{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:AXP3OG6O5STXJKKHH6WK2R4ZXR","short_pith_number":"pith:AXP3OG6O","canonical_record":{"source":{"id":"1606.02221","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AI","submitted_at":"2016-06-07T17:10:16Z","cross_cats_sorted":["cs.GT"],"title_canon_sha256":"ccb1a1486a4c8704c7df5f4b0e6a2f4149a9cce413e6ed4fd9e17f988ff79949","abstract_canon_sha256":"51a61d9017cc792233df9c090fd79b6b78b15e9ee2006d557a669d82646d1f53"},"schema_version":"1.0"},"canonical_sha256":"05dfb71bceeca774a9473facad4799bc4c31ac6b105805fc3e987c1df2793cab","source":{"kind":"arxiv","id":"1606.02221","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1606.02221","created_at":"2026-05-18T01:12:44Z"},{"alias_kind":"arxiv_version","alias_value":"1606.02221v1","created_at":"2026-05-18T01:12:44Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1606.02221","created_at":"2026-05-18T01:12:44Z"},{"alias_kind":"pith_short_12","alias_value":"AXP3OG6O5STX","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_16","alias_value":"AXP3OG6O5STXJKKH","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_8","alias_value":"AXP3OG6O","created_at":"2026-05-18T12:30:07Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:AXP3OG6O5STXJKKHH6WK2R4ZXR","target":"record","payload":{"canonical_record":{"source":{"id":"1606.02221","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AI","submitted_at":"2016-06-07T17:10:16Z","cross_cats_sorted":["cs.GT"],"title_canon_sha256":"ccb1a1486a4c8704c7df5f4b0e6a2f4149a9cce413e6ed4fd9e17f988ff79949","abstract_canon_sha256":"51a61d9017cc792233df9c090fd79b6b78b15e9ee2006d557a669d82646d1f53"},"schema_version":"1.0"},"canonical_sha256":"05dfb71bceeca774a9473facad4799bc4c31ac6b105805fc3e987c1df2793cab","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:12:44.444900Z","signature_b64":"OCA21EQSS285PD0xsg0dltElFB9dO0RGoUEynJPXFwVsqSeI2HoLviFhOYZZvpplqKRonIPirGgNnKHjjIjVCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"05dfb71bceeca774a9473facad4799bc4c31ac6b105805fc3e987c1df2793cab","last_reissued_at":"2026-05-18T01:12:44.444560Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:12:44.444560Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1606.02221","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:12:44Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xur7sWBMWG6UirnkVpMYbv3oPmD8Ox/RqNwBpoj+uMZNKoSzJ2EL1EgVnA29LEwaQyy9AEzhfIR//6hQWEllAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T11:09:28.119460Z"},"content_sha256":"3c22b6c1b90e45309cc5977af28163e98f914e60d5eaee30d3b34e810d953031","schema_version":"1.0","event_id":"sha256:3c22b6c1b90e45309cc5977af28163e98f914e60d5eaee30d3b34e810d953031"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:AXP3OG6O5STXJKKHH6WK2R4ZXR","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Multi-resource defensive strategies for patrolling games with alarm systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.GT"],"primary_cat":"cs.AI","authors_text":"Giuseppe De Nittis, Nicola Basilico, Nicola Gatti","submitted_at":"2016-06-07T17:10:16Z","abstract_excerpt":"Security Games employ game theoretical tools to derive resource allocation strategies in security domains. Recent works considered the presence of alarm systems, even suffering various forms of uncertainty, and showed that disregarding alarm signals may lead to arbitrarily bad strategies. The central problem with an alarm system, unexplored in other Security Games, is finding the best strategy to respond to alarm signals for each mobile defensive resource. The literature provides results for the basic single-resource case, showing that even in that case the problem is computationally hard. In "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1606.02221","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:12:44Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"vv7bpjtjlFOsCvFmgVl/CU03znPBfB3p3aHa/IXge/5WvM3+RN9jGFppAYAFKvJP63aqPqSLhj5d0UVloqCvCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T11:09:28.120166Z"},"content_sha256":"7f1de9ac843cbfe4a1dedade649081bcec8b56d52463d67ce45a41c94a33e93f","schema_version":"1.0","event_id":"sha256:7f1de9ac843cbfe4a1dedade649081bcec8b56d52463d67ce45a41c94a33e93f"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/bundle.json","state_url":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T11:09:28Z","links":{"resolver":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR","bundle":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/bundle.json","state":"https://pith.science/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/state.json","well_known_bundle":"https://pith.science/.well-known/pith/AXP3OG6O5STXJKKHH6WK2R4ZXR/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:AXP3OG6O5STXJKKHH6WK2R4ZXR","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"51a61d9017cc792233df9c090fd79b6b78b15e9ee2006d557a669d82646d1f53","cross_cats_sorted":["cs.GT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AI","submitted_at":"2016-06-07T17:10:16Z","title_canon_sha256":"ccb1a1486a4c8704c7df5f4b0e6a2f4149a9cce413e6ed4fd9e17f988ff79949"},"schema_version":"1.0","source":{"id":"1606.02221","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1606.02221","created_at":"2026-05-18T01:12:44Z"},{"alias_kind":"arxiv_version","alias_value":"1606.02221v1","created_at":"2026-05-18T01:12:44Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1606.02221","created_at":"2026-05-18T01:12:44Z"},{"alias_kind":"pith_short_12","alias_value":"AXP3OG6O5STX","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_16","alias_value":"AXP3OG6O5STXJKKH","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_8","alias_value":"AXP3OG6O","created_at":"2026-05-18T12:30:07Z"}],"graph_snapshots":[{"event_id":"sha256:7f1de9ac843cbfe4a1dedade649081bcec8b56d52463d67ce45a41c94a33e93f","target":"graph","created_at":"2026-05-18T01:12:44Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Security Games employ game theoretical tools to derive resource allocation strategies in security domains. Recent works considered the presence of alarm systems, even suffering various forms of uncertainty, and showed that disregarding alarm signals may lead to arbitrarily bad strategies. The central problem with an alarm system, unexplored in other Security Games, is finding the best strategy to respond to alarm signals for each mobile defensive resource. The literature provides results for the basic single-resource case, showing that even in that case the problem is computationally hard. In ","authors_text":"Giuseppe De Nittis, Nicola Basilico, Nicola Gatti","cross_cats":["cs.GT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AI","submitted_at":"2016-06-07T17:10:16Z","title":"Multi-resource defensive strategies for patrolling games with alarm systems"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1606.02221","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:3c22b6c1b90e45309cc5977af28163e98f914e60d5eaee30d3b34e810d953031","target":"record","created_at":"2026-05-18T01:12:44Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"51a61d9017cc792233df9c090fd79b6b78b15e9ee2006d557a669d82646d1f53","cross_cats_sorted":["cs.GT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AI","submitted_at":"2016-06-07T17:10:16Z","title_canon_sha256":"ccb1a1486a4c8704c7df5f4b0e6a2f4149a9cce413e6ed4fd9e17f988ff79949"},"schema_version":"1.0","source":{"id":"1606.02221","kind":"arxiv","version":1}},"canonical_sha256":"05dfb71bceeca774a9473facad4799bc4c31ac6b105805fc3e987c1df2793cab","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"05dfb71bceeca774a9473facad4799bc4c31ac6b105805fc3e987c1df2793cab","first_computed_at":"2026-05-18T01:12:44.444560Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:12:44.444560Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"OCA21EQSS285PD0xsg0dltElFB9dO0RGoUEynJPXFwVsqSeI2HoLviFhOYZZvpplqKRonIPirGgNnKHjjIjVCg==","signature_status":"signed_v1","signed_at":"2026-05-18T01:12:44.444900Z","signed_message":"canonical_sha256_bytes"},"source_id":"1606.02221","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:3c22b6c1b90e45309cc5977af28163e98f914e60d5eaee30d3b34e810d953031","sha256:7f1de9ac843cbfe4a1dedade649081bcec8b56d52463d67ce45a41c94a33e93f"],"state_sha256":"d3fde2e8aa9f9dfbe319faa243d066345684869bebd311468a6d3d171c01d832"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"BkimZDNaCT/w71C0ycxljqq2M5ZS2+H6obat0YN3EHjf1Wyfxu5PCJS24Rob5pH2ldhMbo8/xnKzIYFrP7ayAw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T11:09:28.123798Z","bundle_sha256":"0c4b23ed8093ff37e3031a08636d839932960a5ded181b2052eb79f94f335ee4"}}