{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:6FEZBHPVESHRF4Z7CJBXNTRWHQ","short_pith_number":"pith:6FEZBHPV","canonical_record":{"source":{"id":"1506.03108","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-06-09T21:38:32Z","cross_cats_sorted":[],"title_canon_sha256":"8160b3cb42246284b444eacd46b9fbc5ff219e731e4f71cd7b4c7c82dc79a0c8","abstract_canon_sha256":"c2d170d0c2859556fd2f99777cf3568d5a966afd0e5fceb2c74ab9deee98bae6"},"schema_version":"1.0"},"canonical_sha256":"f149909df5248f12f33f124376ce363c2121a8e07a810880c73bf6da3a9b17b7","source":{"kind":"arxiv","id":"1506.03108","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1506.03108","created_at":"2026-05-18T01:24:24Z"},{"alias_kind":"arxiv_version","alias_value":"1506.03108v3","created_at":"2026-05-18T01:24:24Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1506.03108","created_at":"2026-05-18T01:24:24Z"},{"alias_kind":"pith_short_12","alias_value":"6FEZBHPVESHR","created_at":"2026-05-18T12:29:07Z"},{"alias_kind":"pith_short_16","alias_value":"6FEZBHPVESHRF4Z7","created_at":"2026-05-18T12:29:07Z"},{"alias_kind":"pith_short_8","alias_value":"6FEZBHPV","created_at":"2026-05-18T12:29:07Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:6FEZBHPVESHRF4Z7CJBXNTRWHQ","target":"record","payload":{"canonical_record":{"source":{"id":"1506.03108","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-06-09T21:38:32Z","cross_cats_sorted":[],"title_canon_sha256":"8160b3cb42246284b444eacd46b9fbc5ff219e731e4f71cd7b4c7c82dc79a0c8","abstract_canon_sha256":"c2d170d0c2859556fd2f99777cf3568d5a966afd0e5fceb2c74ab9deee98bae6"},"schema_version":"1.0"},"canonical_sha256":"f149909df5248f12f33f124376ce363c2121a8e07a810880c73bf6da3a9b17b7","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:24:24.796349Z","signature_b64":"D1KI6cGfZsZoLQbZdRjAZvCWimv02wtTGaZjUAsdUedvzgOkKHjNh1lfCop5z9OBhIZrzlyxIuF9qWEOPadSAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"f149909df5248f12f33f124376ce363c2121a8e07a810880c73bf6da3a9b17b7","last_reissued_at":"2026-05-18T01:24:24.795738Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:24:24.795738Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1506.03108","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:24:24Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"QLKvoT/ogTi1WlHYwDDyJWWj8K/xsvTYnS5iz3lSBkSDmRctvtUfrbpAWz9bIviXXlfWXG2S72ZNqrmBGxYMBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T12:55:05.878705Z"},"content_sha256":"4d7b3aba7be081d7ae33c04618817230800145c528f13203abc338ebab9f2048","schema_version":"1.0","event_id":"sha256:4d7b3aba7be081d7ae33c04618817230800145c528f13203abc338ebab9f2048"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:6FEZBHPVESHRF4Z7CJBXNTRWHQ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Bringing Modern Web Applications to Disconnected Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Arseny Kurnikov, J\\\"org Ott, Marcin Nagy, Teemu K\\\"arkk\\\"ainen","submitted_at":"2015-06-09T21:38:32Z","abstract_excerpt":"Opportunistic networking is one way to realize pervasive applications while placing little demand on network infrastructure, especially for operating in less well connected environments. In contrast to the ubiquitous network access model inherent to many cloud-based applications, for which the web browser forms the user front end, opportunistic applications require installing software on mobile devices. Even though app stores (when accessible) offer scalable distribution mechanisms for applications, a designer needs to support multiple OS platforms and only some of those are suitable for oppor"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1506.03108","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:24:24Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"GGKK402sgotvtzKnk86MxMbstHeQwSNkLUn70AxT0Fi24BQSROAI95ynWvkpeB9TNN/3q+x6wK27TJHQ938BDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T12:55:05.879390Z"},"content_sha256":"c93b8263c0e0ed78fef6d8347ca7932c579428ea39147608cbfe9b729efdf228","schema_version":"1.0","event_id":"sha256:c93b8263c0e0ed78fef6d8347ca7932c579428ea39147608cbfe9b729efdf228"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/6FEZBHPVESHRF4Z7CJBXNTRWHQ/bundle.json","state_url":"https://pith.science/pith/6FEZBHPVESHRF4Z7CJBXNTRWHQ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/6FEZBHPVESHRF4Z7CJBXNTRWHQ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T12:55:05Z","links":{"resolver":"https://pith.science/pith/6FEZBHPVESHRF4Z7CJBXNTRWHQ","bundle":"https://pith.science/pith/6FEZBHPVESHRF4Z7CJBXNTRWHQ/bundle.json","state":"https://pith.science/pith/6FEZBHPVESHRF4Z7CJBXNTRWHQ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/6FEZBHPVESHRF4Z7CJBXNTRWHQ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:6FEZBHPVESHRF4Z7CJBXNTRWHQ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"c2d170d0c2859556fd2f99777cf3568d5a966afd0e5fceb2c74ab9deee98bae6","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-06-09T21:38:32Z","title_canon_sha256":"8160b3cb42246284b444eacd46b9fbc5ff219e731e4f71cd7b4c7c82dc79a0c8"},"schema_version":"1.0","source":{"id":"1506.03108","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1506.03108","created_at":"2026-05-18T01:24:24Z"},{"alias_kind":"arxiv_version","alias_value":"1506.03108v3","created_at":"2026-05-18T01:24:24Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1506.03108","created_at":"2026-05-18T01:24:24Z"},{"alias_kind":"pith_short_12","alias_value":"6FEZBHPVESHR","created_at":"2026-05-18T12:29:07Z"},{"alias_kind":"pith_short_16","alias_value":"6FEZBHPVESHRF4Z7","created_at":"2026-05-18T12:29:07Z"},{"alias_kind":"pith_short_8","alias_value":"6FEZBHPV","created_at":"2026-05-18T12:29:07Z"}],"graph_snapshots":[{"event_id":"sha256:c93b8263c0e0ed78fef6d8347ca7932c579428ea39147608cbfe9b729efdf228","target":"graph","created_at":"2026-05-18T01:24:24Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Opportunistic networking is one way to realize pervasive applications while placing little demand on network infrastructure, especially for operating in less well connected environments. In contrast to the ubiquitous network access model inherent to many cloud-based applications, for which the web browser forms the user front end, opportunistic applications require installing software on mobile devices. Even though app stores (when accessible) offer scalable distribution mechanisms for applications, a designer needs to support multiple OS platforms and only some of those are suitable for oppor","authors_text":"Arseny Kurnikov, J\\\"org Ott, Marcin Nagy, Teemu K\\\"arkk\\\"ainen","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-06-09T21:38:32Z","title":"Bringing Modern Web Applications to Disconnected Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1506.03108","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4d7b3aba7be081d7ae33c04618817230800145c528f13203abc338ebab9f2048","target":"record","created_at":"2026-05-18T01:24:24Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"c2d170d0c2859556fd2f99777cf3568d5a966afd0e5fceb2c74ab9deee98bae6","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-06-09T21:38:32Z","title_canon_sha256":"8160b3cb42246284b444eacd46b9fbc5ff219e731e4f71cd7b4c7c82dc79a0c8"},"schema_version":"1.0","source":{"id":"1506.03108","kind":"arxiv","version":3}},"canonical_sha256":"f149909df5248f12f33f124376ce363c2121a8e07a810880c73bf6da3a9b17b7","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"f149909df5248f12f33f124376ce363c2121a8e07a810880c73bf6da3a9b17b7","first_computed_at":"2026-05-18T01:24:24.795738Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:24:24.795738Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"D1KI6cGfZsZoLQbZdRjAZvCWimv02wtTGaZjUAsdUedvzgOkKHjNh1lfCop5z9OBhIZrzlyxIuF9qWEOPadSAQ==","signature_status":"signed_v1","signed_at":"2026-05-18T01:24:24.796349Z","signed_message":"canonical_sha256_bytes"},"source_id":"1506.03108","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4d7b3aba7be081d7ae33c04618817230800145c528f13203abc338ebab9f2048","sha256:c93b8263c0e0ed78fef6d8347ca7932c579428ea39147608cbfe9b729efdf228"],"state_sha256":"ad86e68973769fc90c1ee23843c4fd456eb9eacf7c35c55e38c18cd23525a47b"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"uDhGypsH4reNUWT15picHhbtu4737Y+Q8HKF6VuhzXG7VmdVJ94ygrp5SHMVTBLUQQix9oyA6oum0Ur1UuKeBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T12:55:05.882600Z","bundle_sha256":"a3c4cf2080b32d394132ee99c0cbaf5dd5c3d27026ce8b344c5110ea837ba968"}}