{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:3UMW6A5FRHH3PWCDISS4NFAP5E","short_pith_number":"pith:3UMW6A5F","canonical_record":{"source":{"id":"1610.07104","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2016-10-22T23:08:01Z","cross_cats_sorted":[],"title_canon_sha256":"8fd88adf44ec436668f5e5921b816555288de23afb453a09d7bd3e133ea1b7df","abstract_canon_sha256":"d7f8edcae695abca7194d94bf912f73746eb2b9a553ef7ec933441e0dfc1cf1a"},"schema_version":"1.0"},"canonical_sha256":"dd196f03a589cfb7d84344a5c6940fe938a446139ff5d2ac25201394ba711173","source":{"kind":"arxiv","id":"1610.07104","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1610.07104","created_at":"2026-05-18T01:01:35Z"},{"alias_kind":"arxiv_version","alias_value":"1610.07104v1","created_at":"2026-05-18T01:01:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.07104","created_at":"2026-05-18T01:01:35Z"},{"alias_kind":"pith_short_12","alias_value":"3UMW6A5FRHH3","created_at":"2026-05-18T12:29:58Z"},{"alias_kind":"pith_short_16","alias_value":"3UMW6A5FRHH3PWCD","created_at":"2026-05-18T12:29:58Z"},{"alias_kind":"pith_short_8","alias_value":"3UMW6A5F","created_at":"2026-05-18T12:29:58Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:3UMW6A5FRHH3PWCDISS4NFAP5E","target":"record","payload":{"canonical_record":{"source":{"id":"1610.07104","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2016-10-22T23:08:01Z","cross_cats_sorted":[],"title_canon_sha256":"8fd88adf44ec436668f5e5921b816555288de23afb453a09d7bd3e133ea1b7df","abstract_canon_sha256":"d7f8edcae695abca7194d94bf912f73746eb2b9a553ef7ec933441e0dfc1cf1a"},"schema_version":"1.0"},"canonical_sha256":"dd196f03a589cfb7d84344a5c6940fe938a446139ff5d2ac25201394ba711173","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:01:35.222550Z","signature_b64":"YcHpLT4CVwvy7XBIX/n1Ovo4CAI6heLOzQExPY/VfwE8c+5FxSpTLp9AxMiUlFz3iWJr7WzrxXgQ9T5N0OqEBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"dd196f03a589cfb7d84344a5c6940fe938a446139ff5d2ac25201394ba711173","last_reissued_at":"2026-05-18T01:01:35.222033Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:01:35.222033Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1610.07104","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:01:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2aYCCi42SNInZRs8SY4OIgJbrj+7hH1mHQ49VSGvIEfW3JJP0rAsDH9gISHvzfZatMOwmjif1TaHSC5unEPNCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T06:57:20.738580Z"},"content_sha256":"aa7bd5f894e7067b55d45c194373bd970c2563ee47e3ed7c00149ebbd2c62079","schema_version":"1.0","event_id":"sha256:aa7bd5f894e7067b55d45c194373bd970c2563ee47e3ed7c00149ebbd2c62079"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:3UMW6A5FRHH3PWCDISS4NFAP5E","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Independent Component Analysis by Entropy Maximization with Kernels","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"stat.ML","authors_text":"Geng-Shen Fu, Rami Mowakeaa, Tulay Adali, Zois Boukouvalas","submitted_at":"2016-10-22T23:08:01Z","abstract_excerpt":"Independent component analysis (ICA) is the most popular method for blind source separation (BSS) with a diverse set of applications, such as biomedical signal processing, video and image analysis, and communications. Maximum likelihood (ML), an optimal theoretical framework for ICA, requires knowledge of the true underlying probability density function (PDF) of the latent sources, which, in many applications, is unknown. ICA algorithms cast in the ML framework often deviate from its theoretical optimality properties due to poor estimation of the source PDF. Therefore, accurate estimation of s"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.07104","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:01:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"YHwBsvxZFGHxl1mjCw7oEKlE4r0tBDN6aOmHjYDzOpWy5WagTaHtp2ZCmQmGpjcVaKPs5tOtPWabqEeCgoY5Cw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T06:57:20.738920Z"},"content_sha256":"6b09711299b4d0e3559fac51c8c91f997fafaad653e44ce87a8db2c9881a62f4","schema_version":"1.0","event_id":"sha256:6b09711299b4d0e3559fac51c8c91f997fafaad653e44ce87a8db2c9881a62f4"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/3UMW6A5FRHH3PWCDISS4NFAP5E/bundle.json","state_url":"https://pith.science/pith/3UMW6A5FRHH3PWCDISS4NFAP5E/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/3UMW6A5FRHH3PWCDISS4NFAP5E/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T06:57:20Z","links":{"resolver":"https://pith.science/pith/3UMW6A5FRHH3PWCDISS4NFAP5E","bundle":"https://pith.science/pith/3UMW6A5FRHH3PWCDISS4NFAP5E/bundle.json","state":"https://pith.science/pith/3UMW6A5FRHH3PWCDISS4NFAP5E/state.json","well_known_bundle":"https://pith.science/.well-known/pith/3UMW6A5FRHH3PWCDISS4NFAP5E/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:3UMW6A5FRHH3PWCDISS4NFAP5E","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"d7f8edcae695abca7194d94bf912f73746eb2b9a553ef7ec933441e0dfc1cf1a","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2016-10-22T23:08:01Z","title_canon_sha256":"8fd88adf44ec436668f5e5921b816555288de23afb453a09d7bd3e133ea1b7df"},"schema_version":"1.0","source":{"id":"1610.07104","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1610.07104","created_at":"2026-05-18T01:01:35Z"},{"alias_kind":"arxiv_version","alias_value":"1610.07104v1","created_at":"2026-05-18T01:01:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.07104","created_at":"2026-05-18T01:01:35Z"},{"alias_kind":"pith_short_12","alias_value":"3UMW6A5FRHH3","created_at":"2026-05-18T12:29:58Z"},{"alias_kind":"pith_short_16","alias_value":"3UMW6A5FRHH3PWCD","created_at":"2026-05-18T12:29:58Z"},{"alias_kind":"pith_short_8","alias_value":"3UMW6A5F","created_at":"2026-05-18T12:29:58Z"}],"graph_snapshots":[{"event_id":"sha256:6b09711299b4d0e3559fac51c8c91f997fafaad653e44ce87a8db2c9881a62f4","target":"graph","created_at":"2026-05-18T01:01:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Independent component analysis (ICA) is the most popular method for blind source separation (BSS) with a diverse set of applications, such as biomedical signal processing, video and image analysis, and communications. Maximum likelihood (ML), an optimal theoretical framework for ICA, requires knowledge of the true underlying probability density function (PDF) of the latent sources, which, in many applications, is unknown. ICA algorithms cast in the ML framework often deviate from its theoretical optimality properties due to poor estimation of the source PDF. Therefore, accurate estimation of s","authors_text":"Geng-Shen Fu, Rami Mowakeaa, Tulay Adali, Zois Boukouvalas","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2016-10-22T23:08:01Z","title":"Independent Component Analysis by Entropy Maximization with Kernels"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.07104","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:aa7bd5f894e7067b55d45c194373bd970c2563ee47e3ed7c00149ebbd2c62079","target":"record","created_at":"2026-05-18T01:01:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"d7f8edcae695abca7194d94bf912f73746eb2b9a553ef7ec933441e0dfc1cf1a","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2016-10-22T23:08:01Z","title_canon_sha256":"8fd88adf44ec436668f5e5921b816555288de23afb453a09d7bd3e133ea1b7df"},"schema_version":"1.0","source":{"id":"1610.07104","kind":"arxiv","version":1}},"canonical_sha256":"dd196f03a589cfb7d84344a5c6940fe938a446139ff5d2ac25201394ba711173","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"dd196f03a589cfb7d84344a5c6940fe938a446139ff5d2ac25201394ba711173","first_computed_at":"2026-05-18T01:01:35.222033Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:01:35.222033Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"YcHpLT4CVwvy7XBIX/n1Ovo4CAI6heLOzQExPY/VfwE8c+5FxSpTLp9AxMiUlFz3iWJr7WzrxXgQ9T5N0OqEBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T01:01:35.222550Z","signed_message":"canonical_sha256_bytes"},"source_id":"1610.07104","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:aa7bd5f894e7067b55d45c194373bd970c2563ee47e3ed7c00149ebbd2c62079","sha256:6b09711299b4d0e3559fac51c8c91f997fafaad653e44ce87a8db2c9881a62f4"],"state_sha256":"f523c803619090303c08a3365b5f0d0ac22be87426ee804c89a44b63e60b942f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"st8FgfMLJj7Bnafah+Y5Q/+U8qvbk34cyvnHjG0OuTJXzoQoXoA+Yp4G1hZhn1Jk2rc1ZcYOBXQzNObsB6iVDg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T06:57:20.740919Z","bundle_sha256":"488bcc02654d303597c6e53f663dd8b1415ade798e78b881b368ecadf3b09d91"}}