{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2016:AXP3OG6O5STXJKKHH6WK2R4ZXR","short_pith_number":"pith:AXP3OG6O","schema_version":"1.0","canonical_sha256":"05dfb71bceeca774a9473facad4799bc4c31ac6b105805fc3e987c1df2793cab","source":{"kind":"arxiv","id":"1606.02221","version":1},"attestation_state":"computed","paper":{"title":"Multi-resource defensive strategies for patrolling games with alarm systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.GT"],"primary_cat":"cs.AI","authors_text":"Giuseppe De Nittis, Nicola Basilico, Nicola Gatti","submitted_at":"2016-06-07T17:10:16Z","abstract_excerpt":"Security Games employ game theoretical tools to derive resource allocation strategies in security domains. Recent works considered the presence of alarm systems, even suffering various forms of uncertainty, and showed that disregarding alarm signals may lead to arbitrarily bad strategies. The central problem with an alarm system, unexplored in other Security Games, is finding the best strategy to respond to alarm signals for each mobile defensive resource. The literature provides results for the basic single-resource case, showing that even in that case the problem is computationally hard. In "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1606.02221","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AI","submitted_at":"2016-06-07T17:10:16Z","cross_cats_sorted":["cs.GT"],"title_canon_sha256":"ccb1a1486a4c8704c7df5f4b0e6a2f4149a9cce413e6ed4fd9e17f988ff79949","abstract_canon_sha256":"51a61d9017cc792233df9c090fd79b6b78b15e9ee2006d557a669d82646d1f53"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:12:44.444900Z","signature_b64":"OCA21EQSS285PD0xsg0dltElFB9dO0RGoUEynJPXFwVsqSeI2HoLviFhOYZZvpplqKRonIPirGgNnKHjjIjVCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"05dfb71bceeca774a9473facad4799bc4c31ac6b105805fc3e987c1df2793cab","last_reissued_at":"2026-05-18T01:12:44.444560Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:12:44.444560Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Multi-resource defensive strategies for patrolling games with alarm systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.GT"],"primary_cat":"cs.AI","authors_text":"Giuseppe De Nittis, Nicola Basilico, Nicola Gatti","submitted_at":"2016-06-07T17:10:16Z","abstract_excerpt":"Security Games employ game theoretical tools to derive resource allocation strategies in security domains. Recent works considered the presence of alarm systems, even suffering various forms of uncertainty, and showed that disregarding alarm signals may lead to arbitrarily bad strategies. The central problem with an alarm system, unexplored in other Security Games, is finding the best strategy to respond to alarm signals for each mobile defensive resource. The literature provides results for the basic single-resource case, showing that even in that case the problem is computationally hard. In "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1606.02221","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1606.02221","created_at":"2026-05-18T01:12:44.444613+00:00"},{"alias_kind":"arxiv_version","alias_value":"1606.02221v1","created_at":"2026-05-18T01:12:44.444613+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1606.02221","created_at":"2026-05-18T01:12:44.444613+00:00"},{"alias_kind":"pith_short_12","alias_value":"AXP3OG6O5STX","created_at":"2026-05-18T12:30:07.202191+00:00"},{"alias_kind":"pith_short_16","alias_value":"AXP3OG6O5STXJKKH","created_at":"2026-05-18T12:30:07.202191+00:00"},{"alias_kind":"pith_short_8","alias_value":"AXP3OG6O","created_at":"2026-05-18T12:30:07.202191+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR","json":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR.json","graph_json":"https://pith.science/api/pith-number/AXP3OG6O5STXJKKHH6WK2R4ZXR/graph.json","events_json":"https://pith.science/api/pith-number/AXP3OG6O5STXJKKHH6WK2R4ZXR/events.json","paper":"https://pith.science/paper/AXP3OG6O"},"agent_actions":{"view_html":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR","download_json":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR.json","view_paper":"https://pith.science/paper/AXP3OG6O","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1606.02221&json=true","fetch_graph":"https://pith.science/api/pith-number/AXP3OG6O5STXJKKHH6WK2R4ZXR/graph.json","fetch_events":"https://pith.science/api/pith-number/AXP3OG6O5STXJKKHH6WK2R4ZXR/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/action/timestamp_anchor","attest_storage":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/action/storage_attestation","attest_author":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/action/author_attestation","sign_citation":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/action/citation_signature","submit_replication":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/action/replication_record"}},"created_at":"2026-05-18T01:12:44.444613+00:00","updated_at":"2026-05-18T01:12:44.444613+00:00"}