{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:ADIBNL2YXMO5ZJPP36XXJIRNSA","short_pith_number":"pith:ADIBNL2Y","canonical_record":{"source":{"id":"1310.5430","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2013-10-21T06:05:48Z","cross_cats_sorted":["physics.soc-ph"],"title_canon_sha256":"28cb78df80236cee6a7814028642cc2e7076671d197f6321454cffce2e50fc13","abstract_canon_sha256":"91e8b874b6c8860500b84f369c9b6239fe1e7f2d5ca754947ad86696ea8a3ea0"},"schema_version":"1.0"},"canonical_sha256":"00d016af58bb1ddca5efdfaf74a22d9030c0cd9def21a653a7d3a05d5a3dfcf9","source":{"kind":"arxiv","id":"1310.5430","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1310.5430","created_at":"2026-05-18T03:09:35Z"},{"alias_kind":"arxiv_version","alias_value":"1310.5430v1","created_at":"2026-05-18T03:09:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1310.5430","created_at":"2026-05-18T03:09:35Z"},{"alias_kind":"pith_short_12","alias_value":"ADIBNL2YXMO5","created_at":"2026-05-18T12:27:38Z"},{"alias_kind":"pith_short_16","alias_value":"ADIBNL2YXMO5ZJPP","created_at":"2026-05-18T12:27:38Z"},{"alias_kind":"pith_short_8","alias_value":"ADIBNL2Y","created_at":"2026-05-18T12:27:38Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:ADIBNL2YXMO5ZJPP36XXJIRNSA","target":"record","payload":{"canonical_record":{"source":{"id":"1310.5430","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2013-10-21T06:05:48Z","cross_cats_sorted":["physics.soc-ph"],"title_canon_sha256":"28cb78df80236cee6a7814028642cc2e7076671d197f6321454cffce2e50fc13","abstract_canon_sha256":"91e8b874b6c8860500b84f369c9b6239fe1e7f2d5ca754947ad86696ea8a3ea0"},"schema_version":"1.0"},"canonical_sha256":"00d016af58bb1ddca5efdfaf74a22d9030c0cd9def21a653a7d3a05d5a3dfcf9","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:09:35.772230Z","signature_b64":"yLrER4/hVC+sWEllJTvgbqwBk18mgGLG3uilB8BBJM2f8jFHfWVbY55BPoQE72Lvxr5fCEJsHF5NIy83CW+eAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"00d016af58bb1ddca5efdfaf74a22d9030c0cd9def21a653a7d3a05d5a3dfcf9","last_reissued_at":"2026-05-18T03:09:35.771377Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:09:35.771377Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1310.5430","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:09:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"nCjfLHPTQkwtrdsx54LOKPH5K+8t+SppODlNj1Nusqwqn3oITxo423d7burFrs6uGNNnqD646VzuFxbhQXAsCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T16:18:49.864890Z"},"content_sha256":"ebbaca61846662eba79d1c80f5cf97fc24d90e27d99e1ae1cee4fd909ddd8b0e","schema_version":"1.0","event_id":"sha256:ebbaca61846662eba79d1c80f5cf97fc24d90e27d99e1ae1cee4fd909ddd8b0e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:ADIBNL2YXMO5ZJPP36XXJIRNSA","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Validating Network Value of Influencers by means of Explanations","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["physics.soc-ph"],"primary_cat":"cs.SI","authors_text":"Amit Goyal, Glenn S. Bevilacqua, Laks V. S. Lakshmanan, Shealen Clare","submitted_at":"2013-10-21T06:05:48Z","abstract_excerpt":"Recently, there has been significant interest in social influence analysis. One of the central problems in this area is the problem of identifying influencers, such that by convincing these users to perform a certain action (like buying a new product), a large number of other users get influenced to follow the action. The client of such an application is a marketer who would target these influencers for marketing a given new product, say by providing free samples or discounts. It is natural that before committing resources for targeting an influencer the marketer would be interested in validat"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1310.5430","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:09:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"yRODcf3nDc3OoaHuSeuu0c/NEes/n6BgQO5hDkLjCMNDibs8O4bf8+L+PlhqKrQBJrdLXmoTSO3YgIZMzKg8Cg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T16:18:49.865640Z"},"content_sha256":"6740727becf85185b728ffd681757fcc2b6ec14b1ec47b13e5af675cbf58bc74","schema_version":"1.0","event_id":"sha256:6740727becf85185b728ffd681757fcc2b6ec14b1ec47b13e5af675cbf58bc74"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ADIBNL2YXMO5ZJPP36XXJIRNSA/bundle.json","state_url":"https://pith.science/pith/ADIBNL2YXMO5ZJPP36XXJIRNSA/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ADIBNL2YXMO5ZJPP36XXJIRNSA/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T16:18:49Z","links":{"resolver":"https://pith.science/pith/ADIBNL2YXMO5ZJPP36XXJIRNSA","bundle":"https://pith.science/pith/ADIBNL2YXMO5ZJPP36XXJIRNSA/bundle.json","state":"https://pith.science/pith/ADIBNL2YXMO5ZJPP36XXJIRNSA/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ADIBNL2YXMO5ZJPP36XXJIRNSA/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:ADIBNL2YXMO5ZJPP36XXJIRNSA","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"91e8b874b6c8860500b84f369c9b6239fe1e7f2d5ca754947ad86696ea8a3ea0","cross_cats_sorted":["physics.soc-ph"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2013-10-21T06:05:48Z","title_canon_sha256":"28cb78df80236cee6a7814028642cc2e7076671d197f6321454cffce2e50fc13"},"schema_version":"1.0","source":{"id":"1310.5430","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1310.5430","created_at":"2026-05-18T03:09:35Z"},{"alias_kind":"arxiv_version","alias_value":"1310.5430v1","created_at":"2026-05-18T03:09:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1310.5430","created_at":"2026-05-18T03:09:35Z"},{"alias_kind":"pith_short_12","alias_value":"ADIBNL2YXMO5","created_at":"2026-05-18T12:27:38Z"},{"alias_kind":"pith_short_16","alias_value":"ADIBNL2YXMO5ZJPP","created_at":"2026-05-18T12:27:38Z"},{"alias_kind":"pith_short_8","alias_value":"ADIBNL2Y","created_at":"2026-05-18T12:27:38Z"}],"graph_snapshots":[{"event_id":"sha256:6740727becf85185b728ffd681757fcc2b6ec14b1ec47b13e5af675cbf58bc74","target":"graph","created_at":"2026-05-18T03:09:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Recently, there has been significant interest in social influence analysis. One of the central problems in this area is the problem of identifying influencers, such that by convincing these users to perform a certain action (like buying a new product), a large number of other users get influenced to follow the action. The client of such an application is a marketer who would target these influencers for marketing a given new product, say by providing free samples or discounts. It is natural that before committing resources for targeting an influencer the marketer would be interested in validat","authors_text":"Amit Goyal, Glenn S. Bevilacqua, Laks V. S. Lakshmanan, Shealen Clare","cross_cats":["physics.soc-ph"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2013-10-21T06:05:48Z","title":"Validating Network Value of Influencers by means of Explanations"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1310.5430","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ebbaca61846662eba79d1c80f5cf97fc24d90e27d99e1ae1cee4fd909ddd8b0e","target":"record","created_at":"2026-05-18T03:09:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"91e8b874b6c8860500b84f369c9b6239fe1e7f2d5ca754947ad86696ea8a3ea0","cross_cats_sorted":["physics.soc-ph"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2013-10-21T06:05:48Z","title_canon_sha256":"28cb78df80236cee6a7814028642cc2e7076671d197f6321454cffce2e50fc13"},"schema_version":"1.0","source":{"id":"1310.5430","kind":"arxiv","version":1}},"canonical_sha256":"00d016af58bb1ddca5efdfaf74a22d9030c0cd9def21a653a7d3a05d5a3dfcf9","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"00d016af58bb1ddca5efdfaf74a22d9030c0cd9def21a653a7d3a05d5a3dfcf9","first_computed_at":"2026-05-18T03:09:35.771377Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:09:35.771377Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"yLrER4/hVC+sWEllJTvgbqwBk18mgGLG3uilB8BBJM2f8jFHfWVbY55BPoQE72Lvxr5fCEJsHF5NIy83CW+eAg==","signature_status":"signed_v1","signed_at":"2026-05-18T03:09:35.772230Z","signed_message":"canonical_sha256_bytes"},"source_id":"1310.5430","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ebbaca61846662eba79d1c80f5cf97fc24d90e27d99e1ae1cee4fd909ddd8b0e","sha256:6740727becf85185b728ffd681757fcc2b6ec14b1ec47b13e5af675cbf58bc74"],"state_sha256":"38117069daaf708015c8f8075b667313bdab04af8c2dd88ecaf6ab60c545fb0c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XXQmBr9pT9dWk1nT6USuht3ewWfDoQWdi69RYEeOx9v8PBIC3nl8RKECLF9zkp2oAubcylPQXh98dCfMO/AeDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T16:18:49.868937Z","bundle_sha256":"e2bb3bb36ca5a0654a5ef56c6db5c21d372d95881f0893c0aa49e0b78a2bd0f3"}}