-
Issue #25 was getting too long, I added a recap at the end. Here's a clean slate to continue the process.
- We need lots of usage, lots of feedback from users, and lots of time polishing the interf…
-
Distributed hash tables are powerful protocols that enable content discovering and routing in P2P networks. In "vanilla" DHT implementations (e.g. Kademlia), peer interactions leak a lot of informatio…
-
using this code:
~~~js
const c=n.a.get("API.lemonade.url"),d=n.a.get("API.lemonade.urlLinear"),u=n.a.get("API.lemonade.urlVod"),p=n.a.get("API.lemonade.platform"),m=n.a.get("API.lemonade.timeout")…
3052 updated
3 months ago
-
I had some trouble getting the supplied AStar algorithm to properly work with a chunked grid.
Eg. An entity coordinate was outside of the specified width/height of the internal array used in AStar al…
-
One of the suggested ways of preventing PCM fraud is to use blinded signatures. This issue tracks that potential solution.
-
## What
- Use Ethereum wallet for creating a new profile and accessing it from multiple environments (i.e different devices or browsers)
- See https://www.figma.com/file/DaktYgy62CJEKE9Zqf7WTS/Web…
-
# Context
When a smart contract goes live, it may need to be updated or changed for various reasons.
To enable smart contract upgradability, it is important to address challenges such as data lo…
moul updated
2 months ago
-
-
# Improvements to representations of numeric-valued quantum registers
## Abstract and conceptual overview
The computational basis states for registers of qubits are each labelled by strings of c…
-
# Summary
This proposal introduces a significant enhancement to the NEAR Protocol, aiming to make its ecosystem closer with Ethereum by integrating Web3 wallet support. The primary goal is to resol…