自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

FeelTouch Labs

Best or Nothing!

  • 博客(14)
  • 资源 (35)
  • 收藏
  • 关注

原创 純虛函數和抽像類

纯虚函数的概念引入的原因:–在定义一个基类时,有时会遇到无法定义基类中虚函数的具体实现,其实现完全依赖于其不同的派生类;或者必须为它的派生类提供一个公共的界面。如:一个“形态类”由于没有确定的具体形态,其计算面积的函数也就无法实现。这时可将基类中的虚函数声明为纯虚函数。定义:–纯虚函数是一个在基类中说明的虚函数,为各派生类提供一个公共界面,在基类中没有定义,要求任何派生类都定义

2013-06-30 17:04:51 1077

原创 虛函數的使用(VC++)

为什么要引入虚函数?      根据赋值兼容规则,指向基类对象的指针都可以指向它的公有派生类对象,若试图指向它的私有派生类对象是被禁止的。反之,不能将一个声明为指向派生类对象的指针指向其基类的一个对象。      声明为指向基类对象的指针,当它指向公有派生类对象时,只能利用它来直接访问派生类中从基类继承来的成员,不能直接访问公有派生类中特定的成员。若想访问其公有派生类的特定成员,可以将基类

2013-06-30 16:55:26 1514

原创 運算符的重載

运算符重载就是赋予系统预定义的运算符多重含义,使同一个运算符作用于不同类型的数据导致不同的行为。作用:–使得系统预定义的运算符能作用于用户自定义类型的数据,进行类似运算。–运算符重载的实质就是函数重载。将指定的运算表达式转化为对运算符函数的调用,运算对象转化为运算符函数的实参。编译器遇到重载运算符时调用对应的运算符重载函数,从而完成该运算符应做的操作。运算符重载规则:–

2013-06-30 16:26:18 1456

原创 普通成員函數的的重載形式

2013-06-30 16:14:37 933

原创 多態性使用(VC++)

多態性:多態性是指發出的同一條消息,被不同類型的對象接收時可能產生完全不同的行為。消息主要是指對類的成員函數的調用,行為主要是指成員函數的不同實現。多態性是實現“一種接口,多種方法”的技術。這裡“一種接口”指的是相同的函數名,“多種方法”指多種函數實現。多態的類型:主要兩種:編譯時的多態和運行的多態編譯時的多態是指通過函數的重載或運算符的重載來實現;運行時的多肽是通過虛

2013-06-30 12:11:07 1448

原创 NS2仿真過程中遇到的問題和相關解決方案

因為畢業設計課題的要求,要用S2仿真軟件進行TCP方案的仿真和驗證,在此過程中,遇到了一些問題,也找到了一些解決辦法,現在記錄下來,持續更新中.....問題一:修改完NS2核心模塊(C++)部分後,重新運行TCL文件沒有任何效果。問題逐步解答:1,經過初步檢查後發現是因為,修改完核心模塊後,我沒有重新編譯生成新的.O文件所致。2,修改完之後,進行make經歷了一些時間等待後,重新運

2013-06-29 21:40:35 1880

转载 vi编辑器命令应用

vi编辑器是所有Unix及Linux系统下标准的编辑器,介绍一下它的用法和一小部分指令。由于对Unix及Linux系统的任何版本,vi编辑器是完全相同的,因此您可以在其他任何介绍vi的地方进一步了解它。Vi也是Linux中最基本的文本编辑器,学会它后,您将在Linux的世界里畅行无阻。在所有的命令执行前,先按Esc1、vi的基本概念   基本上vi可以分为三种状态,分别是命令模式(

2013-06-08 22:11:17 1190

原创 Shell编程基础

计算机语言从执行过程的角度可以分为编译性语言和脚本语言。编译性语言是指编写完成后直接通过编译器转换成计算机代码生成可执行文件,以后每次执行时就不再进行转换了,直接执行可执行文件就可。脚本语言是指编写完成后不用转换成计算机代码,而是每次执行时在进行代码转换工作,但是脚本语言的好处是直接进行修改。1)shell脚本语法shell脚本通常使用一个文本编辑器就可以完成。2)shell脚本执

2013-06-08 21:55:08 1066

原创 Shell变量的使用

1.变量的种类主要分以下几种:1)局部变量:只在一定范围内使用的变量,旨在设定此变量的Shell中有用。2)环境变量:在整个系统环境中使用,不但设定此变量的Shell中有效,而且在所有由此SHELL所衍生出的Shell中有效。3)位置变量:主要记录命令及其选项值的变量,是只读的。4)特殊形式变量:主要记录一些特殊值变量,是只读的。2.Shell的类型机器配置文件shel

2013-06-08 12:03:16 1327

原创 深入Ubuntu内部--SHELL使用和编程

1,查看当前系统的所有目录$ ls -l2.查看当前系统中支持的Shell$ cat /etc/Shells3.Bash是由Shell发展而来的,有比Shell更丰富的功能。如果想查看Bash的版本,可以如下:$ echo $BASH_VERSION4.命令补齐功能,例如想打开/etc/environment文件,输入下列命令:$sudo vi /etc/e

2013-06-08 11:26:29 2237

转载 linux expect的使用详解

转自:http://doc.chinaunix.net/linux/201006/629934.shtml一、概述  我们通过Shell可以实现简单的控制流功能,如:循环、判断等。但是对于需要交互的场合则必须通过人工来干预,有时候我们可能会需要实现和交互程序如telnet服务器等进行交互的功能。而Expect就使用来实现这种功能的工具。  Expect是一个免费的编程工具语言,用来实现

2013-06-06 16:12:01 1277

转载 白话经典算法系列之二 直接插入排序的三种实现

直接插入排序(Insertion Sort)的基本思想是:每次将一个待排序的记录,按其关键字大小插入到前面已经排好序的子序列中的适当位置,直到全部记录插入完成为止。 设数组为a[0…n-1]。1.      初始时,a[0]自成1个有序区,无序区为a[1..n-1]。令i=12.      将a[i]并入当前的有序区a[0…i-1]中形成a[0…i]的有序区间。3.

2013-06-05 00:28:40 857

转载 白话经典算法系列之一 冒泡排序的三种实现

冒泡排序是非常容易理解和实现,以从小到大排序举例:设数组长度为N。1.比较相邻的前后二个数据,如果前面数据大于后面的数据,就将二个数据交换。2.这样对数组的第0个数据到N-1个数据进行一次遍历后,最大的一个数据就“沉”到数组第N-1个位置。3.N=N-1,如果N不为0就重复前面二步,否则排序完成。 按照定义很容易写出代码://冒泡排序1void BubbleSort

2013-06-05 00:25:27 941

转载 白话经典算法系列之六 快速排序(Quick sort)

快速排序由于排序效率在同为O(N*logN)的几种排序方法中效率较高,因此经常被采用,再加上快速排序思想----分治法也确实实用,因此很多软件公司的笔试面试,包括像腾讯,微软等知名IT公司都喜欢考这个,还有大大小的程序方面的考试如软考,考研中也常常出现快速排序的身影。 总的说来,要直接默写出快速排序还是有一定难度的,因为本人就自己的理解对快速排序作了下白话解释,希望对大家理解有帮助,达到快

2013-06-05 00:23:08 2030 1

Natural Language Processing with Deep Learning CS224N/Ling284

1.The foundations of the effective modern methods for deep learning applied to NLP • Basics first: Word vectors, feed-forward networks, recurrent networks, attention • Then key methods used in NLP in 2024: transformers, encoder-decoder models, pretraining, post-training (RLHF, SFT), efficient adaptation, model interpretability, language model agents, etc. 2. A big picture understanding of human languages and the difficulties in understanding and producing them via computers 3. An understandin

2024-09-09

RFC9220 - HTTP Datagrams and the Capsule Protocol

This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection. In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.

2024-08-02

RFC9297 - Bootstrapping WebSockets with HTTP/3

The mechanism for running the WebSocket Protocol over a single stream of an HTTP/2 connection is equally applicable to HTTP/3, but the HTTP-version-specific details need to be specified. This document describes how the mechanism is adapted for HTTP/3.

2024-08-02

RFC9114 - HTTP/3

The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.

2024-08-02

RFC9000 - QUIC: A UDP-Based Multiplexed and Secure Transport

This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.

2024-08-02

RFC8446 -The Transport Layer Security (TLS) Protocol Version 1.3

Abstract This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations. Status of This Memo This is an Internet Standards Track document. This document is a product o

2024-08-02

Web3+Decentralized+去中心化+存储

Storage parameter flexibility • Storage permanence • Redundancy persistence • Data transmission incentivization • Universality of storage tracking Filecoin’s tokenomics support growing the total network’s storage space. Crust’s tokenomics ensure hyper-redundancy with fast retrieval speeds. Sia is all about privacy Arweave is all about permanence Storj’s business model seems to heavily factor in their billing and payment approach. Swarm’s bonding curve model

2024-04-30

Chainbase+Web3+APi+Data warehouse

1.Chain API Service:提供安全稳定的多链节点 JSONRPC 集群⽀持,轻松访问多链⽹络 2.Web3 API Service:⽀持多种协议索引,快速⽀持业务应⽤场景(如Token、NFT、DeFi、Domain...)数据查询 3.All-In-One Dashboard:通过⼀站式控制台完成创建、调试、监控和运维 Web3 应⽤程序

2024-04-30

Graph+Web3+检索

1.Substreams 是 The Graph Network 的数据服务世界中即将推出的服务之一,它允许您以毫秒级的延迟查询 Solana 历史数据和实时数据。 2.The Graph 是 Web3 的核心开发者工具及中间件,作为去中心化网络的索引查询层,对区块链数据进行结构化和分类,使用户可以轻松高效地对其进行检索。

2024-04-30

Web3+Nostr+区块链+去中心化+Relay+抗审查

1.Notes and Other Stuff Transmitted by Relays 2.由“中继器”传输的“笔记”和“其它东西 3.不依赖于任何可信任(trusted)的中心化服务器,因此具有“韧性/可迅 速恢复性”(resilient) 4.基于公钥密码学的“密钥和签名”原理,所以它防篡改 5.不需要依赖P2P技术就能运行

2024-04-30

GO 中 Chan 实现原理分享

本文聚焦: 1.chan是什么 2.chan的底层数据结构 3.chan的读写基本流程 4.与sync的区别

2024-01-29

storj dcs video use case

Video Storage & Streaming

2023-12-25

Aurora - 去中心化的以太坊 Layer2

Aurora is a L2 Network

2023-12-25

闪电贷的攻防和智能合约审计

闪电贷和闪电兑,以及智能合约的安全防范

2023-12-25

Poly Network 技术架构

To build the next generation internet

2023-12-24

VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK DRAFT

Present-day blockchain architectures all suffer from a number of issues not least practical means of extensibility and scalability. We believe this stems from tying two very important parts of the consensus architecture, namely canonicality and validity, too closely together. This paper introduces an architecture, the heterogeneous multi-chain, which fundamentally sets the two apart.

2023-12-24

Security audit report for imtoken wallet

This security audit is a requested service authorized by the client. The service is mainly about application penetration testing which helps to find the vulnerabilities and threats of the target. All the penetration testing items are done by simulating the real world malicious attacks against the target, which mimics human hackers’ activities by manual penetration testing with automated tools.

2023-12-24

Decentraland is a blockchain-based virtual world

Decentraland is a virtual reality platform powered by the Ethereum blockchain. Users can create, experience, and monetize content and applications. Land in Decentraland is permanently owned by the community, giving them full control over their creations. Users claim ownership of virtual land on a blockchain-based ledger of parcels. Landowners control what content is published to their portion of land, which is identified by a set of cartesian coordinates (x,y). Contents can range from static 3D

2023-12-24

The Bitcoin Standard

The Bitcoin Standard Bitcoin的表演

2023-12-24

力场的定位是一个以公链共建挖矿为核心的社区平台以及UGC平台

力场的定位是一个以公链共建挖矿为核心的社区平台以及 UGC(用户生成贡 献)平台。力场的愿景是成为公链生态第一社区,无力场,不公链。 力场的使命是赋能公链生态,以(贡献)行为挖矿为切入点,形成公链、KOL、 用户、Dapp 共生、共建、共利的区块链用户社区。

2023-12-24

A Novel Metastable Consensus Protocol Family for Cryptocurrencie

This paper introduces a new family of leaderless Byzantine fault tolerance protocols, built on a metastable mechanism. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries, while their concurrent nature enables them to achieve high throughput and scalability.

2023-12-24

Measuring Ethereum Network Peers

Ethereum, the second-largest cryptocurrency valued at a peak of $138 billion in 2018, is a decentralized, Turing-complete computing platform. Although the stability and security of Ethereum—and blockchain systems in general—have been widely-studied, most analysis has focused on application level features of these systems such as cryptographic mining challenges, smart contract semantics, or block mining operators.

2023-12-24

Firework Games White Paper

Firework Games will be the most advanced and forward-looking blockchain game platform. Our vision is to provide an open and inclusive diverse game world based on the pure blockchain technology, which will change the game industry in modern society. Everyone is freely allowed to create, to play and to enjoy his own role in the parallel world.

2023-12-24

CS251 Final Exam 2021

You may use any (non-human) resource to answer the questions. You may not collaborate with others.

2023-12-24

Generic Construction of Ring Signatures with Efficient

We introduce a novel generic ring signature construction, called DualRing, which can be built from several canonical identification schemes (such as Schnorr identification).DualRing differs from the classical ring signatures by its formation of two rings: a ring of commitments and a ring of challenges. It has a structural difference from the common ring signature approaches based on accumulators or zero-knowledge proofs of the signer index.

2023-12-24

The Gridex Protocol

The Gridex Protocol is a permissionless and non-custodial trading protocol consisting of a set of persistent, non-upgradable smart contracts on the Ethereum blockchain. Unlike the current mainstream decentralized exchanges based on the Automated Market Maker (AMM) model, Gridex is based on order books. With our novel Grid Maker Order Book (GMOB) model, we have significantly reduced the resource consumption of running an order book based system, allowing us to deploy and run it on the Ethereum.

2023-12-24

Efficient Zero-Knowledge Arguments for Arithmetic Circuits

We provide a zero-knowledge argument for arithmetic circuit satisfiability with a communication complexity that grows logarithmically in the size of the circuit. The round complexity is also logarithmic and for an arithmetic circuit with fan-in 2 gates the computation of the prover and verifier is linear in the size of the circuit. The soundness of our argument relies solely on the well-established discrete logarithm assumption in prime order groups.

2023-12-24

KishuInu Whitepaper

$KISHU is an ERC20 token which started on the Ethereum blockchain April 17, 2021. The max supply is 100 quadrillion and one of its key functionalities is its decentralized usage rewards mechanism. For every active user transaction a 2% $KISHU reward is granted to holders’ decentralized wallets only, fostering a healthy distrubuted network and community usage. The more $KISHU is actively used, the more rewards are granted!

2023-12-24

On the Instability of Bitcoin Without the Block Reward

Bitcoin provides two incentives for miners: block rewards and transaction fees. The former accounts for the vast majority of miner revenues at the beginning of the system, but it is expected to transition to the latter as the block rewards dwindle. There has been an implicit belief that whether miners are paid by block rewards or transaction fees does not affect the security of the block chain.

2023-12-24

Shorter Proofs for Privacy-Enhanced Distributed Ledger

We present a new short zero-knowledge argument for the range proof and the arithmetic circuits without a trusted setup. In particular, the proof size of our protocol is the shortest of the category of proof systems with a trustless setup. More concretely, when proving a committed value is a positive integer less than 64 bits, except for negligible error in the 128-bit security parameter, the proof size is 576 byte long, which is of 85.7% size of the previous shortest one due to Bunzetal.

2023-12-24

Attacking Threshold Wallets

Threshold wallets leverage threshold signature schemes (TSS) to distribute signing rights across multiple parties when issuing blockchain transactions. These provide greater assurance against insider fraud, and are sometimes seen as an alternative to methods using a trusted execution environment to issue the signature. This new class of applications motivated researchers to discover better protocols, entrepreneurs to create start-up companies, and large organizations to deploy TSS-based.

2023-12-23

This paper provides an architectural overview of the Avalanche

Avalanche is a high-performance, scalable, customizable, and secure blockchain platform. It targets three broad use cases: 15 – Building application-specific blockchains, spanning permissioned (private) and permissionless (public) deployments. – Building and launching highly scalable and decentralized applications (Dapps). – Building arbitrarily complex digital assets with custom rules, covenants, and riders (smart assets).

2023-12-23

Avalanche Native Token ($AVAX) Dynamics

This paper discusses the key implementation details, in particular the token economics (tokenomics), of the native token of the Avalanche platform, called 5 $AVAX. The native token secures the network, pays for fees, and provides the basic unit of account between the multiple blockchains deployed on the larger Avalanche network. For additional details on Avalanche, which serves as a versatile and universal platform, allowing anyone to launch new blockchains with their own rules, virtual machine

2023-12-23

ZKSwap是一个基于 ZK-Rollup 的 Layer2 代币Swap协议

是一种基于 ZK-Rollup 技术的 Layer-2 AMM 去中心化交易协议 ZKSwap,在 Layer-2 上实现了 uniswap 的所有功能,在保证去中心化交易的核心 价值的同时,实现实时交易,把 Uniswap 的 TPS(每秒可以处理的交易数量) 提升了多个数量级,同时交易的过程几乎不需要消耗任何 Gas 费用。 ZKSwap 系统由链上智能合约,链下 ZKSwap Server,零知识证明系统和前端 用户界面组成。

2023-12-23

ZEND White Paper

You agree that you are acquiring ZEND to participate in zkLend and to obtain services on the ecosystem thereon. The Company, the Distributor and their respective affiliates would develop and contribute to the underlying source code for zkLend. The Company is acting solely as an arms’ length third party in relation to the ZEND distribution, and not in the capacity as a financial advisor or fiduciary of any person with regard to the distribution of ZEND.

2023-12-23

KZen Curv Security Audit

KZen Curv is a library written in Rust providing low-level elliptic curve cryptography functionalities (ECC), as well as higher-level protocols such as key-exchange, secret sharing, zero-knowledge, and multi-party computation. KZen Curv 是一个用 Rust 编写的库,提供低级椭圆曲线加密 功能 (ECC) 以及更高级别的协议,例如密钥交换、秘密 共享、零知识、多方计算。

2023-12-23

为什么虚拟资产值得投资:元宇宙虚拟地产报告

本篇报告回顾了2021年Metaverse虚拟地产商生态的发展,并讨论了与之相关的主要市场趋势。这些趋势包括:主流传统玩家的入场;Metaverse技术的商业应用(包括游戏和应用);以及非同质化代币NFT对于整个整体元宇宙的影响。

2023-10-27

元宇宙:未来数字绿洲入口已打开

元宇宙是与现实世界高度互通的虚拟世界,具有同步和拟真、开源和创 造、永续、闭环经济系统四大核心属性。元宇宙的兴起将伴随着 AR/VR、 云计算、AI、5G 等技术的进化,人类对虚拟世界的构建和发展将造就互 联网的终极形态——METAVERSE。随着 ROBLOX 上市受到追捧,元宇宙 正从概念走向现实,国内对标公司或如雨后春笋般出现,产业链发展值 得重视。

2023-10-27

Code Assessment of Liquidations 2.0 Smart Contracts

First and foremost we would like to thank the Maker Foundation for giving us the opportunity to assess the current state of their Liquidations 2.0 system. This document outlines the findings, limitations, and methodology of our assessment. Initially, our code assessment resulted in a number of findings regarding security and correctness. After the submission of the intermediate reports all findings have been resolved. These have been marked accordingly and can be found in the Resolved Findings s

2023-10-27

Scalable and Probabilistic Leaderless BFT Consensus through Meta

This paper introduces a family of leaderless Byzantine fault tolerance protocols, built around a metastable mechanism via network subsampling. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries while their concurrent and leaderless nature enables them to achieve high throughput and scalability. Unlike blockchains that rely on proof-of-work, they are quiesce

2023-10-27

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除