Sidechain

Independent chain bridged to a mainnet, with its own validators and security model, offering different performance or features than the base chain.

SECP256k1

Elliptic curve used by Bitcoin and many EVM chains for public‑key cryptography, enabling compact keys and signatures with strong security.

Schnorr Signature

Signature scheme enabling key aggregation and smaller proofs, used in Bitcoin Taproot and multi‑sig constructions to improve privacy and efficiency.

Smart Contract

Deterministic code deployed on a blockchain that enforces rules automatically when conditions are met, removing the need for intermediaries.

System Prompt

Hidden priming instructions that steer an assistant’s general behavior and safety policy, applied ahead of user messages.

Style Transfer

Technique that re‑renders content in the visual or textual style of a reference, via optimization or model conditioning techniques.

Stable Diffusion

Latent diffusion model family for image generation that denoises from learned latent space, enabling high‑quality outputs on consumer GPUs.

Speculative Decoding

Decoding method where a small draft model proposes tokens and a larger model validates them, increasing generation throughput with minimal quality loss.

Sparse Attention

Attention mechanisms that compute over a subset of tokens or use structured patterns to reduce quadratic cost and extend context windows.

Scaling Laws (AI)

Empirical regularities showing how model loss improves predictably with more parameters, data, and compute, guiding training budgets and model sizes.

Semi‑Supervised Learning

Training that mixes a small labeled set with a large unlabeled set, leveraging pseudo‑labels or consistency losses for better generalization.