Concept

Network Limits

The leader is expected to take in incoming user packets and efficiently order them into a proof of history sequence, which is then published to downstream verifiers. Efficiency is determined based on the memory access patterns of the transactions, so transactions are ordered to minimize faults and maximize prefetching.

0

1

Updated 2021-11-03

Tags

Cryptoeconomics

Economics

Social Science

Empirical Science

Science

Learn After