Inferix Decentralized GPU
  • Getting Started
    • Overview
    • $IFX
    • Resources
    • Brand Kit
    • Frequently asked questions (FAQs)
  • Inferix Whitepaper
    • Introduction
      • Rendering network using crowdsourced GPU
      • Rendering verification problem
    • High-level description of ANGV
      • Noise generation
      • Noise verification
      • Thread model
    • Implementation of ANGV
      • Structure of noise
      • Noise insertion
        • Geometric constraints
        • Distortion region
      • Adaptive noise spreading
      • Verification key generation
      • Noise verification
      • Threat analysis
        • Attacks on verification keys
        • Attacks on noises
        • Attacks on verifiers
      • Performance evaluation
      • Integration
    • Decentralized visual computing
      • Client Apps plugin
      • Client API and SDK
      • Manager node
      • Worker node
      • Decentralized storage
        • Data categories
        • Multi-level 3D polygon data
        • Polygon digester
        • Decentralized storage
        • Decentralized cache
      • Data security with FHE and TEE
        • Verifier data security enhancement with FHE
        • Worker and Manager data security enhancement with FHE
    • Decentralized federated AI
      • Federated learning with TensorOpera
      • Meta LLaMA
      • Stable Diffusion
      • Other AI models
      • Inferix AI
    • Economic model
      • GPU compute market for visual computing and federated AI
      • Inferix vision
      • $IFX token
      • Burn-Mint-Work token issuance model
      • Inferix bench and IBME
        • IB and IBM
        • IBME
      • Price simulation
      • Token metrics and allocation
        • Token allocation
        • Token vesting
      • Governance
      • Node staking and rewards
        • Worker
        • Verifier
        • Manager
        • Penalty pool
      • Node sale and guaranteed node buyback
        • Node sales
        • Guaranteed Node Buyback
    • Future development
      • PoR and NFT minting for graphics creative assets
      • ZKP and PoR communication
      • Inferix RemotePC
      • Rendering professional network
    • References
    • Appendix A: Proofs
    • Appendix B: Price simulation details
    • Appendix C: Hardware requirements for nodes
    • Appendix D: Performance evaluation data
  • Worker Node Guide
    • What is Worker Node
      • How do the Worker Node work
      • Worker Node Rewards
      • How to run Worker Node
      • What is the Worker Node License (NFT)
    • Worker Node Sales
      • Guide to Purchase Worker Nodes
      • Worker Node Sale Timeline
      • Node Supply, Price, Tiers and Purchase Caps
      • Guaranteed Node Buyback
      • How to get Node Whitelisted?
      • Smart Contract Addresses
      • User Discounts & Referral Program
      • Worker Node Purchase FAQ
      • ABKK Collaboration FAQ
  • Verifier Node Guide
    • What is Verifier Node
      • How do the Verifier Node work
      • Verifier Node Rewards
      • How to run Verifier Node
      • What is the Verifier Node License (NFT)
    • Verifier Node Sales
      • Guide to Purchase Verifier Nodes
      • Verifier Node Sale Timeline
      • Node Supply, Price, Tiers and Purchase Caps
      • Guaranteed Node Buyback
      • How to get Node Whitelisted?
      • Smart Contract Addresses
      • User Discounts & Referral Program
      • Verifier Node Purchase FAQ
      • Aethir Node Winners FAQ
  • Inferix MVP
    • Tutorial: MVP for designers & GPU owners
    • PoR MVP
  • Inferix Testnet 2 on Solana & IoTeX [ENDED]
    • Adding GPUs to the Network
      • For GPU providers
      • For GPU providers without funds
      • For users without GPUs
      • For Inferix Node Holders
    • Renting GPU Devices
    • User Revenue Calculation
      • Worker Rewards
      • Rental Revenue
      • Viewing Revenue
      • Claiming Rewards
    • GPU Staking & Unstaking
      • Staking Requirements
      • Unstaking GPUs
    • Guide to get tIFX tokens
    • Why choose Inferix DePIN GPU Solutions?
  • Inferix Testnet 1 on IoTeX [ENDED]
    • Inferix GPU Solutions
    • Adding GPUs to the Network
    • Renting GPU Devices
    • User Revenue Calculation
    • GPU Staking
    • Multiple options to participate in the Staking & Mining Program
    • Special airdrop for Inferix Node Holders! 🎉
    • Guide to get tIFX tokens
    • FAQ
  • Inferix Explorer
  • Team & Achievements
    • Our Story
    • Team
    • Member of Cohort 1 DePINSurf
    • Achievements
  • Community & Events
    • Events
    • Inferix Campaign: "ALLIANCE" (ENDED)
  • Terms of Service
    • Privacy Policy
    • Airdrop Terms of Service
Powered by GitBook
On this page
  1. Inferix Whitepaper

References

[1]J. F. Hughes, A. van Dam, M. McGuire, D. F. Sklar, J. D. Foley, S. K. Feiner, and K. Akeley, Computer Graphics: Principles and Practice, 3rd ed. Addison-Wesley, 2014

[2] M. Wu and B. Liu, "Watermarking for image authentication," in Proceedings of International Conference on Image Processing, 1998.

[3] M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proceedings of International Conference on Image Processing, 1997.

[4] R. B. Wolfgang and E. J. Delp, "Fragile watermarking using the vw2d watermark," in Security and Watermarking of Multimedia Contents. SPIE, 1999.

[5] C. Gentry, "Fully homomorphic encryption using ideal lattices," Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009.

[6] C. Gentry, "Computing arbitrary functions of encrypted data," Communications of the ACM, vol. 53, no. 3, 2010.

[7] C. Marcolla, V. Sucasas, M. Manzano, R. Bassoli, F. H. P. Fitzek, and N. Aaraj, "Survey on fully homomorphic encryption, theory, and applications," Proceedings of the IEEE, 2022.

[8] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, 1997.

[9] I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proceedings of the IEEE, 1999.

[10] S. A. Craver, N. D. Memon, B.-L. Yeo, and M. M. Yeung, "Can invisible watermarks resolve rightful ownerships?" in Storage and Retrieval for Image and Video Databases, 1997.

[11] N. Jayant, J. Johnston, and R. Safranek, "Signal compression based on models of human perception," Proceedings of the IEEE, 1993.

[12] H. R. Wu, A. R. Reibman, W. Lin, F. Pereira, and S. S. Hemami,"Perceptual visual signal compression and transmission," Proceedings of the IEEE, 2013.

[13] Q. Lian, Z. Zhang, M. Yang, B. Y. Zhao, Y. Dai, and X. Li, "An empirical study of collusion behavior in the maze p2p file-sharing system," in 27th International Conference on Distributed Computing Systems, 2007.

[14] I. J. Cox, M. L. Miller, , and A. L. McKellips, "Watermarking as communications with side information," Proceedings of the IEEE, 1999.

[15] C. Cachin, "An information-theoretic model for steganography," in International Workshop on Information Hiding, 1998.

[16] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - a survey," Proceedings of the IEEE, vol. 87, no. 7, 1999.

[17] M. D. Swanson, B. Zhu, and A. H. Tewfik, "Transparent robust image watermarking," in Proceedings of 3rd IEEE International Conference on Image Processing, 1996.

[18] C. I. Podilchuk and W. Zeng, "Image-adaptive watermarking using visual models," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998.

[19] S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in International Workshop on Information Hiding, 2000.

[20] J. H. Reif, D. J. Tygar, and A. Yoshida, "Computability and complexity of ray tracing," Discrete and Computational Geometry, vol. 11, no. 3, 1994.

[21] J. Stern, "Secret linear congruential generators are not cryptographically secure," in 28th Annual Symposium on Foundations of Computer Science, 1987.

[22] J. Chou, S. S. Pradhan, and K. Ramchandran, "On the duality between distributed source coding and data hiding," in Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, vol. 2, 1999.

[23] Actif3D Team. (2023) The no-code vr/ar platform for creator economy. [Online]. Available: https://academy.actif3d.com/blog:no-code-vr-platform

[24] I. Chillotti, M. Joye, and P. Paillier, "Programmable bootstrapping enables efficient homomorphic inference of deep neural networks," in Cyber Security Cryptography and Machine Learning, 2021.

[25] OMTP. (2009, May) Advanced trusted environment: Omtp tr1. [Online]. Available: http://www.omtp.org/OMTP_Advanced_Trusted_Environment_OMTP_TR1_v1_1.pdf

[26] TensorOpera. (2023, Nov) Scalellm: Unlocking llama2-13b llm inference on consumer gpu rtx 4090, powered by fedml nexus ai. [Online]. Available: https://blog.tensoropera.ai/scalellm-unlocking-llama2-13b- llm-inference-on-consumer-gpu-rtx-4090-powered-by-fedml-nexus-ai/

[27] ——. (2022) Scalellm: Serverless and memory-efficient model serving engine for large language models. [Online]. Available: https://docs.tensoropera.ai/deploy/scalellm

[28] Global Market Insight. (2024, May) Visual computing market size by component (hardware, software), by display platform (interactive whiteboards, interactive kiosk, interactive table, interactive video wall, monitors), by industry verticals, regional outlook and forecast, 2024 - 2032. [Online]. Available: https://www.gminsights.com/industry-analysis/visual-computing-market

[29] Polaris Market Research. (2022, Sep) Federated learning market share, size, trends, industry analysis report, by application (industrial internet of things, drug discovery, risk management, augmented and virtual reality, data privacy management, others); by industry vertical; by region; segment forecast, 2022 - 2030. [Online]. Available: https://www.polarismarketresearch.com/industry-analysis/federated-learning-market

[30] A. Haleem, A. Allen, A. Thompson, M. Nijdam, and R. Garg, "Helium: A decentralized wireless network," Helium Systems, Tech. Rep., 2018.

[31] P. Snow, B. Deery, J. Lu, D. Johnston, and P. Kirby, "Factom: Business processes secured by immutable audit trails on the blockchain," Factom Protocol, Tech. Rep., 2018.

[32] K. Samani. (2018, Feb) New models for utility tokens. [Online]. Available: https://multicoin.capital/2018/02/13/new-models-utility-tokens/

[33] Super Renders Farm. (2024) Render farm pricing. [Online]. Available: https://superrendersfarm.com/pricing

[34] RebusFarm. (2024) Render farm prices and discounts. [Online]. Available: https://rebusfarm.net/buy/products

[35] Fox Renderfarm. (2024) Render farm pricing. [Online]. Available: https://www.foxrenderfarm.com/pricing.html

PreviousRendering professional networkNextAppendix A: Proofs

Last updated 8 months ago