{"work":{"id":"cf4c4e77-acaa-46b4-b066-ddf045165d05","openalex_id":null,"doi":"10.1007/978-3-","arxiv_id":null,"raw_key":null,"title":"Abu-Hashem, Mohammad Shehab, Qusai Shambour, and Riham Muqat.Nonvolatile Memory-Based Internet of Things: A Survey, pages 285–304","authors":null,"authors_text":"X","year":2018,"venue":null,"abstract":null,"external_url":"https://doi.org/10.1007/978-3-","cited_by_count":null,"metadata_source":"doi_reference","metadata_fetched_at":"2026-05-24T04:33:53.344382+00:00","pith_arxiv_id":null,"created_at":"2026-05-08T18:23:55.721236+00:00","updated_at":"2026-05-24T04:33:53.344382+00:00","title_quality_ok":true,"display_title":"2023.Parallel Programming for Multicore and Cluster Systems(3 ed.)","render_title":"2023.Parallel Programming for Multicore and Cluster Systems(3 ed.)"},"hub":{"state":{"work_id":"cf4c4e77-acaa-46b4-b066-ddf045165d05","tier":"super_hub","tier_reason":"100+ Pith inbound or 10,000+ external citations","pith_inbound_count":125,"external_cited_by_count":null,"distinct_field_count":39,"first_pith_cited_at":"2024-01-07T14:41:31+00:00","last_pith_cited_at":"2026-05-21T17:00:56+00:00","author_build_status":"needed","summary_status":"needed","contexts_status":"needed","graph_status":"needed","ask_index_status":"needed","reader_status":"not_needed","recognition_status":"not_needed","updated_at":"2026-05-24T09:14:53.773895+00:00","tier_text":"super_hub"},"tier":"super_hub","role_counts":[{"context_role":"background","n":35},{"context_role":"method","n":3},{"context_role":"other","n":2},{"context_role":"baseline","n":1},{"context_role":"dataset","n":1}],"polarity_counts":[{"context_polarity":"background","n":35},{"context_polarity":"use_method","n":3},{"context_polarity":"unclear","n":2},{"context_polarity":"baseline","n":1},{"context_polarity":"use_dataset","n":1}],"runs":{"ask_index":{"job_type":"ask_index","status":"succeeded","result":{"title":"2023.Parallel Programming for Multicore and Cluster Systems(3 ed.)","claims":[{"claim_text":"\"AutoGen: Enabling Next-Gen LLM Applications via Multi-Agent Conversation Framework\" 2023. arXiv:2308.08155.url: https://arxiv.org/abs/2308. 08155. [23] Mario V. Wüthrich and Michael Merz.Statistical Foundations of Actuarial Learning and its Applications. 1st ed. Springer Actuarial. Springer Cham, 2023.doi:10.1007/978-3- 031-12409-9.url:https://link.springer.com/book/10.1007/978-3-031-12409-9. [24] Cheng Xu et al. \"Benchmark Data Contamination of Large Language Models: A Survey\" 2024. arXiv:2406","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"sacrifice spatial resolution on the sensor plane, leading to an undesirable tradeoff between lateral and axial resolution [6]. Single-aperture solutions prioritize preserving the SWaP and resolution of a vision system, but necessitate additional optics to modify the optical transfer function to permit range encoding. These methods included coded aperture and PSF engineering [7], [8], [9], [10] . Both methods introduce amplitude or phase encoding mechanisms to modify how light propagates through ","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"Artificial intelligence (AI) is increasingly embedded in scientific research workflows, supporting tasks such as literature search, document analysis and scientific writing [30]. While AI tools promise substantial efficiency gains, they also introduce a fundamental tension: researchers are increasingly confronted with AI-generated outputs that are often opaque in their reasoning [18] and potentially error-prone [1]. As a result, researchers may be required to manually check or reproduce AI-gener","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"foster innovation [30, 35]. If faults in deployed API services occur, they may lead not only to service outages but also to data integrity violations and costly production incidents, thereby reinforcing the need for effective and scalable automated API testing. This need is reflected in the growth of research on REST API test- ing tools between 2017 and 2022 [18]. During this period, fuzzing- based approaches became predominant, especially black-box tech- niques that generate requests fromOpenAP","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"org/10.37236/8085. [56] R. Y. Rubinstein, Optimization of computer simulation models with rare events,Eur. J. Oper. Res.99 (1997), 89-112,https://doi.org/10.1016/S0377-2217(96)00385-2. [57] R. S. Sutton and A. G. Barto,Reinforcement Learning: An Introduction, 2nd edition, Adaptive Computa- tion and Machine Learning, MIT Press, Cambridge, MA, 2018. [58] Cs. Szepesvári,Algorithms for Reinforcement Learning, 1st edition, Synthesis Lectures on Artificial Intel- ligence and Machine Learning, Springer","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"abling comprehensive performance validation. Numerous test beam facilities have been established worldwide. Fig. 1 has ∗ Corresponding author, jinght@ihep.ac.cn † Corresponding author, dongmy@ihep.ac.cn provided an basic comparison among the test beams running currently. Notable examples include the facility operated by Deutsches Elektronen-Synchrotron (DESY) [8], which pro- vides electron beams in the 1-6 GeV energy range. At CERN, test beams are available in both the North and East Areas [9-11","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"}],"why_cited":"Pith tracks 2023.Parallel Programming for Multicore and Cluster Systems(3 ed.) because it crossed a citation-hub threshold. Current citing contexts most often use it as background evidence (34 contexts).","role_counts":[{"n":34,"context_role":"background"},{"n":3,"context_role":"method"},{"n":2,"context_role":"other"},{"n":1,"context_role":"baseline"},{"n":1,"context_role":"dataset"}]},"error":null,"updated_at":"2026-05-19T23:01:42.470441+00:00"},"author_expand":{"job_type":"author_expand","status":"succeeded","result":{"authors_linked":[{"id":"2deee313-1e7b-47c3-adfc-ee1637d70ae3","orcid":null,"display_name":"Lasse Blaauwbroek"},{"id":"f3cd7ede-d502-465b-9d75-64c88cbafdb2","orcid":null,"display_name":"Josef Urban"},{"id":"3ca24203-d327-47ea-a724-9b61b143bcba","orcid":null,"display_name":"and Herman Geuvers"}]},"error":null,"updated_at":"2026-05-19T23:01:43.518288+00:00"},"context_extract":{"job_type":"context_extract","status":"succeeded","result":{"enqueued_papers":25},"error":null,"updated_at":"2026-05-14T18:49:37.940674+00:00"},"graph_features":{"job_type":"graph_features","status":"succeeded","result":{"co_cited":[{"title":"Pattern Recognition 127 (2022), 108611","work_id":"238df2e4-a3e5-46f3-860e-3ae2b0094b97","shared_citers":9},{"title":"URLhttps://doi.org/10.48550/arXiv","work_id":"5c2060c6-427c-4321-be22-49ccae439d80","shared_citers":9},{"title":"Topology- Agnostic Detection of Temporal Money Laundering Flows in Billion-Scale Transactions","work_id":"452f975d-5e1f-47e0-967f-db1ed9da0d80","shared_citers":7},{"title":"Test Intention Guided LLM-Based Unit Test Generation","work_id":"c383b7e9-bd1e-4268-b134-a4e43d7560a3","shared_citers":4},{"title":"2009.A Statistical Learning Perspective of Genetic Programming","work_id":"475c3083-390a-4af7-8574-036552bff47f","shared_citers":3},{"title":"A Quantum Approximate Optimization Algorithm","work_id":"5a33d9f3-407a-4c7e-a119-ff581c66b173","shared_citers":3},{"title":"ImageBind One Embedding Space to Bind Them All","work_id":"b9701eca-d05e-4d2e-9045-6761df4ba175","shared_citers":3},{"title":"In: 40th IEEE/ACM International Conference on Automated Software Engineering, ASE 2025, Seoul, Korea, Republic of, November 16-20","work_id":"c9fe097c-7945-4fbc-8936-90273cb47806","shared_citers":3},{"title":"Quantum Computing in the NISQ era and beyond","work_id":"db02914e-62e0-4457-a74e-836513460506","shared_citers":3},{"title":"URL https://doi.org/10.1109/CVPR52733","work_id":"7efbc2dd-b0f2-4f71-bb1c-d2fcf110d805","shared_citers":3},{"title":"2016.Modelling and Control of Dynamic Systems Using Gaussian Process Models","work_id":"4d8d61c8-429b-40e8-a295-aa17c2049f81","shared_citers":2},{"title":"Barron, Ben Mildenhall, Mehdi S","work_id":"0a23d1b7-bd56-43cc-8a80-7c43ce994e1e","shared_citers":2},{"title":"Cobblestone: A Divide-and-Conquer Approach for Automating Formal Verification","work_id":"ecfd2f68-9c32-4e37-9fcd-5ec855694e41","shared_citers":2},{"title":"Connectivity for Quantum Graphs via Quantum Adjacency Operators","work_id":"4a7d968d-ee43-47f9-9cca-832cf129af59","shared_citers":2},{"title":"Davis, Guillaume Baudart, and Louis Mandel","work_id":"138a89bd-9857-4e55-a915-ff4f36d70e77","shared_citers":2},{"title":"de Moura and S","work_id":"580a7df0-08ad-410d-89d6-34fd91a3e676","shared_citers":2},{"title":"Generalized GHZ States and Distributed Quantum Computing","work_id":"2cffa2c9-a1a4-4569-aa60-62eae56a8d82","shared_citers":2},{"title":"Harrow, Avinatan Hassidim, and Seth Lloyd","work_id":"a8f7ed2a-1227-40cf-9b3b-9c4aa31fd99d","shared_citers":2},{"title":"Hubert, T., Mehta, R., Sartran, L., Horváth, M","work_id":"57be6f6f-9f99-4344-ac9d-a4a3c68a3014","shared_citers":2},{"title":"In2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)","work_id":"5955f330-cfab-45b0-9ff5-4dd04bca728a","shared_citers":2},{"title":"Judging LLM-as-a-Judge with MT-Bench and Chatbot Arena","work_id":"d0c30cd7-81e1-4159-a87f-f6adca77ff08","shared_citers":2},{"title":"Laing and G","work_id":"ae50c989-f5b1-4f1e-b7cf-308744afb33e","shared_citers":2},{"title":"Lawrence Zitnick","work_id":"9a41dfbd-d7c8-4b32-943f-59c08fdd6db7","shared_citers":2},{"title":"On lattices, learning with errors, random linear codes, and cryptography","work_id":"77633e6b-6ae4-4dba-8325-4b99c47a48c5","shared_citers":2}],"time_series":[{"n":65,"year":2026}],"dependency_candidates":[]},"error":null,"updated_at":"2026-05-14T18:49:42.580438+00:00"},"identity_refresh":{"job_type":"identity_refresh","status":"succeeded","result":{"items":[{"title":"Qwen3 Technical Report","outcome":"unchanged","work_id":"25a4e30c-1232-48e7-9925-02fa12ba7c9e","resolver":"local_arxiv","confidence":0.98,"old_work_id":"25a4e30c-1232-48e7-9925-02fa12ba7c9e"}],"counts":{"fixed":0,"merged":0,"unchanged":1,"quarantined":0,"needs_external_resolution":0},"errors":[],"attempted":1},"error":null,"updated_at":"2026-05-14T18:49:48.548583+00:00"},"role_polarity":{"job_type":"role_polarity","status":"succeeded","result":{"title":"2023.Parallel Programming for Multicore and Cluster Systems(3 ed.)","claims":[{"claim_text":"\"AutoGen: Enabling Next-Gen LLM Applications via Multi-Agent Conversation Framework\" 2023. arXiv:2308.08155.url: https://arxiv.org/abs/2308. 08155. [23] Mario V. Wüthrich and Michael Merz.Statistical Foundations of Actuarial Learning and its Applications. 1st ed. Springer Actuarial. Springer Cham, 2023.doi:10.1007/978-3- 031-12409-9.url:https://link.springer.com/book/10.1007/978-3-031-12409-9. [24] Cheng Xu et al. \"Benchmark Data Contamination of Large Language Models: A Survey\" 2024. arXiv:2406","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"sacrifice spatial resolution on the sensor plane, leading to an undesirable tradeoff between lateral and axial resolution [6]. Single-aperture solutions prioritize preserving the SWaP and resolution of a vision system, but necessitate additional optics to modify the optical transfer function to permit range encoding. These methods included coded aperture and PSF engineering [7], [8], [9], [10] . Both methods introduce amplitude or phase encoding mechanisms to modify how light propagates through ","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"Artificial intelligence (AI) is increasingly embedded in scientific research workflows, supporting tasks such as literature search, document analysis and scientific writing [30]. While AI tools promise substantial efficiency gains, they also introduce a fundamental tension: researchers are increasingly confronted with AI-generated outputs that are often opaque in their reasoning [18] and potentially error-prone [1]. As a result, researchers may be required to manually check or reproduce AI-gener","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"foster innovation [30, 35]. If faults in deployed API services occur, they may lead not only to service outages but also to data integrity violations and costly production incidents, thereby reinforcing the need for effective and scalable automated API testing. This need is reflected in the growth of research on REST API test- ing tools between 2017 and 2022 [18]. During this period, fuzzing- based approaches became predominant, especially black-box tech- niques that generate requests fromOpenAP","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"org/10.37236/8085. [56] R. Y. Rubinstein, Optimization of computer simulation models with rare events,Eur. J. Oper. Res.99 (1997), 89-112,https://doi.org/10.1016/S0377-2217(96)00385-2. [57] R. S. Sutton and A. G. Barto,Reinforcement Learning: An Introduction, 2nd edition, Adaptive Computa- tion and Machine Learning, MIT Press, Cambridge, MA, 2018. [58] Cs. Szepesvári,Algorithms for Reinforcement Learning, 1st edition, Synthesis Lectures on Artificial Intel- ligence and Machine Learning, Springer","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"},{"claim_text":"abling comprehensive performance validation. Numerous test beam facilities have been established worldwide. Fig. 1 has ∗ Corresponding author, jinght@ihep.ac.cn † Corresponding author, dongmy@ihep.ac.cn provided an basic comparison among the test beams running currently. Notable examples include the facility operated by Deutsches Elektronen-Synchrotron (DESY) [8], which pro- vides electron beams in the 1-6 GeV energy range. At CERN, test beams are available in both the North and East Areas [9-11","claim_type":"background","confidence":0.9,"evidence_strength":"citation_context"}],"why_cited":"Pith tracks 2023.Parallel Programming for Multicore and Cluster Systems(3 ed.) because it crossed a citation-hub threshold. Current citing contexts most often use it as background evidence (34 contexts).","role_counts":[{"n":34,"context_role":"background"},{"n":3,"context_role":"method"},{"n":2,"context_role":"other"},{"n":1,"context_role":"baseline"},{"n":1,"context_role":"dataset"}]},"error":null,"updated_at":"2026-05-19T23:01:43.521232+00:00"},"summary_claims":{"job_type":"summary_claims","status":"succeeded","result":{"title":"2023.Parallel Programming for Multicore and Cluster Systems(3 ed.)","claims":[],"why_cited":"Pith tracks 2023.Parallel Programming for Multicore and Cluster Systems(3 ed.) because it crossed a citation-hub threshold.","role_counts":[]},"error":null,"updated_at":"2026-05-14T18:49:34.739425+00:00"}},"summary":{"title":"2023.Parallel Programming for Multicore and Cluster Systems(3 ed.)","claims":[],"why_cited":"Pith tracks 2023.Parallel Programming for Multicore and Cluster Systems(3 ed.) because it crossed a citation-hub threshold.","role_counts":[]},"graph":{"co_cited":[{"title":"Pattern Recognition 127 (2022), 108611","work_id":"238df2e4-a3e5-46f3-860e-3ae2b0094b97","shared_citers":9},{"title":"URLhttps://doi.org/10.48550/arXiv","work_id":"5c2060c6-427c-4321-be22-49ccae439d80","shared_citers":9},{"title":"Topology- Agnostic Detection of Temporal Money Laundering Flows in Billion-Scale Transactions","work_id":"452f975d-5e1f-47e0-967f-db1ed9da0d80","shared_citers":7},{"title":"Test Intention Guided LLM-Based Unit Test Generation","work_id":"c383b7e9-bd1e-4268-b134-a4e43d7560a3","shared_citers":4},{"title":"2009.A Statistical Learning Perspective of Genetic Programming","work_id":"475c3083-390a-4af7-8574-036552bff47f","shared_citers":3},{"title":"A Quantum Approximate Optimization Algorithm","work_id":"5a33d9f3-407a-4c7e-a119-ff581c66b173","shared_citers":3},{"title":"ImageBind One Embedding Space to Bind Them All","work_id":"b9701eca-d05e-4d2e-9045-6761df4ba175","shared_citers":3},{"title":"In: 40th IEEE/ACM International Conference on Automated Software Engineering, ASE 2025, Seoul, Korea, Republic of, November 16-20","work_id":"c9fe097c-7945-4fbc-8936-90273cb47806","shared_citers":3},{"title":"Quantum Computing in the NISQ era and beyond","work_id":"db02914e-62e0-4457-a74e-836513460506","shared_citers":3},{"title":"URL https://doi.org/10.1109/CVPR52733","work_id":"7efbc2dd-b0f2-4f71-bb1c-d2fcf110d805","shared_citers":3},{"title":"2016.Modelling and Control of Dynamic Systems Using Gaussian Process Models","work_id":"4d8d61c8-429b-40e8-a295-aa17c2049f81","shared_citers":2},{"title":"Barron, Ben Mildenhall, Mehdi S","work_id":"0a23d1b7-bd56-43cc-8a80-7c43ce994e1e","shared_citers":2},{"title":"Cobblestone: A Divide-and-Conquer Approach for Automating Formal Verification","work_id":"ecfd2f68-9c32-4e37-9fcd-5ec855694e41","shared_citers":2},{"title":"Connectivity for Quantum Graphs via Quantum Adjacency Operators","work_id":"4a7d968d-ee43-47f9-9cca-832cf129af59","shared_citers":2},{"title":"Davis, Guillaume Baudart, and Louis Mandel","work_id":"138a89bd-9857-4e55-a915-ff4f36d70e77","shared_citers":2},{"title":"de Moura and S","work_id":"580a7df0-08ad-410d-89d6-34fd91a3e676","shared_citers":2},{"title":"Generalized GHZ States and Distributed Quantum Computing","work_id":"2cffa2c9-a1a4-4569-aa60-62eae56a8d82","shared_citers":2},{"title":"Harrow, Avinatan Hassidim, and Seth Lloyd","work_id":"a8f7ed2a-1227-40cf-9b3b-9c4aa31fd99d","shared_citers":2},{"title":"Hubert, T., Mehta, R., Sartran, L., Horváth, M","work_id":"57be6f6f-9f99-4344-ac9d-a4a3c68a3014","shared_citers":2},{"title":"In2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)","work_id":"5955f330-cfab-45b0-9ff5-4dd04bca728a","shared_citers":2},{"title":"Judging LLM-as-a-Judge with MT-Bench and Chatbot Arena","work_id":"d0c30cd7-81e1-4159-a87f-f6adca77ff08","shared_citers":2},{"title":"Laing and G","work_id":"ae50c989-f5b1-4f1e-b7cf-308744afb33e","shared_citers":2},{"title":"Lawrence Zitnick","work_id":"9a41dfbd-d7c8-4b32-943f-59c08fdd6db7","shared_citers":2},{"title":"On lattices, learning with errors, random linear codes, and cryptography","work_id":"77633e6b-6ae4-4dba-8325-4b99c47a48c5","shared_citers":2}],"time_series":[{"n":65,"year":2026}],"dependency_candidates":[]},"authors":[{"id":"3ca24203-d327-47ea-a724-9b61b143bcba","orcid":null,"display_name":"and Herman Geuvers","source":"manual","import_confidence":0.72},{"id":"f3cd7ede-d502-465b-9d75-64c88cbafdb2","orcid":null,"display_name":"Josef Urban","source":"manual","import_confidence":0.72},{"id":"2deee313-1e7b-47c3-adfc-ee1637d70ae3","orcid":null,"display_name":"Lasse Blaauwbroek","source":"manual","import_confidence":0.72}]}}