{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2012:64WMJQVWNBNXUF3VEERECOAPKT","short_pith_number":"pith:64WMJQVW","canonical_record":{"source":{"id":"1211.0415","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2012-11-02T10:54:33Z","cross_cats_sorted":["cs.IT","cs.NI","math.IT"],"title_canon_sha256":"7bdb20c324bc6500464568db97ba252f329f4de6729f17278ae8ecb04c03ac66","abstract_canon_sha256":"6c46d3d3622089131e87e30cd421a6a77823e49e03549b8a0ef26f528755e024"},"schema_version":"1.0"},"canonical_sha256":"f72cc4c2b6685b7a1775212241380f54fa46ba5f0d0e12181721f6c8cbf5b010","source":{"kind":"arxiv","id":"1211.0415","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1211.0415","created_at":"2026-05-18T03:04:49Z"},{"alias_kind":"arxiv_version","alias_value":"1211.0415v1","created_at":"2026-05-18T03:04:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1211.0415","created_at":"2026-05-18T03:04:49Z"},{"alias_kind":"pith_short_12","alias_value":"64WMJQVWNBNX","created_at":"2026-05-18T12:26:56Z"},{"alias_kind":"pith_short_16","alias_value":"64WMJQVWNBNXUF3V","created_at":"2026-05-18T12:26:56Z"},{"alias_kind":"pith_short_8","alias_value":"64WMJQVW","created_at":"2026-05-18T12:26:56Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2012:64WMJQVWNBNXUF3VEERECOAPKT","target":"record","payload":{"canonical_record":{"source":{"id":"1211.0415","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2012-11-02T10:54:33Z","cross_cats_sorted":["cs.IT","cs.NI","math.IT"],"title_canon_sha256":"7bdb20c324bc6500464568db97ba252f329f4de6729f17278ae8ecb04c03ac66","abstract_canon_sha256":"6c46d3d3622089131e87e30cd421a6a77823e49e03549b8a0ef26f528755e024"},"schema_version":"1.0"},"canonical_sha256":"f72cc4c2b6685b7a1775212241380f54fa46ba5f0d0e12181721f6c8cbf5b010","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:04:49.828831Z","signature_b64":"HYAIB9ENzt7Ct3bDe7us7ksO40nis5EjgrTExDXyVH3pFHxXoG4BSxCDyyRKEXxk8qIIZ1Go+yci/ABECZIHAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"f72cc4c2b6685b7a1775212241380f54fa46ba5f0d0e12181721f6c8cbf5b010","last_reissued_at":"2026-05-18T03:04:49.828047Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:04:49.828047Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1211.0415","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:04:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"0Sgc3cFX8/+79Gmt7aeOJN5kUYAZqW2pwmw1+rs5CCspVyGAnrMHvIMPt+L4HKGDvyIMi32WzowaGHG3K/fpAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T22:04:32.404355Z"},"content_sha256":"9697f1e3ddc03b585732e7c765510d6e77c0850f360e7e09d2983fe8ffcee2fa","schema_version":"1.0","event_id":"sha256:9697f1e3ddc03b585732e7c765510d6e77c0850f360e7e09d2983fe8ffcee2fa"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2012:64WMJQVWNBNXUF3VEERECOAPKT","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Capacity and Security of Heterogeneous Distributed Storage Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.IT","cs.NI","math.IT"],"primary_cat":"cs.DC","authors_text":"Camilla Hollanti, H. Vincent Poor, Salim El Rouayheb, Toni Ernvall","submitted_at":"2012-11-02T10:54:33Z","abstract_excerpt":"We study the capacity of heterogeneous distributed storage systems under repair dynamics. Examples of these systems include peer-to-peer storage clouds, wireless, and Internet caching systems. Nodes in a heterogeneous system can have different storage capacities and different repair bandwidths. We give lower and upper bounds on the system capacity. These bounds depend on either the average resources per node, or on a detailed knowledge of the node characteristics. Moreover, we study the case in which nodes may be compromised by an eavesdropper, and give bounds on the system secrecy capacity. O"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1211.0415","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:04:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"tFur39ytIy/mlPugWGxxEQr5Lmg7mq+9MCm2kECWIbWZHkL3EzaYUnEe1zXZe/NneSfaF0vnYYcvoQSJ2kMXDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T22:04:32.404718Z"},"content_sha256":"de56701402f37b5cd5caf96e53d9b955092c5885bc544d5d55657abff34941a5","schema_version":"1.0","event_id":"sha256:de56701402f37b5cd5caf96e53d9b955092c5885bc544d5d55657abff34941a5"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/64WMJQVWNBNXUF3VEERECOAPKT/bundle.json","state_url":"https://pith.science/pith/64WMJQVWNBNXUF3VEERECOAPKT/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/64WMJQVWNBNXUF3VEERECOAPKT/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T22:04:32Z","links":{"resolver":"https://pith.science/pith/64WMJQVWNBNXUF3VEERECOAPKT","bundle":"https://pith.science/pith/64WMJQVWNBNXUF3VEERECOAPKT/bundle.json","state":"https://pith.science/pith/64WMJQVWNBNXUF3VEERECOAPKT/state.json","well_known_bundle":"https://pith.science/.well-known/pith/64WMJQVWNBNXUF3VEERECOAPKT/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2012:64WMJQVWNBNXUF3VEERECOAPKT","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"6c46d3d3622089131e87e30cd421a6a77823e49e03549b8a0ef26f528755e024","cross_cats_sorted":["cs.IT","cs.NI","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2012-11-02T10:54:33Z","title_canon_sha256":"7bdb20c324bc6500464568db97ba252f329f4de6729f17278ae8ecb04c03ac66"},"schema_version":"1.0","source":{"id":"1211.0415","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1211.0415","created_at":"2026-05-18T03:04:49Z"},{"alias_kind":"arxiv_version","alias_value":"1211.0415v1","created_at":"2026-05-18T03:04:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1211.0415","created_at":"2026-05-18T03:04:49Z"},{"alias_kind":"pith_short_12","alias_value":"64WMJQVWNBNX","created_at":"2026-05-18T12:26:56Z"},{"alias_kind":"pith_short_16","alias_value":"64WMJQVWNBNXUF3V","created_at":"2026-05-18T12:26:56Z"},{"alias_kind":"pith_short_8","alias_value":"64WMJQVW","created_at":"2026-05-18T12:26:56Z"}],"graph_snapshots":[{"event_id":"sha256:de56701402f37b5cd5caf96e53d9b955092c5885bc544d5d55657abff34941a5","target":"graph","created_at":"2026-05-18T03:04:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We study the capacity of heterogeneous distributed storage systems under repair dynamics. Examples of these systems include peer-to-peer storage clouds, wireless, and Internet caching systems. Nodes in a heterogeneous system can have different storage capacities and different repair bandwidths. We give lower and upper bounds on the system capacity. These bounds depend on either the average resources per node, or on a detailed knowledge of the node characteristics. Moreover, we study the case in which nodes may be compromised by an eavesdropper, and give bounds on the system secrecy capacity. O","authors_text":"Camilla Hollanti, H. Vincent Poor, Salim El Rouayheb, Toni Ernvall","cross_cats":["cs.IT","cs.NI","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2012-11-02T10:54:33Z","title":"Capacity and Security of Heterogeneous Distributed Storage Systems"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1211.0415","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:9697f1e3ddc03b585732e7c765510d6e77c0850f360e7e09d2983fe8ffcee2fa","target":"record","created_at":"2026-05-18T03:04:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"6c46d3d3622089131e87e30cd421a6a77823e49e03549b8a0ef26f528755e024","cross_cats_sorted":["cs.IT","cs.NI","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2012-11-02T10:54:33Z","title_canon_sha256":"7bdb20c324bc6500464568db97ba252f329f4de6729f17278ae8ecb04c03ac66"},"schema_version":"1.0","source":{"id":"1211.0415","kind":"arxiv","version":1}},"canonical_sha256":"f72cc4c2b6685b7a1775212241380f54fa46ba5f0d0e12181721f6c8cbf5b010","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"f72cc4c2b6685b7a1775212241380f54fa46ba5f0d0e12181721f6c8cbf5b010","first_computed_at":"2026-05-18T03:04:49.828047Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:04:49.828047Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"HYAIB9ENzt7Ct3bDe7us7ksO40nis5EjgrTExDXyVH3pFHxXoG4BSxCDyyRKEXxk8qIIZ1Go+yci/ABECZIHAA==","signature_status":"signed_v1","signed_at":"2026-05-18T03:04:49.828831Z","signed_message":"canonical_sha256_bytes"},"source_id":"1211.0415","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:9697f1e3ddc03b585732e7c765510d6e77c0850f360e7e09d2983fe8ffcee2fa","sha256:de56701402f37b5cd5caf96e53d9b955092c5885bc544d5d55657abff34941a5"],"state_sha256":"f70e1b4949064baec9880970038b0c9c352a0265bb5e50d741121b9c2311aac7"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/MwdM+rxjFun0ZrsrLwXf9paLPh5p6jfP0AXQpcHBmZ9hzu4CpbXjEZUWH63xWk6srcWwY6S3dqMsJSQc1O/DQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T22:04:32.407449Z","bundle_sha256":"d03f77104596ffacf2831d80a940d136f0b0f6bc5e47e80f03bc6fd9ca795b02"}}