{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:BDPA7PDLP2WHC6QHI45Y4OSY4F","short_pith_number":"pith:BDPA7PDL","canonical_record":{"source":{"id":"1602.07366","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2016-02-24T01:38:14Z","cross_cats_sorted":[],"title_canon_sha256":"2dd59f1bfa65fd84429b16d87a96ea9cd9a394c9d63fccafbe35c2e563eed33b","abstract_canon_sha256":"92e359cc3ee120e4f58613566bfc163b7b7a9a20daeb6620c89b00d193dca697"},"schema_version":"1.0"},"canonical_sha256":"08de0fbc6b7eac717a07473b8e3a58e16e63b3814d7d822e1779ad8367a39971","source":{"kind":"arxiv","id":"1602.07366","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1602.07366","created_at":"2026-05-18T01:20:05Z"},{"alias_kind":"arxiv_version","alias_value":"1602.07366v1","created_at":"2026-05-18T01:20:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1602.07366","created_at":"2026-05-18T01:20:05Z"},{"alias_kind":"pith_short_12","alias_value":"BDPA7PDLP2WH","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_16","alias_value":"BDPA7PDLP2WHC6QH","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_8","alias_value":"BDPA7PDL","created_at":"2026-05-18T12:30:07Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:BDPA7PDLP2WHC6QHI45Y4OSY4F","target":"record","payload":{"canonical_record":{"source":{"id":"1602.07366","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2016-02-24T01:38:14Z","cross_cats_sorted":[],"title_canon_sha256":"2dd59f1bfa65fd84429b16d87a96ea9cd9a394c9d63fccafbe35c2e563eed33b","abstract_canon_sha256":"92e359cc3ee120e4f58613566bfc163b7b7a9a20daeb6620c89b00d193dca697"},"schema_version":"1.0"},"canonical_sha256":"08de0fbc6b7eac717a07473b8e3a58e16e63b3814d7d822e1779ad8367a39971","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:20:05.856116Z","signature_b64":"VZ34thypFe3JF131f8bcZL8aVoEz32oc1wjtq1lCtUK2xfsjMnVn4dk4ZILf4qHZBQBGBIqXQHwp1AXoCkcmCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"08de0fbc6b7eac717a07473b8e3a58e16e63b3814d7d822e1779ad8367a39971","last_reissued_at":"2026-05-18T01:20:05.855379Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:20:05.855379Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1602.07366","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:20:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"s2HNIo/7M08wqwRoW0ehq6ydF/kjcEfIIpSH65YX9i0e8QQdCbi4MQyqWsLUaNuM3bJwhJyjRV3wFNn5zQKqBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T06:56:48.198784Z"},"content_sha256":"cb60ab2c68c216b899bf822022d205fea4e6d02e0858019c506d941be0784a38","schema_version":"1.0","event_id":"sha256:cb60ab2c68c216b899bf822022d205fea4e6d02e0858019c506d941be0784a38"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:BDPA7PDLP2WHC6QHI45Y4OSY4F","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"An Intelligent QoS Identification for Untrustworthy Web Services Via Two-phase Neural Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SE","authors_text":"Liqiang Wang, Weidong Wang, Wei Lu","submitted_at":"2016-02-24T01:38:14Z","abstract_excerpt":"QoS identification for untrustworthy Web services is critical in QoS management in the service computing since the performance of untrustworthy Web services may result in QoS downgrade. The key issue is to intelligently learn the characteristics of trustworthy Web services from different QoS levels, then to identify the untrustworthy ones according to the characteristics of QoS metrics. As one of the intelligent identification approaches, deep neural network has emerged as a powerful technique in recent years. In this paper, we propose a novel two-phase neural network model to identify the unt"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1602.07366","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:20:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Yhx3l31lgit0mcH3NryOm1gxLG9uxii1OBzD0lmhE7DXdX8opFk8GmZ1H9R7FdGdBf1+FqpR0UfiaTWYA946Dw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T06:56:48.199193Z"},"content_sha256":"e2e3b903b34fb3e79580dce47ea76f1f01af9c4cf38dc61a1b391318c334772e","schema_version":"1.0","event_id":"sha256:e2e3b903b34fb3e79580dce47ea76f1f01af9c4cf38dc61a1b391318c334772e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/BDPA7PDLP2WHC6QHI45Y4OSY4F/bundle.json","state_url":"https://pith.science/pith/BDPA7PDLP2WHC6QHI45Y4OSY4F/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/BDPA7PDLP2WHC6QHI45Y4OSY4F/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T06:56:48Z","links":{"resolver":"https://pith.science/pith/BDPA7PDLP2WHC6QHI45Y4OSY4F","bundle":"https://pith.science/pith/BDPA7PDLP2WHC6QHI45Y4OSY4F/bundle.json","state":"https://pith.science/pith/BDPA7PDLP2WHC6QHI45Y4OSY4F/state.json","well_known_bundle":"https://pith.science/.well-known/pith/BDPA7PDLP2WHC6QHI45Y4OSY4F/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:BDPA7PDLP2WHC6QHI45Y4OSY4F","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"92e359cc3ee120e4f58613566bfc163b7b7a9a20daeb6620c89b00d193dca697","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2016-02-24T01:38:14Z","title_canon_sha256":"2dd59f1bfa65fd84429b16d87a96ea9cd9a394c9d63fccafbe35c2e563eed33b"},"schema_version":"1.0","source":{"id":"1602.07366","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1602.07366","created_at":"2026-05-18T01:20:05Z"},{"alias_kind":"arxiv_version","alias_value":"1602.07366v1","created_at":"2026-05-18T01:20:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1602.07366","created_at":"2026-05-18T01:20:05Z"},{"alias_kind":"pith_short_12","alias_value":"BDPA7PDLP2WH","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_16","alias_value":"BDPA7PDLP2WHC6QH","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_8","alias_value":"BDPA7PDL","created_at":"2026-05-18T12:30:07Z"}],"graph_snapshots":[{"event_id":"sha256:e2e3b903b34fb3e79580dce47ea76f1f01af9c4cf38dc61a1b391318c334772e","target":"graph","created_at":"2026-05-18T01:20:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"QoS identification for untrustworthy Web services is critical in QoS management in the service computing since the performance of untrustworthy Web services may result in QoS downgrade. The key issue is to intelligently learn the characteristics of trustworthy Web services from different QoS levels, then to identify the untrustworthy ones according to the characteristics of QoS metrics. As one of the intelligent identification approaches, deep neural network has emerged as a powerful technique in recent years. In this paper, we propose a novel two-phase neural network model to identify the unt","authors_text":"Liqiang Wang, Weidong Wang, Wei Lu","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2016-02-24T01:38:14Z","title":"An Intelligent QoS Identification for Untrustworthy Web Services Via Two-phase Neural Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1602.07366","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:cb60ab2c68c216b899bf822022d205fea4e6d02e0858019c506d941be0784a38","target":"record","created_at":"2026-05-18T01:20:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"92e359cc3ee120e4f58613566bfc163b7b7a9a20daeb6620c89b00d193dca697","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2016-02-24T01:38:14Z","title_canon_sha256":"2dd59f1bfa65fd84429b16d87a96ea9cd9a394c9d63fccafbe35c2e563eed33b"},"schema_version":"1.0","source":{"id":"1602.07366","kind":"arxiv","version":1}},"canonical_sha256":"08de0fbc6b7eac717a07473b8e3a58e16e63b3814d7d822e1779ad8367a39971","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"08de0fbc6b7eac717a07473b8e3a58e16e63b3814d7d822e1779ad8367a39971","first_computed_at":"2026-05-18T01:20:05.855379Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:20:05.855379Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"VZ34thypFe3JF131f8bcZL8aVoEz32oc1wjtq1lCtUK2xfsjMnVn4dk4ZILf4qHZBQBGBIqXQHwp1AXoCkcmCw==","signature_status":"signed_v1","signed_at":"2026-05-18T01:20:05.856116Z","signed_message":"canonical_sha256_bytes"},"source_id":"1602.07366","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:cb60ab2c68c216b899bf822022d205fea4e6d02e0858019c506d941be0784a38","sha256:e2e3b903b34fb3e79580dce47ea76f1f01af9c4cf38dc61a1b391318c334772e"],"state_sha256":"ebbbe9d6f0d9c1ca862d62abac7f8f55da95d13441b382a6e12fcd43ecb68d73"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"JN2HLpQaUCKwyfkcIetm9OrsDH9DV8lU5c6VP3U9f9DEU29TXe5ojt94W0xZajDLm5hCpgZfH6dOd7w2GrxhCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T06:56:48.201144Z","bundle_sha256":"f737cdb0ec52fd0a039ba35f76db5ba4025dfc47b60a81e583bb0bcabd7defca"}}