Corex Network
  • Concept
  • INTRODUCTION
    • Capabilities
    • General Architectural Outline
  • Joint Computing Environments
    • Outline and Operation
    • Standards and Cryptography
    • Auxiliary Channel Protection
  • NODES
    • Setup & Configuration
    • Management & Incentives
    • Efficiency and Stability Monitoring
    • Secure Execution Zones
    • Node Staking
      • Delegation Dynamics & Vesting Durations
  • CLUSTERS
    • Function and Formation
      • Fork & Migrate
    • Authorization & Incentives
    • Acceptance & Allocation
  • COMPUTATIONS
    • Identifying a Computation
      • Computation Units
    • Computation Initiation
      • Computation Timeline
      • Computational Input Data
  • TOKENOMICS
    • $HEAI
    • Liquidity Management
  • SOCIALS
    • Website
    • Twitter
    • Telegram
Powered by GitBook
On this page
  1. Joint Computing Environments

Outline and Operation

Joint Computing Environments serve as the core components of our network, acting as the tailored environments in which computational tasks are executed as per the customers setup and requirements. Joint computing environments offer extensive customization, allowing for precise adjustments to data management, security protocols, and other configurations.

In the Corex Network, before executing a computation, cluster peers need to verify that they have the capacity and sufficient preprocessing values. If values are insufficient, new ones are generated in advance, with node software managing this process to optimize resources. Once these conditions are met, the nodes retrieve inputs from the blockchain and process the circuit gates concurrently then submit the signed result back to the blockchain for further use.

The computations are scheduled within the joint computing environments and they are executed by clusters. Due to the network’s stateless design, tasks can be executed in parallel, with the only limitation being the capacity of the weakest node in a cluster.

PreviousGeneral Architectural OutlineNextStandards and Cryptography

Last updated 6 months ago