A blockchain that organically orchestrates Proof of Work (PoW) and AI Training computations together
☆14Nov 30, 2022Updated 3 years ago
Alternatives and similar repositories for curvetime
Users that are interested in curvetime are comparing it to the libraries listed below
Sorting:
- A SimPy-based Discrete Event Simulator for a relay node in a payment channel network using different submarine swap rebalancing policies,…☆11Oct 8, 2023Updated 2 years ago
- A guide to smart contract security best practices☆18Mar 28, 2025Updated 11 months ago
- Based on uber-go/zap, log caching and redis/kafka sink implemented in Go☆10Feb 3, 2023Updated 3 years ago
- ☆10Feb 16, 2022Updated 4 years ago
- A 3D viewer for wavefront (.obj) files using OpenGL without immediate mode and GLUT.☆10Jul 27, 2024Updated last year
- This repo contains the PUF and authentication codes for IoT authentication protocol development project☆12Apr 11, 2020Updated 5 years ago
- ☆10Sep 5, 2023Updated 2 years ago
- Reinforcement Learning code for various projects☆10May 30, 2020Updated 5 years ago
- Implement distributed consensus protocol Raft and it's expanded version BW-Raft(Supporting Byzantine Fault Tolerance)☆11Apr 30, 2021Updated 4 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- GO语言简单实现BlockChain区块链公链,POW工作量证明,UTXO未使 用交易输出,P2P网络模型(后面再写)☆11Oct 24, 2018Updated 7 years ago
- Elliptic Curve Verifiable Radom Function(ECVRF) library written in Go☆10Dec 11, 2025Updated 2 months ago
- zk-Rollup implementation compatible with Eth 1.x☆12Oct 1, 2020Updated 5 years ago
- ☆12Oct 16, 2022Updated 3 years ago
- Blockchain server, mining server and proof-of-work, python power☆13Dec 5, 2019Updated 6 years ago
- ☆11Feb 2, 2024Updated 2 years ago
- Filehive is a Filecoin-backed marketplace for datasets.☆14Feb 26, 2021Updated 5 years ago
- redis distribute lock☆12Aug 29, 2017Updated 8 years ago
- Causing a DDOS attack and mitigating it using blockchain and smart contracts.☆13Apr 26, 2018Updated 7 years ago
- An implementation of the Financial Crypto 2016 paper "Optimal Selfish Mining Strategies in Bitcoin"☆14May 30, 2017Updated 8 years ago
- ☆10Jan 11, 2022Updated 4 years ago
- 中国特色的数据格式验证☆11Jun 25, 2015Updated 10 years ago
- 基于gin + gorm + layui 的后台管理系统☆11Apr 15, 2019Updated 6 years ago
- ☆11Dec 8, 2020Updated 5 years ago
- Python implementation of Byzantine Fault Tolerant Raft algorithm☆12Dec 12, 2017Updated 8 years ago
- A maker of merkle-proofs for transaction receipts in ethereum using rust.☆15Sep 10, 2021Updated 4 years ago
- Investigating the frequency of alternative blocks, reorganizations, potential double-spend attacks, selfish mining, and more.☆14Nov 21, 2020Updated 5 years ago
- In-memory OSM tile server written in Go☆11Mar 16, 2016Updated 9 years ago
- Reinforcement learning approach to the prisoner's dilemma, based on Q learning☆13Dec 1, 2017Updated 8 years ago
- ☆21Jul 18, 2022Updated 3 years ago
- Learn Rust With Entirely Too Many Linked Lists☆15Apr 4, 2021Updated 4 years ago
- 🧞♀️ Decode Bitcoin transactions inscription in Go !☆12May 23, 2023Updated 2 years ago
- Erlang bindings for etcd key value store☆35Oct 29, 2013Updated 12 years ago
- MIT 6.824 - Distributed Systems - Spring 2015☆11Mar 23, 2016Updated 9 years ago
- Code repository for technical papers about selfish mining analysis.☆13May 16, 2023Updated 2 years ago
- GIT clone of http://bitbucket.org/etc/lhttpc/☆37Oct 23, 2011Updated 14 years ago
- ☆14May 19, 2023Updated 2 years ago
- This repository contains an implementation of an anomaly detection method called DPLAN, which is based on the reinforcement learning fram…☆12Jan 8, 2024Updated 2 years ago
- Simulating a modified Satoshi consensus (penalty system for delayed block submission) by Horizen to enhance protection against 51% attack…☆16May 14, 2020Updated 5 years ago