-
# Abstract
ipEHR is about putting patients first, but gives opportunities to all parties of the medical market to establish trustless, safe, event-based data exchange respecting data sovereignty. Pat…
-
[[OData-Protocol: 11.2.2 Requesting Individual Entities]](http://docs.oasis-open.org/odata/odata/v4.0/errata02/os/complete/part1-protocol/odata-v4.0-errata02-os-part1-protocol-complete.html#_Toc406398…
-
**Describe the bug**
A clear and concise description of what the bug is.
**To Reproduce**
Steps to reproduce the behavior:
1. Go to https://dev.alkem.io/forum/new
2. Type the following text:
```
Are…
-
Welcome to the Onbloc's Builder Journey!
This issue is a comprehensive introduction to Onbloc and a place where you can expect regular updates from us.
I hope you find this issue helpful to get to k…
-
### Summary
This is a meta-thread collecting use cases for **adding P2P and DWeb technology to web browsers**.
Feel free to **refer to this issue** when discussing interesting use case
or just …
lidel updated
5 years ago
-
### Are you sure the Security measure is not already implemented?
- [X] Yes, I have checked and the Security measure I'm suggesting to be implemented is not duplicate. 🫡
### Please explain your …
-
## 1. Introduction
**Confidentiality, privacy, and security**
Confidentiality is limiting access and disclosure on certain types of information to ensure personal information is secured. Privacy…
-
Proof of Influence in Large Language Models : POILLMs
This is ai generated with bing based on ramblings from me.
Whitepaper: Proof of Influence in Large Language Models (LLMs)
Abstract
The conce…
-
Pose a question about the one of the following possible readings: “[Dropout: A Simple Way to Prevent Neural Networks from Overfitting (Links to an external site.)](https://www.jmlr.org/papers/volume15…
-
monerod uses dandelion++ to propagate txs around the network, this happens in 2 stages: stem and fluff. This proposal will only affect txs in the fluff stage.
When monerod receives a fluff tx, it w…