{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:7SOS7HJIDTTMHE3RSUDKHXRG47","short_pith_number":"pith:7SOS7HJI","canonical_record":{"source":{"id":"1907.01388","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2019-07-02T14:15:42Z","cross_cats_sorted":["cs.SI","physics.data-an"],"title_canon_sha256":"91402812b074a8eb2867e8eee9842115d27d14922ab9b5fd65d8eccb88f78439","abstract_canon_sha256":"61723e850d3fe2cb927cb6b7d8bfa40dd7ff9ed0630b0d7c91f82d8dce11f1c0"},"schema_version":"1.0"},"canonical_sha256":"fc9d2f9d281ce6c393719506a3de26e7cf759741af895cff6f1b74c7b81794cb","source":{"kind":"arxiv","id":"1907.01388","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1907.01388","created_at":"2026-05-17T23:41:40Z"},{"alias_kind":"arxiv_version","alias_value":"1907.01388v1","created_at":"2026-05-17T23:41:40Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1907.01388","created_at":"2026-05-17T23:41:40Z"},{"alias_kind":"pith_short_12","alias_value":"7SOS7HJIDTTM","created_at":"2026-05-18T12:33:12Z"},{"alias_kind":"pith_short_16","alias_value":"7SOS7HJIDTTMHE3R","created_at":"2026-05-18T12:33:12Z"},{"alias_kind":"pith_short_8","alias_value":"7SOS7HJI","created_at":"2026-05-18T12:33:12Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:7SOS7HJIDTTMHE3RSUDKHXRG47","target":"record","payload":{"canonical_record":{"source":{"id":"1907.01388","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2019-07-02T14:15:42Z","cross_cats_sorted":["cs.SI","physics.data-an"],"title_canon_sha256":"91402812b074a8eb2867e8eee9842115d27d14922ab9b5fd65d8eccb88f78439","abstract_canon_sha256":"61723e850d3fe2cb927cb6b7d8bfa40dd7ff9ed0630b0d7c91f82d8dce11f1c0"},"schema_version":"1.0"},"canonical_sha256":"fc9d2f9d281ce6c393719506a3de26e7cf759741af895cff6f1b74c7b81794cb","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:41:40.542639Z","signature_b64":"qQ81vIH1NzHCgl/442Aj840JPvtWVFvaQkbTMf+HEsX7yHocZuWYHcJOU2r8KEGGbIFbU9psesLzClofpfFDDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"fc9d2f9d281ce6c393719506a3de26e7cf759741af895cff6f1b74c7b81794cb","last_reissued_at":"2026-05-17T23:41:40.542087Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:41:40.542087Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1907.01388","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:41:40Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"BH3Juhwtg44AR9b42xlQBTtdCMdkXnhlowhsQAZQyE0P7jbPqmD410M3i2ZfA22z1LbI07/in14FtajpTsyuBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T21:41:23.624064Z"},"content_sha256":"0dda87daa0c23438ae79f478a178988e3219fe3fdec93ed550561bfa09de5291","schema_version":"1.0","event_id":"sha256:0dda87daa0c23438ae79f478a178988e3219fe3fdec93ed550561bfa09de5291"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:7SOS7HJIDTTMHE3RSUDKHXRG47","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Identifying vital nodes based on reverse greedy method","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.SI","physics.data-an"],"primary_cat":"physics.soc-ph","authors_text":"Simiao Liu, Tao Ren, Tao Zhou, Yanjie Xu, Yi Qi, Yixin Zhang, Zhe Li","submitted_at":"2019-07-02T14:15:42Z","abstract_excerpt":"The identification of vital nodes that maintain the network connectivity is a long-standing challenge in network science. In this paper, we propose a so-called reverse greedy method where the least important nodes are preferentially chosen to make the size of the largest component in the corresponding induced subgraph as small as possible. Accordingly, the nodes being chosen later are more important in maintaining the connectivity. Empirical analyses on ten real networks show that the reverse greedy method performs remarkably better than well-known state-of-the-art methods."},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1907.01388","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:41:40Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"9GuQbk1x/wRzk/eqMv+PzC3Vdc1SJsgPAwqeialAbn8YxFyrCK/tcIzaT82uVM5VXAI4ubDn3fLbPL+K/QnLDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T21:41:23.624489Z"},"content_sha256":"6ec060e65c66dfdfa3c4ab09764fed6433967c16d3b65fe1ddd4a27b0da0a471","schema_version":"1.0","event_id":"sha256:6ec060e65c66dfdfa3c4ab09764fed6433967c16d3b65fe1ddd4a27b0da0a471"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/7SOS7HJIDTTMHE3RSUDKHXRG47/bundle.json","state_url":"https://pith.science/pith/7SOS7HJIDTTMHE3RSUDKHXRG47/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/7SOS7HJIDTTMHE3RSUDKHXRG47/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T21:41:23Z","links":{"resolver":"https://pith.science/pith/7SOS7HJIDTTMHE3RSUDKHXRG47","bundle":"https://pith.science/pith/7SOS7HJIDTTMHE3RSUDKHXRG47/bundle.json","state":"https://pith.science/pith/7SOS7HJIDTTMHE3RSUDKHXRG47/state.json","well_known_bundle":"https://pith.science/.well-known/pith/7SOS7HJIDTTMHE3RSUDKHXRG47/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:7SOS7HJIDTTMHE3RSUDKHXRG47","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"61723e850d3fe2cb927cb6b7d8bfa40dd7ff9ed0630b0d7c91f82d8dce11f1c0","cross_cats_sorted":["cs.SI","physics.data-an"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2019-07-02T14:15:42Z","title_canon_sha256":"91402812b074a8eb2867e8eee9842115d27d14922ab9b5fd65d8eccb88f78439"},"schema_version":"1.0","source":{"id":"1907.01388","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1907.01388","created_at":"2026-05-17T23:41:40Z"},{"alias_kind":"arxiv_version","alias_value":"1907.01388v1","created_at":"2026-05-17T23:41:40Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1907.01388","created_at":"2026-05-17T23:41:40Z"},{"alias_kind":"pith_short_12","alias_value":"7SOS7HJIDTTM","created_at":"2026-05-18T12:33:12Z"},{"alias_kind":"pith_short_16","alias_value":"7SOS7HJIDTTMHE3R","created_at":"2026-05-18T12:33:12Z"},{"alias_kind":"pith_short_8","alias_value":"7SOS7HJI","created_at":"2026-05-18T12:33:12Z"}],"graph_snapshots":[{"event_id":"sha256:6ec060e65c66dfdfa3c4ab09764fed6433967c16d3b65fe1ddd4a27b0da0a471","target":"graph","created_at":"2026-05-17T23:41:40Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The identification of vital nodes that maintain the network connectivity is a long-standing challenge in network science. In this paper, we propose a so-called reverse greedy method where the least important nodes are preferentially chosen to make the size of the largest component in the corresponding induced subgraph as small as possible. Accordingly, the nodes being chosen later are more important in maintaining the connectivity. Empirical analyses on ten real networks show that the reverse greedy method performs remarkably better than well-known state-of-the-art methods.","authors_text":"Simiao Liu, Tao Ren, Tao Zhou, Yanjie Xu, Yi Qi, Yixin Zhang, Zhe Li","cross_cats":["cs.SI","physics.data-an"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2019-07-02T14:15:42Z","title":"Identifying vital nodes based on reverse greedy method"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1907.01388","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:0dda87daa0c23438ae79f478a178988e3219fe3fdec93ed550561bfa09de5291","target":"record","created_at":"2026-05-17T23:41:40Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"61723e850d3fe2cb927cb6b7d8bfa40dd7ff9ed0630b0d7c91f82d8dce11f1c0","cross_cats_sorted":["cs.SI","physics.data-an"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2019-07-02T14:15:42Z","title_canon_sha256":"91402812b074a8eb2867e8eee9842115d27d14922ab9b5fd65d8eccb88f78439"},"schema_version":"1.0","source":{"id":"1907.01388","kind":"arxiv","version":1}},"canonical_sha256":"fc9d2f9d281ce6c393719506a3de26e7cf759741af895cff6f1b74c7b81794cb","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"fc9d2f9d281ce6c393719506a3de26e7cf759741af895cff6f1b74c7b81794cb","first_computed_at":"2026-05-17T23:41:40.542087Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:41:40.542087Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"qQ81vIH1NzHCgl/442Aj840JPvtWVFvaQkbTMf+HEsX7yHocZuWYHcJOU2r8KEGGbIFbU9psesLzClofpfFDDA==","signature_status":"signed_v1","signed_at":"2026-05-17T23:41:40.542639Z","signed_message":"canonical_sha256_bytes"},"source_id":"1907.01388","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:0dda87daa0c23438ae79f478a178988e3219fe3fdec93ed550561bfa09de5291","sha256:6ec060e65c66dfdfa3c4ab09764fed6433967c16d3b65fe1ddd4a27b0da0a471"],"state_sha256":"6ea731ce68200ff40698a39d4bc3b456395165353d9cbdac12a234b254f5ff81"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"NDH5f7N9nkJykc7Q/GH6RSWD08X/jZwOYcdNa3uiJq7eZ48qkHIpvFrg+q+To4g4pAzGpGdYvqe3s7LC1iR+AQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T21:41:23.626713Z","bundle_sha256":"237c4c8093621b19aeebc923daa3990c17c7375c09bf9e8456765a6c86cca8d8"}}