{"version":"2","agent":"Siliq Compute Gateway","agent_id":21648,"paymentMethods":{"x402":{"tokens":["USDC","ETH","WETH","cbBTC"],"chain":"base","chainId":8453},"mpp":{"provider":"Stripe","methods":["card","crypto"],"minimum":0.5},"demo":{"limit":"1000/hr/IP"}},"resources":[{"id":"solve.generic","name":"Constraint Solver (CP-SAT)","description":"OR-Tools CP-SAT solver. Send constraints, get verified solutions.","price":"0.01","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/solve/generic","method":"POST"},{"id":"solve.schedule","name":"Schedule Optimizer","description":"Schedule optimization with coverage, fairness, and conflict constraints.","price":"0.05","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/solve/schedule","method":"POST"},{"id":"psi.simple","name":"Private Set Intersection (Simple)","description":"Find common set elements without revealing full sets. ECDH-PSI.","price":"0.02","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/psi/simple","method":"POST"},{"id":"hire.schedule-planner","name":"Schedule Planner (Agent for Hire)","description":"Hire an agent to optimize schedules. Composes solver + analysis.","price":"0.50","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/hire/schedule-planner","method":"POST"},{"id":"hire.constraint-solver","name":"Constraint Solver (Queued)","description":"Generic constraint solving with job queue serialization.","price":"0.05","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/hire/constraint-solver","method":"POST"},{"id":"psi.prove","name":"PSI ZK Proof","description":"ZK proof of intersection cardinality. Halo2 PLONK.","price":"0.02","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/psi/prove","method":"POST"},{"id":"analytics.erlang","name":"Erlang C Staffing Oracle","description":"M/M/c queuing theory: wait probability, service level, staffing recommendation.","price":"0.01","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/analytics/erlang","method":"POST"},{"id":"analytics.rt","name":"Contagion Rt Estimator","description":"Effective reproduction number (Cori method) with 95% CI and trend.","price":"0.03","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/analytics/rt","method":"POST"},{"id":"analytics.soc","name":"SOC Early Warning","description":"Critical slowing down detection for cascade failure prediction.","price":"0.03","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/analytics/soc","method":"POST"},{"id":"analytics.arima","name":"ARIMA Forecast Oracle","description":"Auto-ARIMA time series forecasting with confidence intervals.","price":"0.02","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/analytics/arima","method":"POST"},{"id":"analytics.spc","name":"SPC Control Chart","description":"Control limits, Western Electric rules, process capability (Cp, Cpk).","price":"0.01","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/analytics/spc","method":"POST"},{"id":"analytics.rhythm","name":"Agent Rhythm Oracle","description":"Drift and anomaly detection for AI agent traces: period, phase coherence, SOC+SPC signals.","price":"0.03","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/analytics/rhythm","method":"POST"},{"id":"ckks.stats","name":"Encrypted Statistics (CKKS)","description":"Mean, variance, or inner product on a CKKS-encrypted float array. Server never sees plaintext.","price":"0.10","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/ckks/stats","method":"POST"},{"id":"cytoskeletal.analyze","name":"Cytoskeletal Mode Analyzer","description":"Bioelectric mode alphabet from cytoskeletal network topology. Graph Laplacian + Schur complement + spherical harmonics. 20 pre-built human cell types. Cites Montgomery et al. (2025).","price":"0.05","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/cytoskeletal/analyze","method":"POST"},{"id":"weather.snapshot","name":"Weather Snapshot","description":"Hyperlocal weather from Windward Oahu","price":"0.001","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/weather/snapshot","method":"POST"},{"id":"tide.snapshot","name":"Tide Snapshot","description":"Current tide state for Kaneohe Bay","price":"0.001","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/tide/snapshot","method":"POST"},{"id":"snorkel.conditions","name":"Snorkel Conditions","description":"Computed snorkeling quality rating","price":"0.002","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/snorkel/conditions","method":"POST"},{"id":"fhe.threshold","name":"FHE Threshold Comparison","description":"Encrypted comparison: is x > y? Server never sees plaintext.","price":"0.002","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/fhe/evaluate/threshold","method":"POST"},{"id":"fhe.add","name":"FHE Encrypted Addition","description":"Encrypted addition: x + y. Server never sees plaintext.","price":"0.001","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/fhe/evaluate/add","method":"POST"},{"id":"fhe.multiply","name":"FHE Encrypted Multiplication","description":"Encrypted multiplication: x * y. Server never sees plaintext.","price":"0.002","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/fhe/evaluate/multiply","method":"POST"},{"id":"fhe.workload","name":"FHE Workload Prediction","description":"XGBoost workload prediction (23 features) under FHE. Server never sees feature values.","price":"0.01","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/fhe/evaluate/workload","method":"POST"},{"id":"fhe.rigidity","name":"FHE Schedule Rigidity","description":"Encrypted schedule stability analysis. Computes Hamming distance between two encrypted schedule snapshots without seeing assignments. Client verifies via deterministic plaintext comparison.","price":"0.05","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/fhe/evaluate/rigidity","method":"POST"},{"id":"fhe.time_crystal","name":"FHE Time Crystal Objective","description":"Full encrypted time crystal analysis. Returns Hamming distance + per-resident churn vector in one call. Client computes rigidity, fairness, constraint scores, and combined objective locally. Domain-specific verification.","price":"0.10","token":"USDC","chain":"base","recipient":"0x5C98e2448d11dBb8A64914Daa0C6804Cea495B85","endpoint":"/fhe/evaluate/time_crystal","method":"POST"}]}