tostido commited on
Commit
9b6d3ed
·
1 Parent(s): e0c8a3f

Fix documentation links to use absolute GitHub URLs for PyPI compatibility

Browse files
Files changed (1) hide show
  1. README.md +5 -5
README.md CHANGED
@@ -261,10 +261,10 @@ The lattice grows. Discovery is reading the chain.
261
 
262
  ### Research & Theory
263
 
264
- **📄 [Research Paper: Kleene Fixed-Point Framework](docs/RESEARCH_PAPER.md)**
265
  Deep dive into the mathematical foundations—how CASCADE-LATTICE maps neural network computations to Kleene fixed points, creating verifiable provenance chains through distributed lattice networks.
266
 
267
- **📖 [Accessible Guide: From Theory to Practice](docs/ACCESSIBLE_GUIDE.md)**
268
  For everyone from data scientists to curious users—understand how CASCADE works, with examples ranging from medical AI oversight to autonomous drone coordination.
269
 
270
  **Key Concepts:**
@@ -275,8 +275,8 @@ For everyone from data scientists to curious users—understand how CASCADE work
275
 
276
  ### Quick Links
277
 
278
- - **Theory**: [Research Paper](docs/RESEARCH_PAPER.md) | [Mathematical Proofs](docs/RESEARCH_PAPER.md#appendix-b-mathematical-proofs)
279
- - **Practice**: [Accessible Guide](docs/ACCESSIBLE_GUIDE.md) | [Real-World Examples](docs/ACCESSIBLE_GUIDE.md#real-world-examples)
280
 
281
  ---
282
 
@@ -287,4 +287,4 @@ Built on foundational work in:
287
  - **Merkle Trees** (Merkle, 1987) — Cryptographic integrity guarantees
288
  - **IPFS/IPLD** (Benet, 2014) — Content-addressed distributed storage
289
 
290
- See [full bibliography](docs/RESEARCH_PAPER.md#references) in the research paper.
 
261
 
262
  ### Research & Theory
263
 
264
+ **📄 [Research Paper: Kleene Fixed-Point Framework](https://github.com/Yufok1/cascade-lattice/blob/main/docs/RESEARCH_PAPER.md)**
265
  Deep dive into the mathematical foundations—how CASCADE-LATTICE maps neural network computations to Kleene fixed points, creating verifiable provenance chains through distributed lattice networks.
266
 
267
+ **📖 [Accessible Guide: From Theory to Practice](https://github.com/Yufok1/cascade-lattice/blob/main/docs/ACCESSIBLE_GUIDE.md)**
268
  For everyone from data scientists to curious users—understand how CASCADE works, with examples ranging from medical AI oversight to autonomous drone coordination.
269
 
270
  **Key Concepts:**
 
275
 
276
  ### Quick Links
277
 
278
+ - **Theory**: [Research Paper](https://github.com/Yufok1/cascade-lattice/blob/main/docs/RESEARCH_PAPER.md) | [Mathematical Proofs](https://github.com/Yufok1/cascade-lattice/blob/main/docs/RESEARCH_PAPER.md#appendix-b-mathematical-proofs)
279
+ - **Practice**: [Accessible Guide](https://github.com/Yufok1/cascade-lattice/blob/main/docs/ACCESSIBLE_GUIDE.md) | [Real-World Examples](https://github.com/Yufok1/cascade-lattice/blob/main/docs/ACCESSIBLE_GUIDE.md#real-world-examples)
280
 
281
  ---
282
 
 
287
  - **Merkle Trees** (Merkle, 1987) — Cryptographic integrity guarantees
288
  - **IPFS/IPLD** (Benet, 2014) — Content-addressed distributed storage
289
 
290
+ See [full bibliography](https://github.com/Yufok1/cascade-lattice/blob/main/docs/RESEARCH_PAPER.md#references) in the research paper.