track of user
preferences. This hash table (described in [9]) is partitioned
and replicated across nodes in a dedicated workstation cluster, and
provides the DJ fault-tolerant access to the persistent user preferences
data.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...songs.
- Lycos itself,
of course, does not illegally publish copyrighted material.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.