{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:AM6GIFSTKFF47JBYAUX3UL5DOV","short_pith_number":"pith:AM6GIFST","canonical_record":{"source":{"id":"1606.06504","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-06-21T10:44:48Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"9ded51628596bd5d3d0ede537890113dff9622b1c1d77b4ec2e0436dcbe6247b","abstract_canon_sha256":"6e51450a51c263b0355b1d04829be1cde7982c8414cb3abefec6c1093ba1d151"},"schema_version":"1.0"},"canonical_sha256":"033c641653514bcfa438052fba2fa37560ff92798d47c737df9606e8c0245c4b","source":{"kind":"arxiv","id":"1606.06504","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1606.06504","created_at":"2026-05-18T00:43:02Z"},{"alias_kind":"arxiv_version","alias_value":"1606.06504v1","created_at":"2026-05-18T00:43:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1606.06504","created_at":"2026-05-18T00:43:02Z"},{"alias_kind":"pith_short_12","alias_value":"AM6GIFSTKFF4","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_16","alias_value":"AM6GIFSTKFF47JBY","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_8","alias_value":"AM6GIFST","created_at":"2026-05-18T12:30:07Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:AM6GIFSTKFF47JBYAUX3UL5DOV","target":"record","payload":{"canonical_record":{"source":{"id":"1606.06504","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-06-21T10:44:48Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"9ded51628596bd5d3d0ede537890113dff9622b1c1d77b4ec2e0436dcbe6247b","abstract_canon_sha256":"6e51450a51c263b0355b1d04829be1cde7982c8414cb3abefec6c1093ba1d151"},"schema_version":"1.0"},"canonical_sha256":"033c641653514bcfa438052fba2fa37560ff92798d47c737df9606e8c0245c4b","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:43:02.702237Z","signature_b64":"xQBD+/T6cUk7o7jFvIXN9dH4HmZNAsHW94vFuPzDMb03QN71RGj7P0E3xmlnWCSJtbXj1bjHxW7XkDDKqJB6DA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"033c641653514bcfa438052fba2fa37560ff92798d47c737df9606e8c0245c4b","last_reissued_at":"2026-05-18T00:43:02.701594Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:43:02.701594Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1606.06504","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:43:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"zfttmrCAu5u8ouw/rCe/HiBBt8rH8bdgsfm9H2U7yxVKruBK+/RdvL2c3uXp9zD0U5yC3WVROrbyWQpxmdARCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:18:17.886544Z"},"content_sha256":"e57a6cf0a370b01403d01eef274f42a65b11d070eb31851284b698840dc21c22","schema_version":"1.0","event_id":"sha256:e57a6cf0a370b01403d01eef274f42a65b11d070eb31851284b698840dc21c22"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:AM6GIFSTKFF47JBYAUX3UL5DOV","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Transmit Beamforming for Interference Exploitation in the Underlay Cognitive Radio Z-channel","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Christos Masouros, Ka Lung Law, Marius Pesavento","submitted_at":"2016-06-21T10:44:48Z","abstract_excerpt":"This paper introduces novel transmit beamforming approaches for the cognitive radio (CR) Z-channel. The proposed transmission schemes exploit non-causal information about the interference at the SBS to re-design the CR beamforming optimization problem. This is done with the objective to improve the quality of service (QoS) of secondary users by taking advantage of constructive interference in the secondary link. The beamformers are designed to minimize the worst secondary user's symbol error probability (SEP) under constraints on the instantaneous total transmit power, and the power of the ins"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1606.06504","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:43:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/rlaTdJ1dAAgfUJzxObFg+YbEdKmFXLnnbloTt3yTTdZKAi//WuDWuXd4iDtWVPS+iv4zrh2De/hF/jDpVIRBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:18:17.886892Z"},"content_sha256":"8bdd5eb675c02b8d183c2f9e8165b8a76c26001550ba1ef9bf82c7a762b85203","schema_version":"1.0","event_id":"sha256:8bdd5eb675c02b8d183c2f9e8165b8a76c26001550ba1ef9bf82c7a762b85203"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/AM6GIFSTKFF47JBYAUX3UL5DOV/bundle.json","state_url":"https://pith.science/pith/AM6GIFSTKFF47JBYAUX3UL5DOV/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/AM6GIFSTKFF47JBYAUX3UL5DOV/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T13:18:17Z","links":{"resolver":"https://pith.science/pith/AM6GIFSTKFF47JBYAUX3UL5DOV","bundle":"https://pith.science/pith/AM6GIFSTKFF47JBYAUX3UL5DOV/bundle.json","state":"https://pith.science/pith/AM6GIFSTKFF47JBYAUX3UL5DOV/state.json","well_known_bundle":"https://pith.science/.well-known/pith/AM6GIFSTKFF47JBYAUX3UL5DOV/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:AM6GIFSTKFF47JBYAUX3UL5DOV","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"6e51450a51c263b0355b1d04829be1cde7982c8414cb3abefec6c1093ba1d151","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-06-21T10:44:48Z","title_canon_sha256":"9ded51628596bd5d3d0ede537890113dff9622b1c1d77b4ec2e0436dcbe6247b"},"schema_version":"1.0","source":{"id":"1606.06504","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1606.06504","created_at":"2026-05-18T00:43:02Z"},{"alias_kind":"arxiv_version","alias_value":"1606.06504v1","created_at":"2026-05-18T00:43:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1606.06504","created_at":"2026-05-18T00:43:02Z"},{"alias_kind":"pith_short_12","alias_value":"AM6GIFSTKFF4","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_16","alias_value":"AM6GIFSTKFF47JBY","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_8","alias_value":"AM6GIFST","created_at":"2026-05-18T12:30:07Z"}],"graph_snapshots":[{"event_id":"sha256:8bdd5eb675c02b8d183c2f9e8165b8a76c26001550ba1ef9bf82c7a762b85203","target":"graph","created_at":"2026-05-18T00:43:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This paper introduces novel transmit beamforming approaches for the cognitive radio (CR) Z-channel. The proposed transmission schemes exploit non-causal information about the interference at the SBS to re-design the CR beamforming optimization problem. This is done with the objective to improve the quality of service (QoS) of secondary users by taking advantage of constructive interference in the secondary link. The beamformers are designed to minimize the worst secondary user's symbol error probability (SEP) under constraints on the instantaneous total transmit power, and the power of the ins","authors_text":"Christos Masouros, Ka Lung Law, Marius Pesavento","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-06-21T10:44:48Z","title":"Transmit Beamforming for Interference Exploitation in the Underlay Cognitive Radio Z-channel"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1606.06504","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:e57a6cf0a370b01403d01eef274f42a65b11d070eb31851284b698840dc21c22","target":"record","created_at":"2026-05-18T00:43:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"6e51450a51c263b0355b1d04829be1cde7982c8414cb3abefec6c1093ba1d151","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-06-21T10:44:48Z","title_canon_sha256":"9ded51628596bd5d3d0ede537890113dff9622b1c1d77b4ec2e0436dcbe6247b"},"schema_version":"1.0","source":{"id":"1606.06504","kind":"arxiv","version":1}},"canonical_sha256":"033c641653514bcfa438052fba2fa37560ff92798d47c737df9606e8c0245c4b","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"033c641653514bcfa438052fba2fa37560ff92798d47c737df9606e8c0245c4b","first_computed_at":"2026-05-18T00:43:02.701594Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:43:02.701594Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"xQBD+/T6cUk7o7jFvIXN9dH4HmZNAsHW94vFuPzDMb03QN71RGj7P0E3xmlnWCSJtbXj1bjHxW7XkDDKqJB6DA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:43:02.702237Z","signed_message":"canonical_sha256_bytes"},"source_id":"1606.06504","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:e57a6cf0a370b01403d01eef274f42a65b11d070eb31851284b698840dc21c22","sha256:8bdd5eb675c02b8d183c2f9e8165b8a76c26001550ba1ef9bf82c7a762b85203"],"state_sha256":"33c1f5d4ea74d57dbf2f0c48656f77b3880929f93376b6a6655785601fa49aca"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5rWx6I2875U1LNEoqFzM1Duj24U8MWF9a0iyRQqoSOjjleIV/KwtK7QdRchCOds0PrDqJK9CVUaFbYEQ5ajdAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T13:18:17.889032Z","bundle_sha256":"9f39214c69377047f2c1638840b3b97143b5d3e25b25926d1f05640ee742e7ad"}}