Git Product home page Git Product logo

Comments (8)

 avatar commented on August 19, 2024

hello,
I'd like to test your daa, but getting confused with these two lines:
ST = max(10T,min(-9T,ST))
how does -9 * t come? in cpp from my understanding, expr above always returns 10t, then why do we
need this?
prev_target * ((T
N)^2-T^2N+k(k/2+(TN)^2-T^2N/2) / (TN)^2
should the missing bracket be placed like below?
prev_target * ((T
N)^2-T^2N+k(k/2+(TN)^2-T^2N/2)) / (T*N)^2

Looking forward to your reply.

from difficulty-algorithms.

zawy12 avatar zawy12 commented on August 19, 2024

from difficulty-algorithms.

taariq avatar taariq commented on August 19, 2024

@zawy12 Loved your efforts here. Are you in San Francisco and would you be interested in giving a 1-hour presentation/talk on difficulty Algorithms?

from difficulty-algorithms.

taariq avatar taariq commented on August 19, 2024

I think for this level of awesome, we should pay you to fly out and come speak! I'll send you an email direct once I touch base with the rest of folks with a proposal.

from difficulty-algorithms.

 avatar commented on August 19, 2024

Will there be some live streams? It will be awesome too if anyone interested can view your talks via live streams. @taariq

from difficulty-algorithms.

zawy12 avatar zawy12 commented on August 19, 2024

I should do a video that summarizes everything I've learned.

from difficulty-algorithms.

b-g-goodell avatar b-g-goodell commented on August 19, 2024

(weighted) averages tend to be sensitive to corrupt data, a problem weighted medians do not have. This should presumably give a measure of current hash rate that is less sensitive to manipulation. Have you run any experiments either with a linearly weighted moving median or an exponential moving median (if so, can you make my life easy and link the comparisons?)

from difficulty-algorithms.

zawy12 avatar zawy12 commented on August 19, 2024

Medians interject a delay that is proportional to the amount of protection. The problem is that delay is in every block instead of just the bad ones. There is very little manipulation that can be done in the newest l w m a algorithm thanks to the stricter limits. The best thing to do is to just accept all the time stamps as honest even if they go back in time. The honest timestamps immediately cancel the negatives of the bad time stamps. So the only manipulation that can occur for more than one block is only when the attacker has more than 50%. With a stricter limits maximum benefit he can get is about 5% lower difficulty for only as many blocks as his multiple of the Baseline difficulty. For example if he has 10 times the base line difficulty he has a 50% chance of getting 10 blocks at about 5% lower difficulty

from difficulty-algorithms.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.