Learn Before
Concept
Network Limits
The leader is expected to take in incoming user packets and efficiently order them into a proof of history sequence, which is then published to downstream verifiers. Efficiency is determined based on the memory access patterns of the transactions, so transactions are ordered to minimize faults and maximize prefetching.
0
1
Updated 2021-11-03
Tags
Cryptoeconomics
Economics
Social Science
Empirical Science
Science