{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2010:4FY34VM5DSNDGMC72DOYAYVBXC","short_pith_number":"pith:4FY34VM5","canonical_record":{"source":{"id":"1008.0420","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2010-08-02T22:30:20Z","cross_cats_sorted":["cs.NI","math.IT"],"title_canon_sha256":"b06a5719785c41745e2f08cfeb990189adc72c764f28e513bb90dfc6abc9799a","abstract_canon_sha256":"e4fc3d146b62c376923ae254af4f00d09c674909cd70dc69d2dbfcd1efefa899"},"schema_version":"1.0"},"canonical_sha256":"e171be559d1c9a33305fd0dd8062a1b89ddd2dfd263648e4112137fdada2c4be","source":{"kind":"arxiv","id":"1008.0420","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.0420","created_at":"2026-05-18T00:58:19Z"},{"alias_kind":"arxiv_version","alias_value":"1008.0420v1","created_at":"2026-05-18T00:58:19Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.0420","created_at":"2026-05-18T00:58:19Z"},{"alias_kind":"pith_short_12","alias_value":"4FY34VM5DSND","created_at":"2026-05-18T12:26:03Z"},{"alias_kind":"pith_short_16","alias_value":"4FY34VM5DSNDGMC7","created_at":"2026-05-18T12:26:03Z"},{"alias_kind":"pith_short_8","alias_value":"4FY34VM5","created_at":"2026-05-18T12:26:03Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2010:4FY34VM5DSNDGMC72DOYAYVBXC","target":"record","payload":{"canonical_record":{"source":{"id":"1008.0420","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2010-08-02T22:30:20Z","cross_cats_sorted":["cs.NI","math.IT"],"title_canon_sha256":"b06a5719785c41745e2f08cfeb990189adc72c764f28e513bb90dfc6abc9799a","abstract_canon_sha256":"e4fc3d146b62c376923ae254af4f00d09c674909cd70dc69d2dbfcd1efefa899"},"schema_version":"1.0"},"canonical_sha256":"e171be559d1c9a33305fd0dd8062a1b89ddd2dfd263648e4112137fdada2c4be","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:58:19.438885Z","signature_b64":"zozj4YxD7iZofA/y8hxFIVEXdtMLcLCeXDcan1Gv1sGgPOi2YrS78dOmj+ku8Klu9EbRD31nrAC+HK9fkEvkDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e171be559d1c9a33305fd0dd8062a1b89ddd2dfd263648e4112137fdada2c4be","last_reissued_at":"2026-05-18T00:58:19.438187Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:58:19.438187Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1008.0420","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:19Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"M8aBjNyG6pxJIpc2xtycg2dr/ezGcbVxDdetnpWJDUZJMZ3ckiKUP4+L1QcpcG7hxyYUJml5VBd8JNNwFytHCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T21:21:57.992575Z"},"content_sha256":"c69b9331c2dce608ea15c2e6be13aec2a051806c2ad27014a2ea6d756249d7b3","schema_version":"1.0","event_id":"sha256:c69b9331c2dce608ea15c2e6be13aec2a051806c2ad27014a2ea6d756249d7b3"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2010:4FY34VM5DSNDGMC72DOYAYVBXC","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Modeling Network Coded TCP Throughput: A Simple Model and its Validation","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.NI","math.IT"],"primary_cat":"cs.IT","authors_text":"Joao Barros, MinJi Kim, Muriel Medard","submitted_at":"2010-08-02T22:30:20Z","abstract_excerpt":"We analyze the performance of TCP and TCP with network coding (TCP/NC) in lossy wireless networks. We build upon the simple framework introduced by Padhye et al. and characterize the throughput behavior of classical TCP as well as TCP/NC as a function of erasure rate, round-trip time, maximum window size, and duration of the connection. Our analytical results show that network coding masks erasures and losses from TCP, thus preventing TCP's performance degradation in lossy networks, such as wireless networks. It is further seen that TCP/NC has significant throughput gains over TCP. In addition"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.0420","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:19Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"eQMPt5mxcRBES1h1A2EFVBbMCVZJsmFyti/2qPLTSyu/qgJce268Utmnf/SyDDaRryt3Kw9RxwlABhBJGM7tBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T21:21:57.993237Z"},"content_sha256":"2ec28f9b801e365f4626f8b4677288a1c53250fffc07e522581a1b941f40fa54","schema_version":"1.0","event_id":"sha256:2ec28f9b801e365f4626f8b4677288a1c53250fffc07e522581a1b941f40fa54"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/4FY34VM5DSNDGMC72DOYAYVBXC/bundle.json","state_url":"https://pith.science/pith/4FY34VM5DSNDGMC72DOYAYVBXC/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/4FY34VM5DSNDGMC72DOYAYVBXC/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T21:21:57Z","links":{"resolver":"https://pith.science/pith/4FY34VM5DSNDGMC72DOYAYVBXC","bundle":"https://pith.science/pith/4FY34VM5DSNDGMC72DOYAYVBXC/bundle.json","state":"https://pith.science/pith/4FY34VM5DSNDGMC72DOYAYVBXC/state.json","well_known_bundle":"https://pith.science/.well-known/pith/4FY34VM5DSNDGMC72DOYAYVBXC/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2010:4FY34VM5DSNDGMC72DOYAYVBXC","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"e4fc3d146b62c376923ae254af4f00d09c674909cd70dc69d2dbfcd1efefa899","cross_cats_sorted":["cs.NI","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2010-08-02T22:30:20Z","title_canon_sha256":"b06a5719785c41745e2f08cfeb990189adc72c764f28e513bb90dfc6abc9799a"},"schema_version":"1.0","source":{"id":"1008.0420","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.0420","created_at":"2026-05-18T00:58:19Z"},{"alias_kind":"arxiv_version","alias_value":"1008.0420v1","created_at":"2026-05-18T00:58:19Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.0420","created_at":"2026-05-18T00:58:19Z"},{"alias_kind":"pith_short_12","alias_value":"4FY34VM5DSND","created_at":"2026-05-18T12:26:03Z"},{"alias_kind":"pith_short_16","alias_value":"4FY34VM5DSNDGMC7","created_at":"2026-05-18T12:26:03Z"},{"alias_kind":"pith_short_8","alias_value":"4FY34VM5","created_at":"2026-05-18T12:26:03Z"}],"graph_snapshots":[{"event_id":"sha256:2ec28f9b801e365f4626f8b4677288a1c53250fffc07e522581a1b941f40fa54","target":"graph","created_at":"2026-05-18T00:58:19Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We analyze the performance of TCP and TCP with network coding (TCP/NC) in lossy wireless networks. We build upon the simple framework introduced by Padhye et al. and characterize the throughput behavior of classical TCP as well as TCP/NC as a function of erasure rate, round-trip time, maximum window size, and duration of the connection. Our analytical results show that network coding masks erasures and losses from TCP, thus preventing TCP's performance degradation in lossy networks, such as wireless networks. It is further seen that TCP/NC has significant throughput gains over TCP. In addition","authors_text":"Joao Barros, MinJi Kim, Muriel Medard","cross_cats":["cs.NI","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2010-08-02T22:30:20Z","title":"Modeling Network Coded TCP Throughput: A Simple Model and its Validation"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.0420","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:c69b9331c2dce608ea15c2e6be13aec2a051806c2ad27014a2ea6d756249d7b3","target":"record","created_at":"2026-05-18T00:58:19Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"e4fc3d146b62c376923ae254af4f00d09c674909cd70dc69d2dbfcd1efefa899","cross_cats_sorted":["cs.NI","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2010-08-02T22:30:20Z","title_canon_sha256":"b06a5719785c41745e2f08cfeb990189adc72c764f28e513bb90dfc6abc9799a"},"schema_version":"1.0","source":{"id":"1008.0420","kind":"arxiv","version":1}},"canonical_sha256":"e171be559d1c9a33305fd0dd8062a1b89ddd2dfd263648e4112137fdada2c4be","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"e171be559d1c9a33305fd0dd8062a1b89ddd2dfd263648e4112137fdada2c4be","first_computed_at":"2026-05-18T00:58:19.438187Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:58:19.438187Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"zozj4YxD7iZofA/y8hxFIVEXdtMLcLCeXDcan1Gv1sGgPOi2YrS78dOmj+ku8Klu9EbRD31nrAC+HK9fkEvkDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:58:19.438885Z","signed_message":"canonical_sha256_bytes"},"source_id":"1008.0420","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:c69b9331c2dce608ea15c2e6be13aec2a051806c2ad27014a2ea6d756249d7b3","sha256:2ec28f9b801e365f4626f8b4677288a1c53250fffc07e522581a1b941f40fa54"],"state_sha256":"651b9a94e384164b839bc4eeb5351b76b11f22647361267ce7ef5415414e1368"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"treKgw9CzwLAPvJjyxwpVfjqWABUnOpEj+0kwatqRegegKD/Ph4fO8JmsNrixIc5lcP5OzdGbKoSU1Q9EIJGBQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T21:21:57.996850Z","bundle_sha256":"e17970dbcb84e08754d357fd2f0fd6f141933059fb1b3e3e274832dc7cd0c86c"}}