View article
Visualization of O-O peroxo-like dimers in high-capacity layered oxides for Li-ion batteries Open
Peering into cathode layered oxides The quest for better rechargeable batteries means finding ways to pack more energy into a smaller mass or volume. Lithium layered oxides are a promising class of materials that could double storage capac…
View article
Quantum-inspired computational imaging Open
More to imaging than meets the eye Traditional imaging techniques involve peering down a lens and collecting as much light from the target scene as possible. That requirement can set limits on what can be seen. Altmann et al. review some o…
View article
Taking the Edge off with Espresso Open
We present the design of Espresso, Google's SDN-based Internet peering edge routing infrastructure. This architecture grew out of a need to exponentially scale the Internet edge cost-effectively and to enable application-aware routing at I…
View article
The Perdigão: Peering into Microscale Details of Mountain Winds Open
A grand challenge from the wind energy industry is to provide reliable forecasts on mountain winds several hours in advance at microscale (∼100 m) resolution. This requires better microscale wind-energy physics included in forecasting tool…
View article
neuPrint: An open access tool for EM connectomics Open
Due to advances in electron microscopy and deep learning, it is now practical to reconstruct a connectome, a description of neurons and the chemical synapses between them, for significant volumes of neural tissue. Smaller past reconstructi…
View article
Peering through the holes: the far-UV color of star-forming galaxies at<i>z</i>~ 3−4 and the escaping fraction of ionizing radiation Open
We aim to investigate the effect of the escaping ionizing radiation on the\ncolor selection of high redshift galaxies and identify candidate Lyman\ncontinuum (LyC) emitters. The intergalactic medium prescription of Inoue et\nal.(2014) and …
View article
From cloud computing to sky computing Open
We consider the future of cloud computing and ask how we might guide it towards a more coherent service we call sky computing. The barriers are more economic than technical, and we propose reciprocal peering as a key enabling step.
View article
Biscotti: A Ledger for Private and Secure Peer-to-Peer Machine Learning Open
Federated Learning is the current state of the art in supporting secure multi-party machine learning (ML): data is maintained on the owner's device and the updates to the model are aggregated through a secure protocol. However, this proces…
View article
Measuring User Influence on Twitter Using Modified K-Shell Decomposition Open
Social influence can be described as power - the ability of a person to influence the thoughts or actions of others. Identifying influential users on online social networks such as Twitter has been actively studied recently. In this paper,…
View article
Leveraging interconnections for performance Open
Today's large content providers (CP) are busy building out their service infrastructures or "peering edges" to satisfy the insatiable demand for content created by an ever-expanding Internet edge. One component of these serving infrastruct…
View article
United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale Open
Amplification Distributed Denial of Service (DDoS) attacks' traffic and harm are at an all-time high. To defend against such attacks, distributed attack mitigation platforms, such as traffic scrubbing centers that operate in peering locati…
View article
Biscotti - a ledger for private and secure peer to peer machine learning Open
Federated Learning is the current state of the art in supporting secure multi-party machine learning (ML): data is maintained on the owner's device and the updates to the model are aggregated through a secure protocol. However, this proces…
View article
Peering into buried interfaces with X-rays and electrons to unveil MgCO <sub>3</sub> formation during CO <sub>2</sub> capture in molten salt-promoted MgO Open
Significance The grand challenge of reducing CO 2 emissions requires the development of cost-effective CO 2 sorbents. Based on the theoretically obtainable weight-normalized CO 2 uptake, MgO-based materials promoted with molten salts are a…
View article
Peering into cosmic reionization: Ly<i>α</i> visibility evolution from galaxies at <i>z</i> = 4.5–8.5 with JWST Open
The resonant scattering interaction between Ly α photons and neutral hydrogen implies that a partially neutral intergalactic medium has the ability to significantly impact the detectability of Ly α emission in galaxies. Thus, the redshift …
View article
Anycast In context Open
Anycast is used to serve content including web pages and DNS, and anycast deployments are growing. However, prior work examining root DNS suggests anycast deployments incur significant inflation, with users often routed to suboptimal sites…
View article
Motion parallax in electric sensing Open
Significance Through specific movements, animals can structure the dynamics of sensory inputs to optimize perception. In vision, side-to-side peering can provide distance information from visual parallax. Weakly electric fish exhibit swimm…
View article
The geopolitics behind the routes data travel: a case study of Iran Open
In November 2019, in the wake of political demonstrations against the regime, Iran managed to selectively cut off most traffic from the global Internet while fully operating its own domestic network. It seemingly confirmed the main hypothe…
View article
Do You Care Who Flagged This Post? Effects of Moderator Visibility on Bystander Behavior Open
This study evaluates whether increasing information visibility around the identity of a moderator influences bystanders’ likelihood to flag subsequent unmoderated harassing comments. In a 2-day preregistered experiment conducted in a reali…
View article
Sibyl : A Practical Internet Route Oracle Open
Network operators measure Internet routes to troubleshoot problems, and researchers measure routes to characterize the Internet. However, they still rely on decades-old tools like traceroute, BGP route collectors, and Looking Glasses, all …
View article
Peering into the HIV reservoir Open
Summary The main obstacle to HIV eradication is the establishment of a long‐term persistent HIV reservoir. Although several therapeutic approaches have been developed to reduce and eventually eliminate the HIV reservoir, only a few have ac…
View article
Peering through the Kaleidoscope: Variation and Validity in Data Collection on Terrorist Attacks Open
The nature of underreporting terrorism in developing countries is often acknowledged but poorly understood. Focusing on India, we triangulate terrorist attacks captured across three media-based datasets (GTD, SATP, WITS) against official p…
View article
Migrant orangutan males use social learning to adapt to new habitat after dispersal Open
Dispersal has been suggested to be challenging, especially for species that heavily rely on social learning for knowledge acquisition. One of the obstacles that migrants face is learning how to cope with an unfamiliar, new habitat, which m…
View article
How Cloud Traffic Goes Hiding Open
The growing demand for an ever-increasing number of cloud services is profoundly transforming the Internet's interconnection or peering ecosystem, and one example is the emergence of "virtual private interconnections (VPIs)". However, due …
View article
The Cloud that Runs the Mobile Internet: A Measurement Study of Mobile Cloud Services Open
Mobile applications outsource their cloud infrastructure deployment and content delivery to cloud computing services and content delivery networks. Studying how these services, which we collectively denote Cloud Service Providers (CSPs), p…
View article
SDN Orchestration for Next Generation Inter-Networking: A Multipath Forwarding Approach Open
Increasing trend of peering at Internet exchange points (IXPs) provides a topological and network management advantage to the Internet service providers (ISPs) that is otherwise not possible through individual peering arrangements with the…
View article
Peering through loopholes, tracing conversions: remapping the transborder trade in electronic waste Open
Interdisciplinary studies of 'e-waste' (i.e. electronic waste and residues, also known as WEEE) penetrate to the heart of complex issues that drive present-day human geography: contested mappings; socio-material transformations; 'epistemic…
View article
Peering inside mutual adjustment: Rhythmanalysis of return to work from maternity leave Open
We peer inside the notion that small firm employment relations are a matter of mutual adjustment to conceptualise a key relation subject to negotiation as space–time–energy rhythms. Businesses must offer their goods and services in line wi…
View article
Challenges in inferring spoofed traffic at IXPs Open
Ascertaining that a network will forward spoofed traffic usually requires an active probing vantage point in that network, effectively preventing a comprehensive view of this global Internet vulnerability. Recently, researchers have propos…
View article
Cybersecurity Resilience Demonstration for Wind Energy Sites in Co-Simulation Environment Open
Sandia National Laboratories and Idaho National Laboratory deployed state-of-the-art cybersecurity technologies within a virtualized, cyber-physical wind energy site to demonstrate their impact on security and resilience. This work was des…
View article
Offloading Massive Data Onto Passenger Vehicles: Topology Simplification and Traffic Assignment Open
International audience