{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:63D6VJDL5A7KYSXO7UJRV7CDRE","short_pith_number":"pith:63D6VJDL","canonical_record":{"source":{"id":"1905.13271","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2019-05-30T19:32:46Z","cross_cats_sorted":["stat.ML"],"title_canon_sha256":"e26aba9d0d31fe31a53316880d87ed06992cdbd81aad6bc447c30be9a5b45436","abstract_canon_sha256":"f562ba36ed5de4c64912a364a23d37b4e20b65a94825204fedd0ff535bb9f56e"},"schema_version":"1.0"},"canonical_sha256":"f6c7eaa46be83eac4aeefd131afc4389195d969c91dce1ef9a6c781efb99d31d","source":{"kind":"arxiv","id":"1905.13271","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1905.13271","created_at":"2026-05-17T23:44:35Z"},{"alias_kind":"arxiv_version","alias_value":"1905.13271v1","created_at":"2026-05-17T23:44:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1905.13271","created_at":"2026-05-17T23:44:35Z"},{"alias_kind":"pith_short_12","alias_value":"63D6VJDL5A7K","created_at":"2026-05-18T12:33:10Z"},{"alias_kind":"pith_short_16","alias_value":"63D6VJDL5A7KYSXO","created_at":"2026-05-18T12:33:10Z"},{"alias_kind":"pith_short_8","alias_value":"63D6VJDL","created_at":"2026-05-18T12:33:10Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:63D6VJDL5A7KYSXO7UJRV7CDRE","target":"record","payload":{"canonical_record":{"source":{"id":"1905.13271","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2019-05-30T19:32:46Z","cross_cats_sorted":["stat.ML"],"title_canon_sha256":"e26aba9d0d31fe31a53316880d87ed06992cdbd81aad6bc447c30be9a5b45436","abstract_canon_sha256":"f562ba36ed5de4c64912a364a23d37b4e20b65a94825204fedd0ff535bb9f56e"},"schema_version":"1.0"},"canonical_sha256":"f6c7eaa46be83eac4aeefd131afc4389195d969c91dce1ef9a6c781efb99d31d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:44:35.456876Z","signature_b64":"UzuuMSYhEavp68zyUowkACAvRsJkAOdOv18XskEU/xoQPqn/55pg0KdaC/PDB/dz19NQxA1bUgEnk3bNi+gLCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"f6c7eaa46be83eac4aeefd131afc4389195d969c91dce1ef9a6c781efb99d31d","last_reissued_at":"2026-05-17T23:44:35.456471Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:44:35.456471Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1905.13271","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:44:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"GM08Z6sUe0vy1MQhtLvd1q2rPCX4KIRNyv4PsXiFF78i4O8kDt+UfI4Ieq/4XZ6nTXzWAvCBV92sAl80wmlUAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T08:40:22.084542Z"},"content_sha256":"0bb5f60ed99e6c0fa92bd2227feff31382afaf146b2a96fb2c5e8935c328db23","schema_version":"1.0","event_id":"sha256:0bb5f60ed99e6c0fa92bd2227feff31382afaf146b2a96fb2c5e8935c328db23"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:63D6VJDL5A7KYSXO7UJRV7CDRE","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Exploring Computational User Models for Agent Policy Summarization","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["stat.ML"],"primary_cat":"cs.LG","authors_text":"Daphna Lifschitz, Finale Doshi-Velez, Isaac Lage, Ofra Amir","submitted_at":"2019-05-30T19:32:46Z","abstract_excerpt":"AI agents are being developed to support high stakes decision-making processes from driving cars to prescribing drugs, making it increasingly important for human users to understand their behavior. Policy summarization methods aim to convey strengths and weaknesses of such agents by demonstrating their behavior in a subset of informative states. Some policy summarization methods extract a summary that optimizes the ability to reconstruct the agent's policy under the assumption that users will deploy inverse reinforcement learning. In this paper, we explore the use of different models for extra"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1905.13271","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:44:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"G/6RRBkcIiYvKD+CMceLuQYP/lLWdvLjeNAveEYdiJvPvYxQLSEDVtnpt7/JRdggKowodOTgkGlokMMZAAAUBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T08:40:22.085182Z"},"content_sha256":"5fcd4f544a421070e80da9f04038dd92b99b491ebe3bfb59dad10f5b38b063bd","schema_version":"1.0","event_id":"sha256:5fcd4f544a421070e80da9f04038dd92b99b491ebe3bfb59dad10f5b38b063bd"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/63D6VJDL5A7KYSXO7UJRV7CDRE/bundle.json","state_url":"https://pith.science/pith/63D6VJDL5A7KYSXO7UJRV7CDRE/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/63D6VJDL5A7KYSXO7UJRV7CDRE/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T08:40:22Z","links":{"resolver":"https://pith.science/pith/63D6VJDL5A7KYSXO7UJRV7CDRE","bundle":"https://pith.science/pith/63D6VJDL5A7KYSXO7UJRV7CDRE/bundle.json","state":"https://pith.science/pith/63D6VJDL5A7KYSXO7UJRV7CDRE/state.json","well_known_bundle":"https://pith.science/.well-known/pith/63D6VJDL5A7KYSXO7UJRV7CDRE/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:63D6VJDL5A7KYSXO7UJRV7CDRE","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"f562ba36ed5de4c64912a364a23d37b4e20b65a94825204fedd0ff535bb9f56e","cross_cats_sorted":["stat.ML"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2019-05-30T19:32:46Z","title_canon_sha256":"e26aba9d0d31fe31a53316880d87ed06992cdbd81aad6bc447c30be9a5b45436"},"schema_version":"1.0","source":{"id":"1905.13271","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1905.13271","created_at":"2026-05-17T23:44:35Z"},{"alias_kind":"arxiv_version","alias_value":"1905.13271v1","created_at":"2026-05-17T23:44:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1905.13271","created_at":"2026-05-17T23:44:35Z"},{"alias_kind":"pith_short_12","alias_value":"63D6VJDL5A7K","created_at":"2026-05-18T12:33:10Z"},{"alias_kind":"pith_short_16","alias_value":"63D6VJDL5A7KYSXO","created_at":"2026-05-18T12:33:10Z"},{"alias_kind":"pith_short_8","alias_value":"63D6VJDL","created_at":"2026-05-18T12:33:10Z"}],"graph_snapshots":[{"event_id":"sha256:5fcd4f544a421070e80da9f04038dd92b99b491ebe3bfb59dad10f5b38b063bd","target":"graph","created_at":"2026-05-17T23:44:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"AI agents are being developed to support high stakes decision-making processes from driving cars to prescribing drugs, making it increasingly important for human users to understand their behavior. Policy summarization methods aim to convey strengths and weaknesses of such agents by demonstrating their behavior in a subset of informative states. Some policy summarization methods extract a summary that optimizes the ability to reconstruct the agent's policy under the assumption that users will deploy inverse reinforcement learning. In this paper, we explore the use of different models for extra","authors_text":"Daphna Lifschitz, Finale Doshi-Velez, Isaac Lage, Ofra Amir","cross_cats":["stat.ML"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2019-05-30T19:32:46Z","title":"Exploring Computational User Models for Agent Policy Summarization"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1905.13271","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:0bb5f60ed99e6c0fa92bd2227feff31382afaf146b2a96fb2c5e8935c328db23","target":"record","created_at":"2026-05-17T23:44:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"f562ba36ed5de4c64912a364a23d37b4e20b65a94825204fedd0ff535bb9f56e","cross_cats_sorted":["stat.ML"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2019-05-30T19:32:46Z","title_canon_sha256":"e26aba9d0d31fe31a53316880d87ed06992cdbd81aad6bc447c30be9a5b45436"},"schema_version":"1.0","source":{"id":"1905.13271","kind":"arxiv","version":1}},"canonical_sha256":"f6c7eaa46be83eac4aeefd131afc4389195d969c91dce1ef9a6c781efb99d31d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"f6c7eaa46be83eac4aeefd131afc4389195d969c91dce1ef9a6c781efb99d31d","first_computed_at":"2026-05-17T23:44:35.456471Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:44:35.456471Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"UzuuMSYhEavp68zyUowkACAvRsJkAOdOv18XskEU/xoQPqn/55pg0KdaC/PDB/dz19NQxA1bUgEnk3bNi+gLCg==","signature_status":"signed_v1","signed_at":"2026-05-17T23:44:35.456876Z","signed_message":"canonical_sha256_bytes"},"source_id":"1905.13271","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:0bb5f60ed99e6c0fa92bd2227feff31382afaf146b2a96fb2c5e8935c328db23","sha256:5fcd4f544a421070e80da9f04038dd92b99b491ebe3bfb59dad10f5b38b063bd"],"state_sha256":"7e8c6952169f4d5aab65b5321b0a2c97c757b1d833f4a3ac17b1165e5cb4155f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"DmTlFdq1ctX0DUiVMernm6SkNzq+YL4J3tEhNxhHjdgxKuzEO/Ov2oefCyhlXbddA2OlVW1767miAU2RROL8DQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T08:40:22.088673Z","bundle_sha256":"1114a86943826366e294795231faf1c5570c23d00b17555a860d977ad549f2d6"}}