Time delay between initiating unstake and when tokens become transferable, used to protect PoS networks from instant exit attacks or slashing evasion.

Quantifying model confidence or epistemic/aleatoric uncertainty in predictions; used for calibration, abstention, and risk‑aware decisions.

Ethereum term for a valid block not in the canonical chain due to a race; referenced by later blocks for partial rewards, now called “ommer”.

Transaction that is broadcast and sitting in the mempool but not yet included in a block; may be replaced or dropped under congestion or policy rules.

Lending where borrowers post less collateral than the loan value, relying on credit scoring, real‑world enforcement, or guarantees beyond on‑chain liquidation.

When a model is too simple to capture patterns in the data, leading to high bias and poor training and test performance.

Security property that signatures or proofs cannot be created by anyone without the secret key; cornerstone of digital signature and zk systems.

Model trained on a single modality such as text or images, as opposed to multimodal systems that process multiple input types together.

Automated market maker protocol enabling token swaps via liquidity pools; introduced constant‑product AMMs and later concentrated liquidity designs.

Liquidity providers choose price ranges for their deposits, creating higher capital efficiency but requiring active management and exposing to range risk.

Extensibility points that let custom logic run on pool events like swaps or liquidity changes, enabling features such as dynamic fees or on‑chain TWAMMs.

Result showing that sufficiently large neural networks with non‑linear activations can approximate any continuous function on compact domains to arbitrary accuracy.

Trusted setup that works for any circuit within certain size bounds, so one ceremony can support many applications, unlike per‑circuit setups.

Raw inputs without ground‑truth annotations; used in self‑supervised, unsupervised, or pretraining regimes to scale model learning.

Privacy property ensuring that two actions or identities cannot be reliably linked; goal of mixers, ring signatures, and privacy‑preserving credentials.

Timeline for when locked tokens become transferable, typically after cliffs and linear vesting, important for liquidity and sell‑pressure analysis.

Process of withdrawing staked tokens from a validator or pool; may trigger an unbonding period and forfeit rewards during that time.

Learning from unlabeled data to discover structure such as clusters or latent factors; includes methods like autoencoders and k‑means.

Trusted setup where participants can add new randomness later, so as long as one contribution is honest the toxic waste remains unknown even if others are compromised.

Proxy contract that delegates calls to an implementation address which can be changed by an admin or governance, enabling upgrades without migrating storage.

Privileged key or role with power to change implementations or parameters; centralization risk mitigated with multisigs, timelocks, and on‑chain governance.

Design patterns that allow changing contract logic after deployment while preserving state, typically via proxies; increases flexibility but adds trust assumptions.

Estimating the causal impact of an intervention on an individual compared to control, often used for targeting marketing or product treatments.

String that identifies a resource on the web or IPFS/Arweave; in NFTs, tokenURI points to metadata JSON describing the asset.

Transaction‑like object used in account abstraction, containing calls, signatures, and gas limits, bundled by a paymaster/aggregator into on‑chain execution.

Interactive AI pattern where human input guides or corrects the model during or after inference, improving quality and accountability.

Separate mempool for ERC‑4337 user operations maintained by bundlers, with its own fee rules, reputation limits, and validation pipelines.

Unicode text encoding widely used on the web and in smart contract ABIs and logs; variable‑length with ASCII compatibility.

Token designed to provide access, usage rights, or fee discounts within a protocol rather than representing ownership, claims, or debt obligations.

Combining many small UTXOs into fewer larger ones during low‑fee periods to reduce future transaction size, cost, and privacy leakage from change outputs.

Very small outputs whose value is close to or below the cost to spend them; can bloat wallets and reveal addresses when later consolidated.

Accounting approach where balances are represented by sets of spendable outputs rather than account states; enables parallel validation and simple verification.

The current collection of all unspent outputs tracked by a full node; its size affects memory usage and initial sync time.

Discrete output from a blockchain transaction that can be spent as an input in a future transaction; core to Bitcoin’s accounting model.

Universal Upgradeable Proxy Standard where the implementation contract includes the upgrade logic; reduces proxy surface area compared to admin‑proxy patterns.