Applix Network Documentation
  • Introduction
  • 🏢Firm's History
  • 🚧Problem Statement
  • 💡Solution Overview
  • 🏗️Technical Architecture
  • 🔧Infrastructure
  • ✨Features
  • 🛠️Use Cases
  • 💻Compute Power Rental
  • 📊Tokenomics
  • ✋User Participation
  • 🔒Security and Privacy
  • 🚀Roadmap
  • ✅Conclusion
  • 📚References
  • 🔗Links
Powered by GitBook
On this page

References

This section provides a comprehensive list of the sources, research papers, articles, and other references that support the content and claims made throughout the Applix Network whitepaper. These references ensure that our information is credible and well-founded, providing further reading and context for those interested in the technical and theoretical foundations of our platform.

Artificial Intelligence and High-Performance Computing

LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep Learning. Nature, 521(7553), 436-444. doi:10.1038/nature14539. Dean, J., et al. (2012). Large Scale Distributed Deep Networks. Advances in Neural Information Processing Systems, 25.

Blockchain Technology and Decentralization

Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf. Buterin, V. (2014). A Next-Generation Smart Contract and Decentralized Application Platform. Ethereum White Paper. Retrieved from https://ethereum.org/en/whitepaper/.

GPU Computing and Resource Allocation

Nickolls, J., Buck, I., Garland, M., & Skadron, K. (2008). Scalable Parallel Programming with CUDA. ACM Queue, 6(2), 40-53. doi:10.1145/1365490.1365500. Kirk, D. B., & Hwu, W. W. (2016). Programming Massively Parallel Processors: A Hands-on Approach. Morgan Kaufmann.

Security and Privacy in Decentralized Networks

Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015). Sok: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. 2015 IEEE Symposium on Security and Privacy, 104-121. doi:10.1109/SP.2015.14. Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing Privacy: Using Blockchain to Protect Personal Data. 2015 IEEE Security and Privacy Workshops, 180-184. doi:10.1109/SPW.2015.27.

Tokenomics and Cryptoeconomics

Chohan, U. W. (2020). Cryptoeconomics and Tokenomics. SSRN Electronic Journal. doi:10.2139/ssrn.3523089. Momoh, J. (2018). The Token Economy: How the Web3 reinvents the Internet. Tokenomics Journal.

Scalability and Load Balancing

Dean, J., & Barroso, L. A. (2013). The Tail at Scale. Communications of the ACM, 56(2), 74-80. doi:10.1145/2408776.2408794. Xie, C., Ding, C. H. Q., Zhang, H., & Shen, Y. (2019). An Efficient Load Balancing Scheme for Cloud Computing. IEEE Transactions on Cloud Computing, 7(1), 143-156. doi:10.1109/TCC.2017.2737988.

Industry Standards and Best Practices

National Institute of Standards and Technology (NIST). (2011). The NIST Definition of Cloud Computing. Special Publication 800-145. International Organization for Standardization (ISO). (2019). Information technology — Security techniques — Code of practice for information security controls (ISO/IEC 27002:2013).

Solana Blockchain

Yakovenko, A. (2018). Solana: A new architecture for a high performance blockchain. Solana Whitepaper. Bonafide, M. (2021). Solana: The Ultimate Guide to the Next Generation of Blockchain. Medium. Fitzgerald, K. (2020). Scalability and Decentralization: A Solana Story. Cointelegraph.

PreviousConclusionNextLinks

Last updated 11 months ago

📚