65 results for “topic:protocol-design”
A comprehensive guide to designing economically safe ERC-20 tokens using formal invariants and strict permission boundaries. Covers supply caps, fee ceilings, liquidity guarantees, transfer safety, oracle integrity, upgrade control, and economic threat modeling. Focused on real-world DeFi security and robust token design.
A deep research study introducing the concept of Economic DNA Repair for smart contracts, designing self-correcting tokenomics that detect anomalies, repair unstable parameters, rebalance incentives, and restore economic equilibrium. Explores adaptive rewards, automated governance, liquidity healing, and resilience in decentralized systems.
A research-grade lab for stress-testing DeFi protocols using Solidity mini-systems, a Python simulation engine, and a Streamlit dashboard. Simulates price crashes, liquidity shifts, AMM behavior, lending liquidations, and systemic risk dynamics. Designed for DeFi engineers, auditors, and researchers.
A deep exploration of the economic physics governing DeFi crashes, AMM decay, liquidity spirals, and liquidation cascades. This article models decentralized finance as a nonlinear system driven by invariants, thresholds, and feedback loops, revealing why crashes follow predictable laws of motion.
Project Sato - C2
A minimal Model Context Protocol (MCP) implementation built with Node.js and TypeScript. This project demonstrates client–server communication over stdio, structured message handling, and local data access, developed with VS Code and GitHub Copilot to explore modern AI tool integration workflows.
The Agent & Tool Arbitration Protocol
Constitutional Verification Model (CVM), a layered framework for reasoning about how decentralized systems achieve legitimate rule authority and independently verifiable execution through invariant correctness, deterministic execution, and replayable history.
airlock is a cryptographic handshake protocol for verifying AI model identity at runtime. It enables real-time attestation of model provenance, environment integrity, and agent authenticity - without relying on vendor trust or static manifests.
This repository constitutes the solutions for the weekly programming assignments as part of CSEN 233 Computer Networks taught by Professor Sin Yaw Wang at Santa Clara University.
Single-process, event-driven UNIX domain socket chat server in C with strict protocol layering and intent-based execution.
Framework for logic auditing, symbolic tension, and epistemic resilience in language models
Human-Feedback-Augmented Intelligence Systems & Protocols (Lite) A lightweight, text-only specification exploring human–AI co-regulation, etiquette, and safety protocols through human feedback. This repository contains the Lite version. The Full version exists separately.
Small Rust program to send custom TCP packets containing numbers.
🛡️ Explore the VIREX Protocol for learning about cryptography and secure communications through an experimental, educational framework.
Architecture research exploring capability-tiered AI governance and compute-linked enforcement protocols.
A Compute-Agnostic, WebSocket-first protocol for AI Agents. The high-performance alternative to MCP. Runs on Serverless or stateful servers with sub-30ms latency.
🔒 Design safe tokens with a focus on economic security and permission boundaries to prevent common pitfalls in token creation.
WiseWork fosters collective intelligence and responsibility through its modular system. Join us in building a decentralized platform for meaningful collaboration! 🛠️🌐
IntentMesh is an open protocol and reference architecture for structured negotiation between autonomous software agents.
Conceptual notes outlining the economic primitives, value flows, minting logic, and settlement architecture behind the Finovia protocol — a financial operating kernel designed for programmatic value movement and real‑time settlement.
Demo of the LinkedIn Outreach OS: a product‑aware, Celery‑driven automation engine for scraping leads, sending connection requests, detecting acceptances, and running follow‑ups. Full Pro version available for founders, agencies, and operators.
Showcase repository for a collaborative secure and reliable file transfer project using UDP, raw sockets, Docker, and protocol-level reliability/security features
UDP networking lab: Ping client/server with RTT calculation and packet loss simulation, heartbeat monitor for application health tracking, and file exfiltration demo with multi-packet transfer protocol. Demonstrates UDP-based data exfiltration security risks.
A peer-to-peer file-sharing application for local area networks (LANs) using IPv4 UDP multicast and TCP.
DTP-Ω1 (Divinitus Transmission Protocol) is a layered, stateful, checksum-verified communication standard designed for sanctified data transfer across Mechanicus-aligned systems, cogitator units, and blessed network links. It ensures purity, order, and compliance in all transmissions.
C++/Lua/Qt app enabling LAN connection on mGBA emulators. Uses TCP P2P with authoritative RNG sync and memory access for deterministic cross-platform play.
Research on privacy preserving compliance protocols
No description provided.
Custom protocol over UDP for client–server data transfer with packet framing, validation, and performance testing.