{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:AQVFWZR7QOCDYHQFNECGE4HLU2","short_pith_number":"pith:AQVFWZR7","canonical_record":{"source":{"id":"1705.10756","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.PF","submitted_at":"2017-05-30T17:09:34Z","cross_cats_sorted":[],"title_canon_sha256":"052cccf698f340c56b2bfe50b336c9eed724b3b794d63311aee8bb11b35adf4f","abstract_canon_sha256":"039425fac404e06c3f7fa99fb51ee9034c5111b19c89cd29dd0f78523da4ba1c"},"schema_version":"1.0"},"canonical_sha256":"042a5b663f83843c1e0569046270eba6a2b5acbbd867e8c7486acaedf481e67d","source":{"kind":"arxiv","id":"1705.10756","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1705.10756","created_at":"2026-05-18T00:43:23Z"},{"alias_kind":"arxiv_version","alias_value":"1705.10756v1","created_at":"2026-05-18T00:43:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1705.10756","created_at":"2026-05-18T00:43:23Z"},{"alias_kind":"pith_short_12","alias_value":"AQVFWZR7QOCD","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_16","alias_value":"AQVFWZR7QOCDYHQF","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_8","alias_value":"AQVFWZR7","created_at":"2026-05-18T12:31:05Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:AQVFWZR7QOCDYHQFNECGE4HLU2","target":"record","payload":{"canonical_record":{"source":{"id":"1705.10756","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.PF","submitted_at":"2017-05-30T17:09:34Z","cross_cats_sorted":[],"title_canon_sha256":"052cccf698f340c56b2bfe50b336c9eed724b3b794d63311aee8bb11b35adf4f","abstract_canon_sha256":"039425fac404e06c3f7fa99fb51ee9034c5111b19c89cd29dd0f78523da4ba1c"},"schema_version":"1.0"},"canonical_sha256":"042a5b663f83843c1e0569046270eba6a2b5acbbd867e8c7486acaedf481e67d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:43:23.582130Z","signature_b64":"2sp0ujA5kDKSuQL1hR0HHUjUueScklP9FGtW44ZEfOjtJ0qPumbtmR4jfhFGjptk4w8iHRByzcRwOCEnPNfECQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"042a5b663f83843c1e0569046270eba6a2b5acbbd867e8c7486acaedf481e67d","last_reissued_at":"2026-05-18T00:43:23.581446Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:43:23.581446Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1705.10756","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:43:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hzHUSU8ImN/6g+asVrnr7HSMtTHQKTBHnR3rgHXsdKrwmVXOrxB4ndOI3Wym/ADySBSrNPVcfXDW4R25uiFmBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T07:16:35.886716Z"},"content_sha256":"5be7d064dfe62083f9c4795fa9c8154f449e5454d662b30806979c2d1695dd31","schema_version":"1.0","event_id":"sha256:5be7d064dfe62083f9c4795fa9c8154f449e5454d662b30806979c2d1695dd31"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:AQVFWZR7QOCDYHQFNECGE4HLU2","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Tracking System Behaviour from Resource Usage Data","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":[],"primary_cat":"cs.PF","authors_text":"Abani Patra, Niyazi Sorkunlu, Varun Chandola","submitted_at":"2017-05-30T17:09:34Z","abstract_excerpt":"Resource usage data, collected using tools such as TACC Stats, capture the resource utilization by nodes within a high performance computing system. We present methods to analyze the resource usage data to understand the system performance and identify performance anomalies. The core idea is to model the data as a three-way tensor corresponding to the compute nodes, usage metrics, and time. Using the reconstruction error between the original tensor and the tensor reconstructed from a low rank tensor decomposition, as a scalar performance metric, enables us to monitor the performance of the sys"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1705.10756","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:43:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"sQYn99WtR2wMl/qQ6Y9OD3YVcAYOS+GmwLkHG4HTSsQO+JuJq5/MizIB6OcU7aXPajaQQiM6E41no8latsltAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T07:16:35.887147Z"},"content_sha256":"8c9f64fefa3b51e3ae6fe946a99008492c5e14823c5d3420360e5fbe9acd6631","schema_version":"1.0","event_id":"sha256:8c9f64fefa3b51e3ae6fe946a99008492c5e14823c5d3420360e5fbe9acd6631"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/AQVFWZR7QOCDYHQFNECGE4HLU2/bundle.json","state_url":"https://pith.science/pith/AQVFWZR7QOCDYHQFNECGE4HLU2/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/AQVFWZR7QOCDYHQFNECGE4HLU2/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T07:16:35Z","links":{"resolver":"https://pith.science/pith/AQVFWZR7QOCDYHQFNECGE4HLU2","bundle":"https://pith.science/pith/AQVFWZR7QOCDYHQFNECGE4HLU2/bundle.json","state":"https://pith.science/pith/AQVFWZR7QOCDYHQFNECGE4HLU2/state.json","well_known_bundle":"https://pith.science/.well-known/pith/AQVFWZR7QOCDYHQFNECGE4HLU2/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:AQVFWZR7QOCDYHQFNECGE4HLU2","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"039425fac404e06c3f7fa99fb51ee9034c5111b19c89cd29dd0f78523da4ba1c","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.PF","submitted_at":"2017-05-30T17:09:34Z","title_canon_sha256":"052cccf698f340c56b2bfe50b336c9eed724b3b794d63311aee8bb11b35adf4f"},"schema_version":"1.0","source":{"id":"1705.10756","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1705.10756","created_at":"2026-05-18T00:43:23Z"},{"alias_kind":"arxiv_version","alias_value":"1705.10756v1","created_at":"2026-05-18T00:43:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1705.10756","created_at":"2026-05-18T00:43:23Z"},{"alias_kind":"pith_short_12","alias_value":"AQVFWZR7QOCD","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_16","alias_value":"AQVFWZR7QOCDYHQF","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_8","alias_value":"AQVFWZR7","created_at":"2026-05-18T12:31:05Z"}],"graph_snapshots":[{"event_id":"sha256:8c9f64fefa3b51e3ae6fe946a99008492c5e14823c5d3420360e5fbe9acd6631","target":"graph","created_at":"2026-05-18T00:43:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Resource usage data, collected using tools such as TACC Stats, capture the resource utilization by nodes within a high performance computing system. We present methods to analyze the resource usage data to understand the system performance and identify performance anomalies. The core idea is to model the data as a three-way tensor corresponding to the compute nodes, usage metrics, and time. Using the reconstruction error between the original tensor and the tensor reconstructed from a low rank tensor decomposition, as a scalar performance metric, enables us to monitor the performance of the sys","authors_text":"Abani Patra, Niyazi Sorkunlu, Varun Chandola","cross_cats":[],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.PF","submitted_at":"2017-05-30T17:09:34Z","title":"Tracking System Behaviour from Resource Usage Data"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1705.10756","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:5be7d064dfe62083f9c4795fa9c8154f449e5454d662b30806979c2d1695dd31","target":"record","created_at":"2026-05-18T00:43:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"039425fac404e06c3f7fa99fb51ee9034c5111b19c89cd29dd0f78523da4ba1c","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.PF","submitted_at":"2017-05-30T17:09:34Z","title_canon_sha256":"052cccf698f340c56b2bfe50b336c9eed724b3b794d63311aee8bb11b35adf4f"},"schema_version":"1.0","source":{"id":"1705.10756","kind":"arxiv","version":1}},"canonical_sha256":"042a5b663f83843c1e0569046270eba6a2b5acbbd867e8c7486acaedf481e67d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"042a5b663f83843c1e0569046270eba6a2b5acbbd867e8c7486acaedf481e67d","first_computed_at":"2026-05-18T00:43:23.581446Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:43:23.581446Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"2sp0ujA5kDKSuQL1hR0HHUjUueScklP9FGtW44ZEfOjtJ0qPumbtmR4jfhFGjptk4w8iHRByzcRwOCEnPNfECQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:43:23.582130Z","signed_message":"canonical_sha256_bytes"},"source_id":"1705.10756","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:5be7d064dfe62083f9c4795fa9c8154f449e5454d662b30806979c2d1695dd31","sha256:8c9f64fefa3b51e3ae6fe946a99008492c5e14823c5d3420360e5fbe9acd6631"],"state_sha256":"74b5fa4a1758aabd5f4d458be2cbbb90be707b3539be64ac98154f978e6c5354"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"NRgxo4Qu2E1t2h/4EA4Bz010VxTCzdHFCU1Beq1qX254BmQ7jQnd7VAf2LE9v+elc9fiH1TEGzCfrFLhpc1VBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T07:16:35.890423Z","bundle_sha256":"4fb01496b58ab7c8b351491d22daf11bbcca6c84c8a6d396b9d8fb75b599f735"}}