{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2014:B4AJYNJQH3PM4PZDE3G5XHHGTY","short_pith_number":"pith:B4AJYNJQ","canonical_record":{"source":{"id":"1408.6799","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"math.PR","submitted_at":"2014-08-28T18:25:04Z","cross_cats_sorted":["math.OC","q-fin.MF"],"title_canon_sha256":"c51d741b21f6d46f893331faa41e4a8d07d16958d2f45c530ff04623b13eab4b","abstract_canon_sha256":"748230805ad7c3ec2479f8c5995a10781010fb413a6ddf8a8e854b23905784d3"},"schema_version":"1.0"},"canonical_sha256":"0f009c35303edece3f2326cddb9ce69e383a8a592e6a4ebf02303292d4c3c2f1","source":{"kind":"arxiv","id":"1408.6799","version":4},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1408.6799","created_at":"2026-05-18T01:17:37Z"},{"alias_kind":"arxiv_version","alias_value":"1408.6799v4","created_at":"2026-05-18T01:17:37Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1408.6799","created_at":"2026-05-18T01:17:37Z"},{"alias_kind":"pith_short_12","alias_value":"B4AJYNJQH3PM","created_at":"2026-05-18T12:28:19Z"},{"alias_kind":"pith_short_16","alias_value":"B4AJYNJQH3PM4PZD","created_at":"2026-05-18T12:28:19Z"},{"alias_kind":"pith_short_8","alias_value":"B4AJYNJQ","created_at":"2026-05-18T12:28:19Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2014:B4AJYNJQH3PM4PZDE3G5XHHGTY","target":"record","payload":{"canonical_record":{"source":{"id":"1408.6799","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"math.PR","submitted_at":"2014-08-28T18:25:04Z","cross_cats_sorted":["math.OC","q-fin.MF"],"title_canon_sha256":"c51d741b21f6d46f893331faa41e4a8d07d16958d2f45c530ff04623b13eab4b","abstract_canon_sha256":"748230805ad7c3ec2479f8c5995a10781010fb413a6ddf8a8e854b23905784d3"},"schema_version":"1.0"},"canonical_sha256":"0f009c35303edece3f2326cddb9ce69e383a8a592e6a4ebf02303292d4c3c2f1","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:17:37.828433Z","signature_b64":"VBj0DIlZZGNMMAj4qyRHA8mZZSJkDPPwqBOk0bmwNbuA1rPpMeY67wJwsHHIKonDWVYf8c6sG8wbVZo1a9v6AA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"0f009c35303edece3f2326cddb9ce69e383a8a592e6a4ebf02303292d4c3c2f1","last_reissued_at":"2026-05-18T01:17:37.827718Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:17:37.827718Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1408.6799","source_version":4,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:17:37Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"SNWWhPo3YwuAg2RE6gV5GJQWZ6aADMGzVYjxgmYRoCRGi9/vzQB5v+Jp4dH/SdoogU0Zk0q2p+6I2A55r6zkDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T05:15:24.193886Z"},"content_sha256":"6a65c718c23f865d66b99a0a4a88c478f389f3035d1a95cb1ec126d3c81e5563","schema_version":"1.0","event_id":"sha256:6a65c718c23f865d66b99a0a4a88c478f389f3035d1a95cb1ec126d3c81e5563"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2014:B4AJYNJQH3PM4PZDE3G5XHHGTY","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Stochastic Perron for stochastic target games","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.OC","q-fin.MF"],"primary_cat":"math.PR","authors_text":"Erhan Bayraktar, Jiaqi Li","submitted_at":"2014-08-28T18:25:04Z","abstract_excerpt":"We extend the stochastic Perron method to analyze the framework of stochastic target games, in which one player tries to find a strategy such that the state process almost surely reaches a given target no matter which action is chosen by the other player. Within this framework, our method produces a viscosity sub-solution (super-solution) of a Hamilton-Jacobi-Bellman (HJB) equation. We then characterize the value function as a viscosity solution to the HJB equation using a comparison result and a byproduct to obtain the dynamic programming principle."},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1408.6799","kind":"arxiv","version":4},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:17:37Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"uW2PgOaz4ZkJGwtrByKXJCTtuJ7Rzy0tpU3j/lVLIXayUkAVjw5EuD+E3Um8lGg6u6wXVq/BaM97hFIiZF8FCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T05:15:24.194585Z"},"content_sha256":"8e076ec3699dbb4c178a4a8a5e8184a235f9ca1b1403fb718678b8334bb8dd0e","schema_version":"1.0","event_id":"sha256:8e076ec3699dbb4c178a4a8a5e8184a235f9ca1b1403fb718678b8334bb8dd0e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/B4AJYNJQH3PM4PZDE3G5XHHGTY/bundle.json","state_url":"https://pith.science/pith/B4AJYNJQH3PM4PZDE3G5XHHGTY/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/B4AJYNJQH3PM4PZDE3G5XHHGTY/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T05:15:24Z","links":{"resolver":"https://pith.science/pith/B4AJYNJQH3PM4PZDE3G5XHHGTY","bundle":"https://pith.science/pith/B4AJYNJQH3PM4PZDE3G5XHHGTY/bundle.json","state":"https://pith.science/pith/B4AJYNJQH3PM4PZDE3G5XHHGTY/state.json","well_known_bundle":"https://pith.science/.well-known/pith/B4AJYNJQH3PM4PZDE3G5XHHGTY/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2014:B4AJYNJQH3PM4PZDE3G5XHHGTY","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"748230805ad7c3ec2479f8c5995a10781010fb413a6ddf8a8e854b23905784d3","cross_cats_sorted":["math.OC","q-fin.MF"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"math.PR","submitted_at":"2014-08-28T18:25:04Z","title_canon_sha256":"c51d741b21f6d46f893331faa41e4a8d07d16958d2f45c530ff04623b13eab4b"},"schema_version":"1.0","source":{"id":"1408.6799","kind":"arxiv","version":4}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1408.6799","created_at":"2026-05-18T01:17:37Z"},{"alias_kind":"arxiv_version","alias_value":"1408.6799v4","created_at":"2026-05-18T01:17:37Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1408.6799","created_at":"2026-05-18T01:17:37Z"},{"alias_kind":"pith_short_12","alias_value":"B4AJYNJQH3PM","created_at":"2026-05-18T12:28:19Z"},{"alias_kind":"pith_short_16","alias_value":"B4AJYNJQH3PM4PZD","created_at":"2026-05-18T12:28:19Z"},{"alias_kind":"pith_short_8","alias_value":"B4AJYNJQ","created_at":"2026-05-18T12:28:19Z"}],"graph_snapshots":[{"event_id":"sha256:8e076ec3699dbb4c178a4a8a5e8184a235f9ca1b1403fb718678b8334bb8dd0e","target":"graph","created_at":"2026-05-18T01:17:37Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We extend the stochastic Perron method to analyze the framework of stochastic target games, in which one player tries to find a strategy such that the state process almost surely reaches a given target no matter which action is chosen by the other player. Within this framework, our method produces a viscosity sub-solution (super-solution) of a Hamilton-Jacobi-Bellman (HJB) equation. We then characterize the value function as a viscosity solution to the HJB equation using a comparison result and a byproduct to obtain the dynamic programming principle.","authors_text":"Erhan Bayraktar, Jiaqi Li","cross_cats":["math.OC","q-fin.MF"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"math.PR","submitted_at":"2014-08-28T18:25:04Z","title":"Stochastic Perron for stochastic target games"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1408.6799","kind":"arxiv","version":4},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:6a65c718c23f865d66b99a0a4a88c478f389f3035d1a95cb1ec126d3c81e5563","target":"record","created_at":"2026-05-18T01:17:37Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"748230805ad7c3ec2479f8c5995a10781010fb413a6ddf8a8e854b23905784d3","cross_cats_sorted":["math.OC","q-fin.MF"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"math.PR","submitted_at":"2014-08-28T18:25:04Z","title_canon_sha256":"c51d741b21f6d46f893331faa41e4a8d07d16958d2f45c530ff04623b13eab4b"},"schema_version":"1.0","source":{"id":"1408.6799","kind":"arxiv","version":4}},"canonical_sha256":"0f009c35303edece3f2326cddb9ce69e383a8a592e6a4ebf02303292d4c3c2f1","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"0f009c35303edece3f2326cddb9ce69e383a8a592e6a4ebf02303292d4c3c2f1","first_computed_at":"2026-05-18T01:17:37.827718Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:17:37.827718Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"VBj0DIlZZGNMMAj4qyRHA8mZZSJkDPPwqBOk0bmwNbuA1rPpMeY67wJwsHHIKonDWVYf8c6sG8wbVZo1a9v6AA==","signature_status":"signed_v1","signed_at":"2026-05-18T01:17:37.828433Z","signed_message":"canonical_sha256_bytes"},"source_id":"1408.6799","source_kind":"arxiv","source_version":4}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:6a65c718c23f865d66b99a0a4a88c478f389f3035d1a95cb1ec126d3c81e5563","sha256:8e076ec3699dbb4c178a4a8a5e8184a235f9ca1b1403fb718678b8334bb8dd0e"],"state_sha256":"62d638d92aa42470fc6379e188709400c882d96451d20f2f898cc161d963a1d5"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"HThbAkxgP1xnbV641UBpUxP1BFVrZFIyTm4QXyp3X5LsfEMosG1tAolPafoZJCz+GQ7x+S16Lp+O4i8P7PooBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T05:15:24.198729Z","bundle_sha256":"c812364174ee7f7e975c5221d5e2acdf1edae986b6a43728e12453ee45e1dc94"}}