自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

FeelTouch Labs

Best or Nothing!

  • 博客(20)
  • 资源 (35)
  • 收藏
  • 关注

原创 Git步步进阶---完美实战git tag所有操作

编者言:使用git tag是开发者的一项基本技能,他本质上是一个有标记的压缩包,当你的代码完成某些功能并上线没有问题的时候,这时你就需要打下一个tag(即将当前的代码保存起来并做上标记),这意义重大:1)可以作为一个具备某些功能的特定版本保存和发布 2)当前线上代码出问题时,可以直接会滚到上一个没有问题的tag版本。但如何使用好tag并非一件容易的事情,本文将给出图文和命令完美示范。1)...

2020-03-24 01:47:02 555

转载 架构系列---消息点击率翻倍的背后——闲鱼无侵入可扩展IFTTT系统

面临问题在闲鱼生态里,用户之间会有很多种关系。其中大部分关系是由买家触发,联系到卖家,比如买家通过搜索、收藏、聊天等动作与卖家产生联系;另外一部分是平台与用户之间的关系。对这些关系分析之后我们发现这些关系中存在两个问题: 用户产生关系的层次不够丰富; 现有系统只维护了一部分用户关系,包括收藏、点赞等,用户关系的层次还不够丰富。 用户之间关系是单向且不够实时; 在现有的玩法中,买...

2020-03-23 21:18:36 553

转载 架构系列---一个优秀的Push平台需要经历怎样的前世今生

对闲鱼用户来说,因为闲鱼商品库存只有一件,商品的时效性很强,因此当用户关注的卖家上新、浏览的商品发生降价或者平台为用户找到一批高性价比商品时,用户期望尽快被通知。Push已经成为用户与闲鱼平台联系的重要纽带。本文将以技术同学视角,介绍闲鱼Push从离线手工投放的1.0版本进化到智能个性化的2.0版本的发展过程,详细说明遇到的问题和技术方案选型,以期给读者带来一些思考和解决类似问题的思路。...

2020-03-23 21:15:25 633

原创 方案系列--App实现接入Google和Facebook三方登陆的最新、完整、安全版

长文预警:1,可使读者在接入Google和Facebook三方登陆时节省大量时间 2,几乎可以避免所有的坑 3,保证安全性的一次到位的接入 4,关键接入代码和截图的指引,无需参考其他文章浪费时间了5,整个过程是以Android为例进行说明的,对于IOS的接入流程也几乎是一样的 6,包含app端和server端的全部详细说明Table of Contents必读前言总体思路OA...

2020-03-22 21:49:20 3185 8

原创 Git步步进阶---完美实战Git多源追踪并愉快提交PR

参与开源、贡献开源已成为很多开发者实现自身价值的一种表达方式。那么,如何愉快的参与开源并让自己的PR被正确的Merged成为了这其中重要的一步,那么完成这一步最有可能面临的问题是自己的PR与目标要合并的源仓库的某个分支冲突了,那么知道如何进行多源追踪并将提交pr冲突的可能降到最低就非常重要。以下是以github举例,其他道理一样。在自己fork仓库的对应的本地仓库目录下,执行如下步骤:St...

2020-03-20 01:35:20 707

转载 App系列之Push推送---实现推送方式解决方案

本文介绍在Android中实现推送方式的基础知识及相关解决方案。推送功能在手机开发中应用的场景是越来起来了,不说别的,就我们手机上的新闻客户端就时不j时的推送过来新的消息,很方便的阅读最新的新闻信息。这种推送功能是好的一面,但是也会经常看到很多推送过来的垃圾信息,这就让我们感到厌烦了,关于这个我们就不能多说什么了,毕竟很多商家要做广告。本文就是来探讨下Android中实现推送功能的一些解决方案,也...

2020-03-15 02:00:30 5221

转载 Java深海拾遗系列(9)--- 关于Java序列化的10个面试问题

大多数商业项目使用数据库或内存映射文件或只是普通文件, 来满足持久性要求, 只有很少的项目依赖于 Java 中的序列化过程。无论如何,这篇文章不是 Java 序列化教程或如何序列化在 Java 的对象, 但有关序列化机制和序列化 API 的面试问题, 这是值得去任何 Java 面试前先看看以免让一些未知的内容惊到自己。对于那些不熟悉 Java 序列化的人, Java 序列化是用来通过将对象的状...

2020-03-15 01:05:31 759

转载 Java深海拾遗系列(8)--- 10 个最难回答的 Java 问题

1.为什么等待和通知是在 Object 类而不是 Thread 中声明的?一个棘手的 Java 问题,如果 Java编程语言不是你设计的,你怎么能回答这个问题呢。Java编程的常识和深入了解有助于回答这种棘手的 Java 核心方面的面试问题。为什么 wait,notify 和 notifyAll 是在 Object 类中定义的而不是在 Thread 类中定义这是有名的 Java 面试问...

2020-03-15 01:03:28 947

原创 研发效能系列---高效的可视化管理工具YAPI

地址Demo:http://yapi.demo.qunar.com/GitHub:https://github.com/YMFE/yapiYapi使用截图安装使用 Docker 构建 Yapi1、启动 MongoDBdocker run -d --name mongo-yapi mongo2、获取 Yapi 镜像,版本信息可在 阿里云镜...

2020-03-13 01:25:58 1218

转载 架构系列---一套高并发IM通信系统完整设计和实现

先行参考:架构秘境系列3---微信、陌陌、WNS著名IM软件设计架构详解1. 服务器端设计1.1 总体架构总体架构包括5个层级,具体内容如下图。1.1.1 用户端移动端重点是移动端,支持IOS/Android系统,包括IM App,嵌入消息功能的瓜子App,未来还可能接入客服系统。1.1.2 用户端API针对TCP协议,提供IOS/Android开发...

2020-03-13 00:49:34 4006

原创 研发效能系列----开源的数据库版本管理工具Flyway

1. 简介网址:https://flywaydb.org/Flyway是一款开源的数据库版本管理工具,Flyway可以独立于应用实现管理并跟踪数据库的变更,Flyway根据自己的约定,不需要复杂的配置就可以实现数据的Migrate。Migrations可以写成SQL脚本,也可以写在Java代码中,Flyway还支持Spring Boot。2. 为什么要使用Flyway在真实的项...

2020-03-12 14:03:46 937

原创 音视频系列---最强播放器推荐

PotPlayer地址:https://daumpotplayer.com/download/基础功能:Daum PotPlayer—完全免费的多功能多媒体播放器,具有内置编解码器和灵活的设置系统。具有许多Kmplayer的功能,因为开发了他作为该播放器的作者之一。Daum PotPlayer的主要功能和可能性:—高品质的复制品以及视频和音频。—支持所有现代视频和格式的音...

2020-03-12 01:40:41 1324 2

原创 Git步步进阶---执行git merge时提示Already up-to-date之惊心动魄真正原因揭秘

背景最近在将自己的分支准备合并到develop分支时,出现了Already up-to-date.提示,当时的想法明明2个分支的HEAD的内容不一样,为什么会有这个错误提示呢?甚至一度怀疑git是否出问题了,此时也翻看了其他人遇到类似错误的提示的处理方法,没说说原因,直接一堆命令就说可以了,实在摸不着头脑。静心梳理过程1,目前状况,共有3个分支,1个是master,1个是develop...

2020-03-08 16:59:23 10852 2

转载 架构系列---SSO单点登录实现的三种方案

单点登录(SSO——Single Sign On)对于我们来说已经不陌生了。对于大型系统来说使用单点登录可以减少用户很多的麻烦。就拿百度来说吧,百度下面有很多的子系统——百度经验、百度知道、百度文库等等,如果我们使用这些系统的时候,每一个系统都需要我们输入用户名和密码登录一次的话,我相信用户体验肯定会直线下降。当然,对于个人博客这类系统来说根本就用不上单点登录了。假如,我们的系统很庞大,但是就...

2020-03-07 01:31:43 4987 1

原创 架构系列---限流原理和实现方案大总结

Table of Contents限流原理限流分类和实现一、接入层限流:Nginx限流模块二、单实例应用层限流:Guava RateLimiter三、分布式应用层限流:Redis+Lua四、全能应用层限流:Sentinel killHystrix参考限流原理在高并发系统中,我们常常提到的几个词汇“缓存”,“限流”,“降级”等。本文涉及到的是其中“限流”的部分,...

2020-03-07 01:25:24 527

转载 Java深海拾遗系列(7)--- Java 创建对象的不同姿势

使用new关键字 使用new关键字是创建对象的最基本方法。这是在java中创建对象的最常见方法。几乎99%的对象都是用这种方式创建的。通过使用这个方法,我们可以调用任何想要调用的构造函数(没有参数或参数化的构造函数)。package org.cfj.objcreate;public class NewKeywordEx { String name=...

2020-03-07 00:39:53 280

转载 Kafka系列---5分钟带你了解Kafka的技术架构

大家都知道 Kafka 是一个非常牛逼的消息队列框架,阿里的 RocketMQ 也是在 Kafka 的基础上进行改进的。对于初学者来说,一开始面对这么一个庞然大物会不知道怎么入手。那么这篇文章就带你先了解一下 Kafka 的技术架构,让你从全局的视野认识 Kafka。了解了 Kafka 的整体架构和消息流程之后,脑海里就会有一个大致的结构,这时候再去学习每个部分就容易得多了。我们先来看一下 K...

2020-03-05 10:28:20 331

翻译 CDN系列---Akamai Media Delivery Part1:如何通过调整ExoPlayer中的配置来提高用户体验(QoE)

Akamai是做什么的?cdn最先就是他们家搞的。 全球30%的流量流经他们家的网络。Akamai是发明CDN的公司,MIT的CS和数学教授创的,这公司至少趁几十万台服务器,分发了互联网35%的流量。算法鼻祖。看该公司的分析成果,对该公司来说,绝对不能算研究成果:——网页每延时100毫秒,交易转化率下降7%。——网页每慢3秒钟,53%的移动端用户就会离开页面。——全球促销...

2020-03-04 15:48:25 695

翻译 CDN系列---Akamai Media Delivery Part2:如何提高EXOPLAYER的视频流质量

Akamai是做什么的?cdn最先就是他们家搞的。 全球30%的流量流经他们家的网络。Akamai是发明CDN的公司,MIT的CS和数学教授创的,这公司至少趁几十万台服务器,分发了互联网35%的流量。算法鼻祖。看该公司的分析成果,对该公司来说,绝对不能算研究成果:——网页每延时100毫秒,交易转化率下降7%。——网页每慢3秒钟,53%的移动端用户就会离开页面。——全球促销...

2020-03-04 15:37:50 635

转载 Mybatis原理分析--动态生成Sql原理

好文:https://www.jianshu.com/p/ec40a82cae28本文将带你分析Mybatis是如何动态生成SQL。首先,会根据源码分析框架初始化时xml文件的加载、解析、缓存过程。着重介绍 xml的解析过程 和 使用解析的结果,最后列举实例和对照源码DeBug分析:当DAO接口调用时标签的解析、参数的创建、SQL的生成过程,并总结整个流程。 数据的处理 My...

2020-03-02 13:36:40 1455

Natural Language Processing with Deep Learning CS224N/Ling284

1.The foundations of the effective modern methods for deep learning applied to NLP • Basics first: Word vectors, feed-forward networks, recurrent networks, attention • Then key methods used in NLP in 2024: transformers, encoder-decoder models, pretraining, post-training (RLHF, SFT), efficient adaptation, model interpretability, language model agents, etc. 2. A big picture understanding of human languages and the difficulties in understanding and producing them via computers 3. An understandin

2024-09-09

RFC9220 - HTTP Datagrams and the Capsule Protocol

This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection. In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.

2024-08-02

RFC9297 - Bootstrapping WebSockets with HTTP/3

The mechanism for running the WebSocket Protocol over a single stream of an HTTP/2 connection is equally applicable to HTTP/3, but the HTTP-version-specific details need to be specified. This document describes how the mechanism is adapted for HTTP/3.

2024-08-02

RFC9114 - HTTP/3

The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.

2024-08-02

RFC9000 - QUIC: A UDP-Based Multiplexed and Secure Transport

This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.

2024-08-02

RFC8446 -The Transport Layer Security (TLS) Protocol Version 1.3

Abstract This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations. Status of This Memo This is an Internet Standards Track document. This document is a product o

2024-08-02

Web3+Decentralized+去中心化+存储

Storage parameter flexibility • Storage permanence • Redundancy persistence • Data transmission incentivization • Universality of storage tracking Filecoin’s tokenomics support growing the total network’s storage space. Crust’s tokenomics ensure hyper-redundancy with fast retrieval speeds. Sia is all about privacy Arweave is all about permanence Storj’s business model seems to heavily factor in their billing and payment approach. Swarm’s bonding curve model

2024-04-30

Chainbase+Web3+APi+Data warehouse

1.Chain API Service:提供安全稳定的多链节点 JSONRPC 集群⽀持,轻松访问多链⽹络 2.Web3 API Service:⽀持多种协议索引,快速⽀持业务应⽤场景(如Token、NFT、DeFi、Domain...)数据查询 3.All-In-One Dashboard:通过⼀站式控制台完成创建、调试、监控和运维 Web3 应⽤程序

2024-04-30

Graph+Web3+检索

1.Substreams 是 The Graph Network 的数据服务世界中即将推出的服务之一,它允许您以毫秒级的延迟查询 Solana 历史数据和实时数据。 2.The Graph 是 Web3 的核心开发者工具及中间件,作为去中心化网络的索引查询层,对区块链数据进行结构化和分类,使用户可以轻松高效地对其进行检索。

2024-04-30

Web3+Nostr+区块链+去中心化+Relay+抗审查

1.Notes and Other Stuff Transmitted by Relays 2.由“中继器”传输的“笔记”和“其它东西 3.不依赖于任何可信任(trusted)的中心化服务器,因此具有“韧性/可迅 速恢复性”(resilient) 4.基于公钥密码学的“密钥和签名”原理,所以它防篡改 5.不需要依赖P2P技术就能运行

2024-04-30

GO 中 Chan 实现原理分享

本文聚焦: 1.chan是什么 2.chan的底层数据结构 3.chan的读写基本流程 4.与sync的区别

2024-01-29

storj dcs video use case

Video Storage & Streaming

2023-12-25

Aurora - 去中心化的以太坊 Layer2

Aurora is a L2 Network

2023-12-25

闪电贷的攻防和智能合约审计

闪电贷和闪电兑,以及智能合约的安全防范

2023-12-25

Poly Network 技术架构

To build the next generation internet

2023-12-24

VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK DRAFT

Present-day blockchain architectures all suffer from a number of issues not least practical means of extensibility and scalability. We believe this stems from tying two very important parts of the consensus architecture, namely canonicality and validity, too closely together. This paper introduces an architecture, the heterogeneous multi-chain, which fundamentally sets the two apart.

2023-12-24

Security audit report for imtoken wallet

This security audit is a requested service authorized by the client. The service is mainly about application penetration testing which helps to find the vulnerabilities and threats of the target. All the penetration testing items are done by simulating the real world malicious attacks against the target, which mimics human hackers’ activities by manual penetration testing with automated tools.

2023-12-24

Decentraland is a blockchain-based virtual world

Decentraland is a virtual reality platform powered by the Ethereum blockchain. Users can create, experience, and monetize content and applications. Land in Decentraland is permanently owned by the community, giving them full control over their creations. Users claim ownership of virtual land on a blockchain-based ledger of parcels. Landowners control what content is published to their portion of land, which is identified by a set of cartesian coordinates (x,y). Contents can range from static 3D

2023-12-24

The Bitcoin Standard

The Bitcoin Standard Bitcoin的表演

2023-12-24

力场的定位是一个以公链共建挖矿为核心的社区平台以及UGC平台

力场的定位是一个以公链共建挖矿为核心的社区平台以及 UGC(用户生成贡 献)平台。力场的愿景是成为公链生态第一社区,无力场,不公链。 力场的使命是赋能公链生态,以(贡献)行为挖矿为切入点,形成公链、KOL、 用户、Dapp 共生、共建、共利的区块链用户社区。

2023-12-24

A Novel Metastable Consensus Protocol Family for Cryptocurrencie

This paper introduces a new family of leaderless Byzantine fault tolerance protocols, built on a metastable mechanism. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries, while their concurrent nature enables them to achieve high throughput and scalability.

2023-12-24

Measuring Ethereum Network Peers

Ethereum, the second-largest cryptocurrency valued at a peak of $138 billion in 2018, is a decentralized, Turing-complete computing platform. Although the stability and security of Ethereum—and blockchain systems in general—have been widely-studied, most analysis has focused on application level features of these systems such as cryptographic mining challenges, smart contract semantics, or block mining operators.

2023-12-24

Firework Games White Paper

Firework Games will be the most advanced and forward-looking blockchain game platform. Our vision is to provide an open and inclusive diverse game world based on the pure blockchain technology, which will change the game industry in modern society. Everyone is freely allowed to create, to play and to enjoy his own role in the parallel world.

2023-12-24

CS251 Final Exam 2021

You may use any (non-human) resource to answer the questions. You may not collaborate with others.

2023-12-24

Generic Construction of Ring Signatures with Efficient

We introduce a novel generic ring signature construction, called DualRing, which can be built from several canonical identification schemes (such as Schnorr identification).DualRing differs from the classical ring signatures by its formation of two rings: a ring of commitments and a ring of challenges. It has a structural difference from the common ring signature approaches based on accumulators or zero-knowledge proofs of the signer index.

2023-12-24

The Gridex Protocol

The Gridex Protocol is a permissionless and non-custodial trading protocol consisting of a set of persistent, non-upgradable smart contracts on the Ethereum blockchain. Unlike the current mainstream decentralized exchanges based on the Automated Market Maker (AMM) model, Gridex is based on order books. With our novel Grid Maker Order Book (GMOB) model, we have significantly reduced the resource consumption of running an order book based system, allowing us to deploy and run it on the Ethereum.

2023-12-24

Efficient Zero-Knowledge Arguments for Arithmetic Circuits

We provide a zero-knowledge argument for arithmetic circuit satisfiability with a communication complexity that grows logarithmically in the size of the circuit. The round complexity is also logarithmic and for an arithmetic circuit with fan-in 2 gates the computation of the prover and verifier is linear in the size of the circuit. The soundness of our argument relies solely on the well-established discrete logarithm assumption in prime order groups.

2023-12-24

KishuInu Whitepaper

$KISHU is an ERC20 token which started on the Ethereum blockchain April 17, 2021. The max supply is 100 quadrillion and one of its key functionalities is its decentralized usage rewards mechanism. For every active user transaction a 2% $KISHU reward is granted to holders’ decentralized wallets only, fostering a healthy distrubuted network and community usage. The more $KISHU is actively used, the more rewards are granted!

2023-12-24

On the Instability of Bitcoin Without the Block Reward

Bitcoin provides two incentives for miners: block rewards and transaction fees. The former accounts for the vast majority of miner revenues at the beginning of the system, but it is expected to transition to the latter as the block rewards dwindle. There has been an implicit belief that whether miners are paid by block rewards or transaction fees does not affect the security of the block chain.

2023-12-24

Shorter Proofs for Privacy-Enhanced Distributed Ledger

We present a new short zero-knowledge argument for the range proof and the arithmetic circuits without a trusted setup. In particular, the proof size of our protocol is the shortest of the category of proof systems with a trustless setup. More concretely, when proving a committed value is a positive integer less than 64 bits, except for negligible error in the 128-bit security parameter, the proof size is 576 byte long, which is of 85.7% size of the previous shortest one due to Bunzetal.

2023-12-24

Attacking Threshold Wallets

Threshold wallets leverage threshold signature schemes (TSS) to distribute signing rights across multiple parties when issuing blockchain transactions. These provide greater assurance against insider fraud, and are sometimes seen as an alternative to methods using a trusted execution environment to issue the signature. This new class of applications motivated researchers to discover better protocols, entrepreneurs to create start-up companies, and large organizations to deploy TSS-based.

2023-12-23

This paper provides an architectural overview of the Avalanche

Avalanche is a high-performance, scalable, customizable, and secure blockchain platform. It targets three broad use cases: 15 – Building application-specific blockchains, spanning permissioned (private) and permissionless (public) deployments. – Building and launching highly scalable and decentralized applications (Dapps). – Building arbitrarily complex digital assets with custom rules, covenants, and riders (smart assets).

2023-12-23

Avalanche Native Token ($AVAX) Dynamics

This paper discusses the key implementation details, in particular the token economics (tokenomics), of the native token of the Avalanche platform, called 5 $AVAX. The native token secures the network, pays for fees, and provides the basic unit of account between the multiple blockchains deployed on the larger Avalanche network. For additional details on Avalanche, which serves as a versatile and universal platform, allowing anyone to launch new blockchains with their own rules, virtual machine

2023-12-23

ZKSwap是一个基于 ZK-Rollup 的 Layer2 代币Swap协议

是一种基于 ZK-Rollup 技术的 Layer-2 AMM 去中心化交易协议 ZKSwap,在 Layer-2 上实现了 uniswap 的所有功能,在保证去中心化交易的核心 价值的同时,实现实时交易,把 Uniswap 的 TPS(每秒可以处理的交易数量) 提升了多个数量级,同时交易的过程几乎不需要消耗任何 Gas 费用。 ZKSwap 系统由链上智能合约,链下 ZKSwap Server,零知识证明系统和前端 用户界面组成。

2023-12-23

ZEND White Paper

You agree that you are acquiring ZEND to participate in zkLend and to obtain services on the ecosystem thereon. The Company, the Distributor and their respective affiliates would develop and contribute to the underlying source code for zkLend. The Company is acting solely as an arms’ length third party in relation to the ZEND distribution, and not in the capacity as a financial advisor or fiduciary of any person with regard to the distribution of ZEND.

2023-12-23

KZen Curv Security Audit

KZen Curv is a library written in Rust providing low-level elliptic curve cryptography functionalities (ECC), as well as higher-level protocols such as key-exchange, secret sharing, zero-knowledge, and multi-party computation. KZen Curv 是一个用 Rust 编写的库,提供低级椭圆曲线加密 功能 (ECC) 以及更高级别的协议,例如密钥交换、秘密 共享、零知识、多方计算。

2023-12-23

为什么虚拟资产值得投资:元宇宙虚拟地产报告

本篇报告回顾了2021年Metaverse虚拟地产商生态的发展,并讨论了与之相关的主要市场趋势。这些趋势包括:主流传统玩家的入场;Metaverse技术的商业应用(包括游戏和应用);以及非同质化代币NFT对于整个整体元宇宙的影响。

2023-10-27

元宇宙:未来数字绿洲入口已打开

元宇宙是与现实世界高度互通的虚拟世界,具有同步和拟真、开源和创 造、永续、闭环经济系统四大核心属性。元宇宙的兴起将伴随着 AR/VR、 云计算、AI、5G 等技术的进化,人类对虚拟世界的构建和发展将造就互 联网的终极形态——METAVERSE。随着 ROBLOX 上市受到追捧,元宇宙 正从概念走向现实,国内对标公司或如雨后春笋般出现,产业链发展值 得重视。

2023-10-27

Code Assessment of Liquidations 2.0 Smart Contracts

First and foremost we would like to thank the Maker Foundation for giving us the opportunity to assess the current state of their Liquidations 2.0 system. This document outlines the findings, limitations, and methodology of our assessment. Initially, our code assessment resulted in a number of findings regarding security and correctness. After the submission of the intermediate reports all findings have been resolved. These have been marked accordingly and can be found in the Resolved Findings s

2023-10-27

Scalable and Probabilistic Leaderless BFT Consensus through Meta

This paper introduces a family of leaderless Byzantine fault tolerance protocols, built around a metastable mechanism via network subsampling. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries while their concurrent and leaderless nature enables them to achieve high throughput and scalability. Unlike blockchains that rely on proof-of-work, they are quiesce

2023-10-27

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除