Engine Architecture

A vertically integrated engine combining proprietary optimization algorithms, advanced mathematics, structural analysis, and cryptographic verification.

Engine Layers

Each layer builds on the one below, creating an optimization stack with no external equivalent.

Layer 1 Solver Engine Multiple proprietary solver algorithms with GPU acceleration, automatic configuration, and intelligent orchestration.
Layer 2 Graph Analysis Advanced graph-theoretic optimization, structural analysis, and parameter search across complex problem landscapes.
Layer 3 Mathematical Analysis Deep mathematical analysis for problem characterization, dimensionality reduction, and solution validation.
Layer 4 Structural Analysis Proprietary methods for understanding problem geometry, identifying invariants, and guiding solver convergence.
Layer 5 Verification & Security Cryptographic proof of solution correctness, secure distributed computation, and immutable audit trails.
Layer 6 Adaptive Bridge Intelligent problem mapping, cross-layer solver coordination, and adaptive parameter tuning based on real-time feedback.
Layer 7 API Service REST API with enterprise authentication, tier-based access control, billing integration, and comprehensive endpoint coverage.
Layer 8 Visualization Matplotlib figure generation, Rich terminal dashboards, and interactive web interfaces for results exploration.

32 Endpoints. One API Key.

Access every DSC-2 capability through a unified REST API.

Solvers (5 endpoints)

Ising, QUBO, TSP, ensemble, and file upload. Submit matrices, sparse couplings, or standard file formats. Solutions in milliseconds.

Graph Analysis (2 endpoints)

Optimize and validate problem graph structures with proprietary analysis methods.

Structural Analysis (2 endpoints)

Structural analysis and classification for understanding optimization landscapes.

Mathematical Analysis (5 endpoints)

Problem characterization, dimensionality reduction, coherence evaluation, and compression.

Verification (5 endpoints)

Solution hashing, proof generation, proof verification, and secure computation.

Analysis (3 endpoints)

Time-series analysis, convergence detection, and solution verification.

Billing (6 endpoints)

Stripe checkout, plan details, usage metering, customer portal, webhook processing, and tier listings.

Infrastructure (4 endpoints)

Health check, version info, contact form, and public tier configuration.

Live API Demo

Hit the health endpoint to see DSC-2 respond in real time.

GET/health
// Click "Try It Live" to see the response

Code Examples

Python

import requests resp = requests.post( "https://api.dsc2.com/solve/ising", headers={"X-API-Key": "YOUR_KEY"}, json={ "J": [[0, -1], [-1, 0]], "h": [0.5, -0.5], "n_restarts": 10, } ) print(resp.json()) # {"spins": [1, -1], "energy": -1.5, ...}

cURL

curl -X POST https://api.dsc2.com/solve/ensemble \ -H "X-API-Key: YOUR_KEY" \ -H "Content-Type: application/json" \ -d '{ "J": [[0,-1,0],[-1,0,-1],[0,-1,0]], "h": [0, 0, 0], "n_spins": 3 }' # {"best_solver": "solver_1", # "best_energy": -2.0, ...}

Benchmarked Performance

Real-world benchmarks on RTX 6000 Ada GPU. Results vary by problem structure.

Problem Size DSC-2 Time Traditional Solver
1,000 variables 0.8 seconds 30+ seconds
5,000 variables 8 seconds Minutes to hours
10,000 variables 17 seconds Intractable
100,000+ variables Supported Not feasible
100x
cheaper than quantum
7
competing solvers
99.9%
SLA (Enterprise)
50 MB
max file upload

Deploy Your Way

Four deployment models to match your security and performance requirements.

Cloud API

Managed service. API key authentication. Zero infrastructure to manage.

Dedicated Instance

Single-tenant cloud instance with guaranteed resources and data isolation.

On-Premise

Docker deployment within your own data center. Full data sovereignty.

Hybrid

On-premise engine with cloud-based management, monitoring, and updates.

Enterprise Security

Built for regulated industries from day one.

PQC Authentication

Post-quantum-safe API key authentication with timing-safe validation, rotating keys, and IP allowlisting.

Rate Limiting

Sliding-window rate limiting per API key with configurable thresholds and burst protection.

Cryptographic Proofs

Verify optimization results without exposing problem data. Enterprise-grade cryptographic proof protocol.

TLS 1.3 Encryption

All data encrypted in transit. CORS restricted to authorized domains. No problem data retained after solve.

Audit Logging

Full audit trail for every API call. Structured logging. Optional blockchain anchoring for tamper-proof records.

Compliance Roadmap

SOC 2 Type II certification in progress. FedRAMP pathway planned. On-premise deployment available for air-gapped environments.

Send Us Your Hardest Problem

We'll benchmark it on DSC-2 for free. Schedule a technical deep-dive with our engineering team.

Free Benchmark