{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:7RII5KZ5THEDB6DJ5A7RXAISMT","short_pith_number":"pith:7RII5KZ5","canonical_record":{"source":{"id":"1701.06008","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-01-21T11:01:43Z","cross_cats_sorted":[],"title_canon_sha256":"2fab1514c530c6eef12738cc4fd5b63e2ae6ca0ca8d6f76720ce55efaf46db2d","abstract_canon_sha256":"32fe090b0df9ddadf4a8c3c730e17c61413ecac8f54af3bef21b6ea1deb487c1"},"schema_version":"1.0"},"canonical_sha256":"fc508eab3d99c830f869e83f1b811264ff2b9d843bee8a8d08c68afcd1bfe4e8","source":{"kind":"arxiv","id":"1701.06008","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1701.06008","created_at":"2026-05-18T00:44:51Z"},{"alias_kind":"arxiv_version","alias_value":"1701.06008v2","created_at":"2026-05-18T00:44:51Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1701.06008","created_at":"2026-05-18T00:44:51Z"},{"alias_kind":"pith_short_12","alias_value":"7RII5KZ5THED","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_16","alias_value":"7RII5KZ5THEDB6DJ","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_8","alias_value":"7RII5KZ5","created_at":"2026-05-18T12:31:05Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:7RII5KZ5THEDB6DJ5A7RXAISMT","target":"record","payload":{"canonical_record":{"source":{"id":"1701.06008","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-01-21T11:01:43Z","cross_cats_sorted":[],"title_canon_sha256":"2fab1514c530c6eef12738cc4fd5b63e2ae6ca0ca8d6f76720ce55efaf46db2d","abstract_canon_sha256":"32fe090b0df9ddadf4a8c3c730e17c61413ecac8f54af3bef21b6ea1deb487c1"},"schema_version":"1.0"},"canonical_sha256":"fc508eab3d99c830f869e83f1b811264ff2b9d843bee8a8d08c68afcd1bfe4e8","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:44:51.699891Z","signature_b64":"ZyClWpCWitOSZSqK0ZiM4Dcn4XUx/gWuzgwHH+ybm9Vgv8Wp/iiwoHO9jPqJ/5Nal8opmhj/88bfgpvwgjq+Cg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"fc508eab3d99c830f869e83f1b811264ff2b9d843bee8a8d08c68afcd1bfe4e8","last_reissued_at":"2026-05-18T00:44:51.699342Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:44:51.699342Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1701.06008","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:44:51Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ZBFqepapHX+ajQdXy5TE/LsOxlZXerm6qCAr0L+QjkfR5Zu88Xf81sFYA8A2gyBkiEIpOTDVk2XNntUTep+1BA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T07:09:07.103577Z"},"content_sha256":"e6d8ebf8c6697fbfb89db9c880876e317e65717f24cc7927599de4f2179cd01f","schema_version":"1.0","event_id":"sha256:e6d8ebf8c6697fbfb89db9c880876e317e65717f24cc7927599de4f2179cd01f"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:7RII5KZ5THEDB6DJ5A7RXAISMT","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Computation Diversity in Emerging Networking Paradigms","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Hsiao-Hwa Chen, Kezhi Wang, Kun Yang, Lianming Zhang","submitted_at":"2017-01-21T11:01:43Z","abstract_excerpt":"Nowadays, computation is playing an increasingly more important role in the future generation of computer and communication networks, as exemplified by the recent progress in software defined networking (SDN) for wired networks as well as cloud radio access networks (C-RAN) and mobile cloud computing (MCC) for wireless networks. This paper proposes a unified concept, i.e., computation diversity, to describe the impact and diverse forms of the computation resources on both wired and wireless communications. By linking the computation resources to the communication networks based on quality of s"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1701.06008","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:44:51Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"+md37WGQpdt/oN9o1JHcCXDt/j55iGhp6W/B6PysexDlURv2AlvpNtFmQKLPE9Qk+HPIo7uxoIDMN9a1ZaiiAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T07:09:07.103928Z"},"content_sha256":"3a3599e64e9715c90274207d2d93c1d877cd1a038cd79e29ff13528bef37fc41","schema_version":"1.0","event_id":"sha256:3a3599e64e9715c90274207d2d93c1d877cd1a038cd79e29ff13528bef37fc41"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/7RII5KZ5THEDB6DJ5A7RXAISMT/bundle.json","state_url":"https://pith.science/pith/7RII5KZ5THEDB6DJ5A7RXAISMT/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/7RII5KZ5THEDB6DJ5A7RXAISMT/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T07:09:07Z","links":{"resolver":"https://pith.science/pith/7RII5KZ5THEDB6DJ5A7RXAISMT","bundle":"https://pith.science/pith/7RII5KZ5THEDB6DJ5A7RXAISMT/bundle.json","state":"https://pith.science/pith/7RII5KZ5THEDB6DJ5A7RXAISMT/state.json","well_known_bundle":"https://pith.science/.well-known/pith/7RII5KZ5THEDB6DJ5A7RXAISMT/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:7RII5KZ5THEDB6DJ5A7RXAISMT","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"32fe090b0df9ddadf4a8c3c730e17c61413ecac8f54af3bef21b6ea1deb487c1","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-01-21T11:01:43Z","title_canon_sha256":"2fab1514c530c6eef12738cc4fd5b63e2ae6ca0ca8d6f76720ce55efaf46db2d"},"schema_version":"1.0","source":{"id":"1701.06008","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1701.06008","created_at":"2026-05-18T00:44:51Z"},{"alias_kind":"arxiv_version","alias_value":"1701.06008v2","created_at":"2026-05-18T00:44:51Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1701.06008","created_at":"2026-05-18T00:44:51Z"},{"alias_kind":"pith_short_12","alias_value":"7RII5KZ5THED","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_16","alias_value":"7RII5KZ5THEDB6DJ","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_8","alias_value":"7RII5KZ5","created_at":"2026-05-18T12:31:05Z"}],"graph_snapshots":[{"event_id":"sha256:3a3599e64e9715c90274207d2d93c1d877cd1a038cd79e29ff13528bef37fc41","target":"graph","created_at":"2026-05-18T00:44:51Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Nowadays, computation is playing an increasingly more important role in the future generation of computer and communication networks, as exemplified by the recent progress in software defined networking (SDN) for wired networks as well as cloud radio access networks (C-RAN) and mobile cloud computing (MCC) for wireless networks. This paper proposes a unified concept, i.e., computation diversity, to describe the impact and diverse forms of the computation resources on both wired and wireless communications. By linking the computation resources to the communication networks based on quality of s","authors_text":"Hsiao-Hwa Chen, Kezhi Wang, Kun Yang, Lianming Zhang","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-01-21T11:01:43Z","title":"Computation Diversity in Emerging Networking Paradigms"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1701.06008","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:e6d8ebf8c6697fbfb89db9c880876e317e65717f24cc7927599de4f2179cd01f","target":"record","created_at":"2026-05-18T00:44:51Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"32fe090b0df9ddadf4a8c3c730e17c61413ecac8f54af3bef21b6ea1deb487c1","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2017-01-21T11:01:43Z","title_canon_sha256":"2fab1514c530c6eef12738cc4fd5b63e2ae6ca0ca8d6f76720ce55efaf46db2d"},"schema_version":"1.0","source":{"id":"1701.06008","kind":"arxiv","version":2}},"canonical_sha256":"fc508eab3d99c830f869e83f1b811264ff2b9d843bee8a8d08c68afcd1bfe4e8","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"fc508eab3d99c830f869e83f1b811264ff2b9d843bee8a8d08c68afcd1bfe4e8","first_computed_at":"2026-05-18T00:44:51.699342Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:44:51.699342Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ZyClWpCWitOSZSqK0ZiM4Dcn4XUx/gWuzgwHH+ybm9Vgv8Wp/iiwoHO9jPqJ/5Nal8opmhj/88bfgpvwgjq+Cg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:44:51.699891Z","signed_message":"canonical_sha256_bytes"},"source_id":"1701.06008","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:e6d8ebf8c6697fbfb89db9c880876e317e65717f24cc7927599de4f2179cd01f","sha256:3a3599e64e9715c90274207d2d93c1d877cd1a038cd79e29ff13528bef37fc41"],"state_sha256":"b1aa542e5c0bc5184e75083bc031f38e499f99c65671c29d931dcd85d96991bb"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"AAbIY1BqCda2PXfIPJW8kk6bfkInPIolrrKsJE9KY9n3V8RBm4TmrUxJYMAYnERq+UN/UGp2IgE5h0kaeuSpCg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T07:09:07.105682Z","bundle_sha256":"85ddfacd75d29ebe346f7b1783ea542ad85fe268f273c8745d76850cda4cb091"}}