{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2012:43TTSJEVBIEFACHH73SME6OYIF","short_pith_number":"pith:43TTSJEV","canonical_record":{"source":{"id":"1210.4895","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-10-16T17:47:55Z","cross_cats_sorted":[],"title_canon_sha256":"e17dc1db80e8977605a83d5e07bf647bb7ab9709d9a51520b0e568e6291e733d","abstract_canon_sha256":"6b40c25d9d4c91baa295bad0159a29efe158f86f145ba1f8afa1de4b88dd3eea"},"schema_version":"1.0"},"canonical_sha256":"e6e73924950a085008e7fee4c279d84171435512b85e9a5f90dc20b3d1774e14","source":{"kind":"arxiv","id":"1210.4895","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1210.4895","created_at":"2026-05-18T03:42:55Z"},{"alias_kind":"arxiv_version","alias_value":"1210.4895v1","created_at":"2026-05-18T03:42:55Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1210.4895","created_at":"2026-05-18T03:42:55Z"},{"alias_kind":"pith_short_12","alias_value":"43TTSJEVBIEF","created_at":"2026-05-18T12:26:53Z"},{"alias_kind":"pith_short_16","alias_value":"43TTSJEVBIEFACHH","created_at":"2026-05-18T12:26:53Z"},{"alias_kind":"pith_short_8","alias_value":"43TTSJEV","created_at":"2026-05-18T12:26:53Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2012:43TTSJEVBIEFACHH73SME6OYIF","target":"record","payload":{"canonical_record":{"source":{"id":"1210.4895","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-10-16T17:47:55Z","cross_cats_sorted":[],"title_canon_sha256":"e17dc1db80e8977605a83d5e07bf647bb7ab9709d9a51520b0e568e6291e733d","abstract_canon_sha256":"6b40c25d9d4c91baa295bad0159a29efe158f86f145ba1f8afa1de4b88dd3eea"},"schema_version":"1.0"},"canonical_sha256":"e6e73924950a085008e7fee4c279d84171435512b85e9a5f90dc20b3d1774e14","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:42:55.095384Z","signature_b64":"3Xvv3jDda3ufBRH9tHVU3RaSkd/gWdOi0nfgEAEMRawunjl8lTUzr/M5bQEcPnFa3yeJVkydcQtMDkvB/rAwCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e6e73924950a085008e7fee4c279d84171435512b85e9a5f90dc20b3d1774e14","last_reissued_at":"2026-05-18T03:42:55.094655Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:42:55.094655Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1210.4895","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:42:55Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"TGfITcv4yX8lcWz5ZQvFrTp5XHPdtQC8DoARjI2rUW/10ja84syfsVreFSNwvCj7Bab5p8qOIk7/lUwqGy5ECQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T23:12:48.443942Z"},"content_sha256":"9aae8dd44899749813ba6173caf641d75aa4eba00ce2076193d2bc59f86a54f0","schema_version":"1.0","event_id":"sha256:9aae8dd44899749813ba6173caf641d75aa4eba00ce2076193d2bc59f86a54f0"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2012:43TTSJEVBIEFACHH73SME6OYIF","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Bayesian Vote Manipulation: Optimal Strategies and Impact on Welfare","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.GT","authors_text":"Ariel D. Procaccia, Craig Boutilier, Pingzhong Tang, Tyler Lu","submitted_at":"2012-10-16T17:47:55Z","abstract_excerpt":"Most analyses of manipulation of voting schemes have adopted two assumptions that greatly diminish their practical import. First, it is usually assumed that the manipulators have full knowledge of the votes of the nonmanipulating agents. Second, analysis tends to focus on the probability of manipulation rather than its impact on the social choice objective (e.g., social welfare). We relax both of these assumptions by analyzing optimal Bayesian manipulation strategies when the manipulators have only partial probabilistic information about nonmanipulator votes, and assessing the expected loss in"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1210.4895","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:42:55Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/S75yO+gAQsXCFkYf/lkeUwuB0ghxZsENunSpSpkydNQp2fME7Xr4b4qMq8/5sALFI2hJPkO1ymjOA12a1vLAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T23:12:48.444621Z"},"content_sha256":"f96726022b52525bc7a78733cf72437887c434add9f98a6c45d18a387c6b298a","schema_version":"1.0","event_id":"sha256:f96726022b52525bc7a78733cf72437887c434add9f98a6c45d18a387c6b298a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/43TTSJEVBIEFACHH73SME6OYIF/bundle.json","state_url":"https://pith.science/pith/43TTSJEVBIEFACHH73SME6OYIF/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/43TTSJEVBIEFACHH73SME6OYIF/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-18T23:12:48Z","links":{"resolver":"https://pith.science/pith/43TTSJEVBIEFACHH73SME6OYIF","bundle":"https://pith.science/pith/43TTSJEVBIEFACHH73SME6OYIF/bundle.json","state":"https://pith.science/pith/43TTSJEVBIEFACHH73SME6OYIF/state.json","well_known_bundle":"https://pith.science/.well-known/pith/43TTSJEVBIEFACHH73SME6OYIF/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2012:43TTSJEVBIEFACHH73SME6OYIF","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"6b40c25d9d4c91baa295bad0159a29efe158f86f145ba1f8afa1de4b88dd3eea","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-10-16T17:47:55Z","title_canon_sha256":"e17dc1db80e8977605a83d5e07bf647bb7ab9709d9a51520b0e568e6291e733d"},"schema_version":"1.0","source":{"id":"1210.4895","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1210.4895","created_at":"2026-05-18T03:42:55Z"},{"alias_kind":"arxiv_version","alias_value":"1210.4895v1","created_at":"2026-05-18T03:42:55Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1210.4895","created_at":"2026-05-18T03:42:55Z"},{"alias_kind":"pith_short_12","alias_value":"43TTSJEVBIEF","created_at":"2026-05-18T12:26:53Z"},{"alias_kind":"pith_short_16","alias_value":"43TTSJEVBIEFACHH","created_at":"2026-05-18T12:26:53Z"},{"alias_kind":"pith_short_8","alias_value":"43TTSJEV","created_at":"2026-05-18T12:26:53Z"}],"graph_snapshots":[{"event_id":"sha256:f96726022b52525bc7a78733cf72437887c434add9f98a6c45d18a387c6b298a","target":"graph","created_at":"2026-05-18T03:42:55Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Most analyses of manipulation of voting schemes have adopted two assumptions that greatly diminish their practical import. First, it is usually assumed that the manipulators have full knowledge of the votes of the nonmanipulating agents. Second, analysis tends to focus on the probability of manipulation rather than its impact on the social choice objective (e.g., social welfare). We relax both of these assumptions by analyzing optimal Bayesian manipulation strategies when the manipulators have only partial probabilistic information about nonmanipulator votes, and assessing the expected loss in","authors_text":"Ariel D. Procaccia, Craig Boutilier, Pingzhong Tang, Tyler Lu","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-10-16T17:47:55Z","title":"Bayesian Vote Manipulation: Optimal Strategies and Impact on Welfare"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1210.4895","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:9aae8dd44899749813ba6173caf641d75aa4eba00ce2076193d2bc59f86a54f0","target":"record","created_at":"2026-05-18T03:42:55Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"6b40c25d9d4c91baa295bad0159a29efe158f86f145ba1f8afa1de4b88dd3eea","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-10-16T17:47:55Z","title_canon_sha256":"e17dc1db80e8977605a83d5e07bf647bb7ab9709d9a51520b0e568e6291e733d"},"schema_version":"1.0","source":{"id":"1210.4895","kind":"arxiv","version":1}},"canonical_sha256":"e6e73924950a085008e7fee4c279d84171435512b85e9a5f90dc20b3d1774e14","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"e6e73924950a085008e7fee4c279d84171435512b85e9a5f90dc20b3d1774e14","first_computed_at":"2026-05-18T03:42:55.094655Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:42:55.094655Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"3Xvv3jDda3ufBRH9tHVU3RaSkd/gWdOi0nfgEAEMRawunjl8lTUzr/M5bQEcPnFa3yeJVkydcQtMDkvB/rAwCQ==","signature_status":"signed_v1","signed_at":"2026-05-18T03:42:55.095384Z","signed_message":"canonical_sha256_bytes"},"source_id":"1210.4895","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:9aae8dd44899749813ba6173caf641d75aa4eba00ce2076193d2bc59f86a54f0","sha256:f96726022b52525bc7a78733cf72437887c434add9f98a6c45d18a387c6b298a"],"state_sha256":"70356eed53728ff73747cf48645bc75ee1fd1041d1e2f3196181700001683075"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"0nVPoR5Y1hLAkCiDLZnsMuZShgPNx3KDa/G5UL1+axb7fGRULznTdoIlX8apD3A9emiXFEY9/gBylycUQSDQBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-18T23:12:48.446737Z","bundle_sha256":"5935846d97dd0f422b7077152d9ab401c914c36f233eeecd6be3950447aebb96"}}