{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2010:7GZI7XDVRVDN5LIRV5HGCG6ECZ","short_pith_number":"pith:7GZI7XDV","canonical_record":{"source":{"id":"1011.3580","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-11-16T04:15:37Z","cross_cats_sorted":[],"title_canon_sha256":"81aa824aef16b0931c45fa512dc1dddddbed0ddbb4cb001c76cee97b81f12225","abstract_canon_sha256":"4914637fc02337789e9d7816f2c5350d34988c07602a1c6cb126a37f1fa83238"},"schema_version":"1.0"},"canonical_sha256":"f9b28fdc758d46dead11af4e611bc41666753877d3175b4660394ebb3329aaf0","source":{"kind":"arxiv","id":"1011.3580","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1011.3580","created_at":"2026-05-18T03:45:32Z"},{"alias_kind":"arxiv_version","alias_value":"1011.3580v3","created_at":"2026-05-18T03:45:32Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1011.3580","created_at":"2026-05-18T03:45:32Z"},{"alias_kind":"pith_short_12","alias_value":"7GZI7XDVRVDN","created_at":"2026-05-18T12:26:04Z"},{"alias_kind":"pith_short_16","alias_value":"7GZI7XDVRVDN5LIR","created_at":"2026-05-18T12:26:04Z"},{"alias_kind":"pith_short_8","alias_value":"7GZI7XDV","created_at":"2026-05-18T12:26:04Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2010:7GZI7XDVRVDN5LIRV5HGCG6ECZ","target":"record","payload":{"canonical_record":{"source":{"id":"1011.3580","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-11-16T04:15:37Z","cross_cats_sorted":[],"title_canon_sha256":"81aa824aef16b0931c45fa512dc1dddddbed0ddbb4cb001c76cee97b81f12225","abstract_canon_sha256":"4914637fc02337789e9d7816f2c5350d34988c07602a1c6cb126a37f1fa83238"},"schema_version":"1.0"},"canonical_sha256":"f9b28fdc758d46dead11af4e611bc41666753877d3175b4660394ebb3329aaf0","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:45:32.113546Z","signature_b64":"nGewu0Pvk5zgjsnI3A9oxq+jLsTNrp64WTBZ8XJgENoo+d+I+5UfJHDb4YlQ8wl8TOPdvZWLHuzdz90fVzDwCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"f9b28fdc758d46dead11af4e611bc41666753877d3175b4660394ebb3329aaf0","last_reissued_at":"2026-05-18T03:45:32.113040Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:45:32.113040Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1011.3580","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:45:32Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Yw+5/QiFoKP9ocbxNXuaA5HmFKgzytetnjpWHxD3rG1viOflm7+zbjCh8t6F20fnueOfMTaeii4UvTdbkkvYAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T10:18:51.084041Z"},"content_sha256":"ed31bc7c374c2b7485b4ca259338a3e9b0f6d269b95e2013d9c1448203e1ddc0","schema_version":"1.0","event_id":"sha256:ed31bc7c374c2b7485b4ca259338a3e9b0f6d269b95e2013d9c1448203e1ddc0"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2010:7GZI7XDVRVDN5LIRV5HGCG6ECZ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Technology Choices and Pricing Policies in Public and Private Wireless Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.GT","authors_text":"Mihaela van der Schaar, William R. Zame, Yuanzhang Xiao","submitted_at":"2010-11-16T04:15:37Z","abstract_excerpt":"This paper studies the provision of a wireless network by a monopolistic provider who may be either benevolent (seeking to maximize social welfare) or selfish (seeking to maximize provider profit). The paper addresses questions that do not seem to have been studied before in the engineering literature on wireless networks: Under what circumstances is it feasible for a provider, either benevolent or selfish, to operate a network in such a way as to cover costs? How is the optimal behavior of a benevolent provider different from the optimal behavior of a selfish provider, and how does this diffe"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1011.3580","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:45:32Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"JcvHJeUSqAGjh1SagJdUJ7i++7yOO+IyN/nvCMmSEJAPtpnnLG5tRBZ0dF1W+MHhpg0Rxoud1dSdEaSqWFewAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T10:18:51.084402Z"},"content_sha256":"5790f743e593bb7f5eb5beb03d3b33c3b34e031ac27db7e2b3f7cbc826736a16","schema_version":"1.0","event_id":"sha256:5790f743e593bb7f5eb5beb03d3b33c3b34e031ac27db7e2b3f7cbc826736a16"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/7GZI7XDVRVDN5LIRV5HGCG6ECZ/bundle.json","state_url":"https://pith.science/pith/7GZI7XDVRVDN5LIRV5HGCG6ECZ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/7GZI7XDVRVDN5LIRV5HGCG6ECZ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T10:18:51Z","links":{"resolver":"https://pith.science/pith/7GZI7XDVRVDN5LIRV5HGCG6ECZ","bundle":"https://pith.science/pith/7GZI7XDVRVDN5LIRV5HGCG6ECZ/bundle.json","state":"https://pith.science/pith/7GZI7XDVRVDN5LIRV5HGCG6ECZ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/7GZI7XDVRVDN5LIRV5HGCG6ECZ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2010:7GZI7XDVRVDN5LIRV5HGCG6ECZ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"4914637fc02337789e9d7816f2c5350d34988c07602a1c6cb126a37f1fa83238","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-11-16T04:15:37Z","title_canon_sha256":"81aa824aef16b0931c45fa512dc1dddddbed0ddbb4cb001c76cee97b81f12225"},"schema_version":"1.0","source":{"id":"1011.3580","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1011.3580","created_at":"2026-05-18T03:45:32Z"},{"alias_kind":"arxiv_version","alias_value":"1011.3580v3","created_at":"2026-05-18T03:45:32Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1011.3580","created_at":"2026-05-18T03:45:32Z"},{"alias_kind":"pith_short_12","alias_value":"7GZI7XDVRVDN","created_at":"2026-05-18T12:26:04Z"},{"alias_kind":"pith_short_16","alias_value":"7GZI7XDVRVDN5LIR","created_at":"2026-05-18T12:26:04Z"},{"alias_kind":"pith_short_8","alias_value":"7GZI7XDV","created_at":"2026-05-18T12:26:04Z"}],"graph_snapshots":[{"event_id":"sha256:5790f743e593bb7f5eb5beb03d3b33c3b34e031ac27db7e2b3f7cbc826736a16","target":"graph","created_at":"2026-05-18T03:45:32Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This paper studies the provision of a wireless network by a monopolistic provider who may be either benevolent (seeking to maximize social welfare) or selfish (seeking to maximize provider profit). The paper addresses questions that do not seem to have been studied before in the engineering literature on wireless networks: Under what circumstances is it feasible for a provider, either benevolent or selfish, to operate a network in such a way as to cover costs? How is the optimal behavior of a benevolent provider different from the optimal behavior of a selfish provider, and how does this diffe","authors_text":"Mihaela van der Schaar, William R. Zame, Yuanzhang Xiao","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-11-16T04:15:37Z","title":"Technology Choices and Pricing Policies in Public and Private Wireless Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1011.3580","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ed31bc7c374c2b7485b4ca259338a3e9b0f6d269b95e2013d9c1448203e1ddc0","target":"record","created_at":"2026-05-18T03:45:32Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"4914637fc02337789e9d7816f2c5350d34988c07602a1c6cb126a37f1fa83238","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-11-16T04:15:37Z","title_canon_sha256":"81aa824aef16b0931c45fa512dc1dddddbed0ddbb4cb001c76cee97b81f12225"},"schema_version":"1.0","source":{"id":"1011.3580","kind":"arxiv","version":3}},"canonical_sha256":"f9b28fdc758d46dead11af4e611bc41666753877d3175b4660394ebb3329aaf0","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"f9b28fdc758d46dead11af4e611bc41666753877d3175b4660394ebb3329aaf0","first_computed_at":"2026-05-18T03:45:32.113040Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:45:32.113040Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"nGewu0Pvk5zgjsnI3A9oxq+jLsTNrp64WTBZ8XJgENoo+d+I+5UfJHDb4YlQ8wl8TOPdvZWLHuzdz90fVzDwCQ==","signature_status":"signed_v1","signed_at":"2026-05-18T03:45:32.113546Z","signed_message":"canonical_sha256_bytes"},"source_id":"1011.3580","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ed31bc7c374c2b7485b4ca259338a3e9b0f6d269b95e2013d9c1448203e1ddc0","sha256:5790f743e593bb7f5eb5beb03d3b33c3b34e031ac27db7e2b3f7cbc826736a16"],"state_sha256":"5ac5b6eb1f8a8fb0f935ffc24b901b64d71e65415ad8c29237806dad7e11713c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"9d/KOZbrRjIQiEiMj130Af6E7ZRvRIagJPh4V3vQN54XIkFnmlbb7dOMme4zz1vaV2gCR7J9ivNQ5tJc+aziAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T10:18:51.086003Z","bundle_sha256":"a03ef5d9c4f3940d056dc484f89c9b8e143bbe65ba5d9a6ddfafbc41a2baa511"}}