Corex Network
  • Concept
  • INTRODUCTION
    • Capabilities
    • General Architectural Outline
  • Joint Computing Environments
    • Outline and Operation
    • Standards and Cryptography
    • Auxiliary Channel Protection
  • NODES
    • Setup & Configuration
    • Management & Incentives
    • Efficiency and Stability Monitoring
    • Secure Execution Zones
    • Node Staking
      • Delegation Dynamics & Vesting Durations
  • CLUSTERS
    • Function and Formation
      • Fork & Migrate
    • Authorization & Incentives
    • Acceptance & Allocation
  • COMPUTATIONS
    • Identifying a Computation
      • Computation Units
    • Computation Initiation
      • Computation Timeline
      • Computational Input Data
  • TOKENOMICS
    • $HEAI
    • Liquidity Management
  • SOCIALS
    • Website
    • Twitter
    • Telegram
Powered by GitBook
On this page
  1. COMPUTATIONS
  2. Computation Initiation

Computational Input Data

PreviousComputation TimelineNext$HEAI

Last updated 7 months ago

Every computation definition operates within the framework of a specific and the data tied to those computations exists within that joint computing environment state context. To make use of data in computations, it must either be referenced via data objects (containers that encapsulate data from various sources) or passed directly as raw binary data during the commissioning phase.

Data can be supplied to computations from a wide range of sources, offering great flexibility in the network’s architecture, therefore the three main data provisioning are:

  1. Public Data Provisioning: This method pulls data directly from an on-chain source, with an option to encrypt the data.

  2. Private Data Provisioning: This involves direct provisioning of off-chain data by a operating within the same as the.

  3. Secure Data Provisioning: In this case, data comes indirectly from off-chain sources via nodes, which relay the information.

joint computing environment
node
cluster
joint computing environment