{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2014:76OVCTABJGSWXUHORBRMRVUUVU","short_pith_number":"pith:76OVCTAB","canonical_record":{"source":{"id":"1411.1608","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-11-06T13:41:46Z","cross_cats_sorted":[],"title_canon_sha256":"49e40d3df60ca8032db8996459b2cedfc6fce1d376f31324d28ed6193941931f","abstract_canon_sha256":"4e74845144d22706d0ef75481fc1106d5b6635caa23ea7fa408f1c91fb86284d"},"schema_version":"1.0"},"canonical_sha256":"ff9d514c0149a56bd0ee8862c8d694ad367bac32beb00abf8534a26819602da2","source":{"kind":"arxiv","id":"1411.1608","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1411.1608","created_at":"2026-05-18T02:38:27Z"},{"alias_kind":"arxiv_version","alias_value":"1411.1608v1","created_at":"2026-05-18T02:38:27Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1411.1608","created_at":"2026-05-18T02:38:27Z"},{"alias_kind":"pith_short_12","alias_value":"76OVCTABJGSW","created_at":"2026-05-18T12:28:16Z"},{"alias_kind":"pith_short_16","alias_value":"76OVCTABJGSWXUHO","created_at":"2026-05-18T12:28:16Z"},{"alias_kind":"pith_short_8","alias_value":"76OVCTAB","created_at":"2026-05-18T12:28:16Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2014:76OVCTABJGSWXUHORBRMRVUUVU","target":"record","payload":{"canonical_record":{"source":{"id":"1411.1608","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-11-06T13:41:46Z","cross_cats_sorted":[],"title_canon_sha256":"49e40d3df60ca8032db8996459b2cedfc6fce1d376f31324d28ed6193941931f","abstract_canon_sha256":"4e74845144d22706d0ef75481fc1106d5b6635caa23ea7fa408f1c91fb86284d"},"schema_version":"1.0"},"canonical_sha256":"ff9d514c0149a56bd0ee8862c8d694ad367bac32beb00abf8534a26819602da2","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:38:27.408080Z","signature_b64":"J6iyAEh9hvN4zl83dj8koTDQxGqs4o1E786K2ZJr/5tieKvi218Jkebe7m8QydT1nOSna5U7IyvtLQzXPuKlCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ff9d514c0149a56bd0ee8862c8d694ad367bac32beb00abf8534a26819602da2","last_reissued_at":"2026-05-18T02:38:27.406725Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:38:27.406725Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1411.1608","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:38:27Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ifjpSggyvPykS4FIbfWsfe6ybc5l3C4pWDy/03N2Xhfnps6UeCh92RPRq3bAAhOf8hhEHkRrU8uFER2Y/FhCDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T14:29:46.815989Z"},"content_sha256":"9cee7b37cd0a78084cfe9b24d4c7977ede26c59079148773703f3117f2057c70","schema_version":"1.0","event_id":"sha256:9cee7b37cd0a78084cfe9b24d4c7977ede26c59079148773703f3117f2057c70"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2014:76OVCTABJGSWXUHORBRMRVUUVU","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Device-to-Device Data Storage with Regenerating Codes","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Camilla Hollanti, Joonas P\\\"a\\\"akk\\\"onen, Olav Tirkkonen","submitted_at":"2014-11-06T13:41:46Z","abstract_excerpt":"Caching data files directly on mobile user devices combined with device-to-device (D2D) communications has recently been suggested to improve the capacity of wireless net6works. We investigate the performance of regenerating codes in terms of the total energy consumption of a cellular network. We show that regenerating codes can offer large performance gains. It turns out that using redundancy against storage node failures is only beneficial if the popularity of the data is between certain thresholds. As our major contribution, we investigate under which circumstances regenerating codes with m"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1411.1608","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:38:27Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"7ZM7UZEN/725fRhK1Y8RyNeS3kOITOfp4DCOg4YzpgDsMs24qGUxXjU0ykAag21mAnsXVdEkQSwCx9MwX1EiBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T14:29:46.816360Z"},"content_sha256":"9f78639d4ac67f6f21d81b6335d2486773aebaa7e36f8c6b18f6911b711fb176","schema_version":"1.0","event_id":"sha256:9f78639d4ac67f6f21d81b6335d2486773aebaa7e36f8c6b18f6911b711fb176"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/76OVCTABJGSWXUHORBRMRVUUVU/bundle.json","state_url":"https://pith.science/pith/76OVCTABJGSWXUHORBRMRVUUVU/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/76OVCTABJGSWXUHORBRMRVUUVU/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T14:29:46Z","links":{"resolver":"https://pith.science/pith/76OVCTABJGSWXUHORBRMRVUUVU","bundle":"https://pith.science/pith/76OVCTABJGSWXUHORBRMRVUUVU/bundle.json","state":"https://pith.science/pith/76OVCTABJGSWXUHORBRMRVUUVU/state.json","well_known_bundle":"https://pith.science/.well-known/pith/76OVCTABJGSWXUHORBRMRVUUVU/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2014:76OVCTABJGSWXUHORBRMRVUUVU","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"4e74845144d22706d0ef75481fc1106d5b6635caa23ea7fa408f1c91fb86284d","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-11-06T13:41:46Z","title_canon_sha256":"49e40d3df60ca8032db8996459b2cedfc6fce1d376f31324d28ed6193941931f"},"schema_version":"1.0","source":{"id":"1411.1608","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1411.1608","created_at":"2026-05-18T02:38:27Z"},{"alias_kind":"arxiv_version","alias_value":"1411.1608v1","created_at":"2026-05-18T02:38:27Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1411.1608","created_at":"2026-05-18T02:38:27Z"},{"alias_kind":"pith_short_12","alias_value":"76OVCTABJGSW","created_at":"2026-05-18T12:28:16Z"},{"alias_kind":"pith_short_16","alias_value":"76OVCTABJGSWXUHO","created_at":"2026-05-18T12:28:16Z"},{"alias_kind":"pith_short_8","alias_value":"76OVCTAB","created_at":"2026-05-18T12:28:16Z"}],"graph_snapshots":[{"event_id":"sha256:9f78639d4ac67f6f21d81b6335d2486773aebaa7e36f8c6b18f6911b711fb176","target":"graph","created_at":"2026-05-18T02:38:27Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Caching data files directly on mobile user devices combined with device-to-device (D2D) communications has recently been suggested to improve the capacity of wireless net6works. We investigate the performance of regenerating codes in terms of the total energy consumption of a cellular network. We show that regenerating codes can offer large performance gains. It turns out that using redundancy against storage node failures is only beneficial if the popularity of the data is between certain thresholds. As our major contribution, we investigate under which circumstances regenerating codes with m","authors_text":"Camilla Hollanti, Joonas P\\\"a\\\"akk\\\"onen, Olav Tirkkonen","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-11-06T13:41:46Z","title":"Device-to-Device Data Storage with Regenerating Codes"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1411.1608","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:9cee7b37cd0a78084cfe9b24d4c7977ede26c59079148773703f3117f2057c70","target":"record","created_at":"2026-05-18T02:38:27Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"4e74845144d22706d0ef75481fc1106d5b6635caa23ea7fa408f1c91fb86284d","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-11-06T13:41:46Z","title_canon_sha256":"49e40d3df60ca8032db8996459b2cedfc6fce1d376f31324d28ed6193941931f"},"schema_version":"1.0","source":{"id":"1411.1608","kind":"arxiv","version":1}},"canonical_sha256":"ff9d514c0149a56bd0ee8862c8d694ad367bac32beb00abf8534a26819602da2","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"ff9d514c0149a56bd0ee8862c8d694ad367bac32beb00abf8534a26819602da2","first_computed_at":"2026-05-18T02:38:27.406725Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:38:27.406725Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"J6iyAEh9hvN4zl83dj8koTDQxGqs4o1E786K2ZJr/5tieKvi218Jkebe7m8QydT1nOSna5U7IyvtLQzXPuKlCg==","signature_status":"signed_v1","signed_at":"2026-05-18T02:38:27.408080Z","signed_message":"canonical_sha256_bytes"},"source_id":"1411.1608","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:9cee7b37cd0a78084cfe9b24d4c7977ede26c59079148773703f3117f2057c70","sha256:9f78639d4ac67f6f21d81b6335d2486773aebaa7e36f8c6b18f6911b711fb176"],"state_sha256":"8a6d813101bbba77f3e791310ebeced2f0c4c777863909baab654bcf3f43f47c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"DFb84UdKi126444d/aNEGoVVD0IZrMW1HJT7pTWVObIXVnoPIgrCSBuueBLtj0Vvfq/nV8f1cmh6VIimK376CA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T14:29:46.818617Z","bundle_sha256":"b73b81f99d272131e01df50aa74c209d15d47b43ec44d917bbc76d410385f167"}}