Spaces:
Configuration error
Configuration error
Fix documentation links to use absolute GitHub URLs for PyPI compatibility
Browse files
README.md
CHANGED
|
@@ -261,10 +261,10 @@ The lattice grows. Discovery is reading the chain.
|
|
| 261 |
|
| 262 |
### Research & Theory
|
| 263 |
|
| 264 |
-
**📄 [Research Paper: Kleene Fixed-Point Framework](docs/RESEARCH_PAPER.md)**
|
| 265 |
Deep dive into the mathematical foundations—how CASCADE-LATTICE maps neural network computations to Kleene fixed points, creating verifiable provenance chains through distributed lattice networks.
|
| 266 |
|
| 267 |
-
**📖 [Accessible Guide: From Theory to Practice](docs/ACCESSIBLE_GUIDE.md)**
|
| 268 |
For everyone from data scientists to curious users—understand how CASCADE works, with examples ranging from medical AI oversight to autonomous drone coordination.
|
| 269 |
|
| 270 |
**Key Concepts:**
|
|
@@ -275,8 +275,8 @@ For everyone from data scientists to curious users—understand how CASCADE work
|
|
| 275 |
|
| 276 |
### Quick Links
|
| 277 |
|
| 278 |
-
- **Theory**: [Research Paper](docs/RESEARCH_PAPER.md) | [Mathematical Proofs](docs/RESEARCH_PAPER.md#appendix-b-mathematical-proofs)
|
| 279 |
-
- **Practice**: [Accessible Guide](docs/ACCESSIBLE_GUIDE.md) | [Real-World Examples](docs/ACCESSIBLE_GUIDE.md#real-world-examples)
|
| 280 |
|
| 281 |
---
|
| 282 |
|
|
@@ -287,4 +287,4 @@ Built on foundational work in:
|
|
| 287 |
- **Merkle Trees** (Merkle, 1987) — Cryptographic integrity guarantees
|
| 288 |
- **IPFS/IPLD** (Benet, 2014) — Content-addressed distributed storage
|
| 289 |
|
| 290 |
-
See [full bibliography](docs/RESEARCH_PAPER.md#references) in the research paper.
|
|
|
|
| 261 |
|
| 262 |
### Research & Theory
|
| 263 |
|
| 264 |
+
**📄 [Research Paper: Kleene Fixed-Point Framework](https://github.com/Yufok1/cascade-lattice/blob/main/docs/RESEARCH_PAPER.md)**
|
| 265 |
Deep dive into the mathematical foundations—how CASCADE-LATTICE maps neural network computations to Kleene fixed points, creating verifiable provenance chains through distributed lattice networks.
|
| 266 |
|
| 267 |
+
**📖 [Accessible Guide: From Theory to Practice](https://github.com/Yufok1/cascade-lattice/blob/main/docs/ACCESSIBLE_GUIDE.md)**
|
| 268 |
For everyone from data scientists to curious users—understand how CASCADE works, with examples ranging from medical AI oversight to autonomous drone coordination.
|
| 269 |
|
| 270 |
**Key Concepts:**
|
|
|
|
| 275 |
|
| 276 |
### Quick Links
|
| 277 |
|
| 278 |
+
- **Theory**: [Research Paper](https://github.com/Yufok1/cascade-lattice/blob/main/docs/RESEARCH_PAPER.md) | [Mathematical Proofs](https://github.com/Yufok1/cascade-lattice/blob/main/docs/RESEARCH_PAPER.md#appendix-b-mathematical-proofs)
|
| 279 |
+
- **Practice**: [Accessible Guide](https://github.com/Yufok1/cascade-lattice/blob/main/docs/ACCESSIBLE_GUIDE.md) | [Real-World Examples](https://github.com/Yufok1/cascade-lattice/blob/main/docs/ACCESSIBLE_GUIDE.md#real-world-examples)
|
| 280 |
|
| 281 |
---
|
| 282 |
|
|
|
|
| 287 |
- **Merkle Trees** (Merkle, 1987) — Cryptographic integrity guarantees
|
| 288 |
- **IPFS/IPLD** (Benet, 2014) — Content-addressed distributed storage
|
| 289 |
|
| 290 |
+
See [full bibliography](https://github.com/Yufok1/cascade-lattice/blob/main/docs/RESEARCH_PAPER.md#references) in the research paper.
|