{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:C7U2OOVTC2UI3KSNB67QLTQF3U","short_pith_number":"pith:C7U2OOVT","canonical_record":{"source":{"id":"1301.7517","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-01-31T05:27:48Z","cross_cats_sorted":[],"title_canon_sha256":"e9bcf49456a32f6528b5f0983b81e4cc499af176988c18d2b6f597269d741e1f","abstract_canon_sha256":"38aaeb4e728bc7e6607ad877a090dcc2abde203060ca0f553aee5a48524acdba"},"schema_version":"1.0"},"canonical_sha256":"17e9a73ab316a88daa4d0fbf05ce05dd16e57d555e25b3274bfb60b9bc6b3218","source":{"kind":"arxiv","id":"1301.7517","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1301.7517","created_at":"2026-05-18T03:34:49Z"},{"alias_kind":"arxiv_version","alias_value":"1301.7517v1","created_at":"2026-05-18T03:34:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1301.7517","created_at":"2026-05-18T03:34:49Z"},{"alias_kind":"pith_short_12","alias_value":"C7U2OOVTC2UI","created_at":"2026-05-18T12:27:40Z"},{"alias_kind":"pith_short_16","alias_value":"C7U2OOVTC2UI3KSN","created_at":"2026-05-18T12:27:40Z"},{"alias_kind":"pith_short_8","alias_value":"C7U2OOVT","created_at":"2026-05-18T12:27:40Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:C7U2OOVTC2UI3KSNB67QLTQF3U","target":"record","payload":{"canonical_record":{"source":{"id":"1301.7517","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-01-31T05:27:48Z","cross_cats_sorted":[],"title_canon_sha256":"e9bcf49456a32f6528b5f0983b81e4cc499af176988c18d2b6f597269d741e1f","abstract_canon_sha256":"38aaeb4e728bc7e6607ad877a090dcc2abde203060ca0f553aee5a48524acdba"},"schema_version":"1.0"},"canonical_sha256":"17e9a73ab316a88daa4d0fbf05ce05dd16e57d555e25b3274bfb60b9bc6b3218","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:34:49.354669Z","signature_b64":"ACcHA9qwIE1NMeJV1c09oBHke9gQl8cjxWf4Z+FbOE2V1lI1QnxYzE8cgsqIZWsw+MmTzMoLxeMVoCxN0JGDDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"17e9a73ab316a88daa4d0fbf05ce05dd16e57d555e25b3274bfb60b9bc6b3218","last_reissued_at":"2026-05-18T03:34:49.354066Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:34:49.354066Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1301.7517","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:34:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pKBDKZQcyhr2rXy7PvpKlfqNzpWvYsyH1HcrYdftLuMsSqm0uKyB49KKW5q/7ZoExirM3FyIC5rIRMUqSUNEBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T00:08:35.114879Z"},"content_sha256":"edf7f0b4b5d1d384c4487d02de3d5f8190f593ed9fe3906eb2991ff8a8af444c","schema_version":"1.0","event_id":"sha256:edf7f0b4b5d1d384c4487d02de3d5f8190f593ed9fe3906eb2991ff8a8af444c"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:C7U2OOVTC2UI3KSNB67QLTQF3U","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Content Based Traffic Engineering in Software Defined Information Centric Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Abhishek Chanda, Cedric Westphal, Dipankar Raychaudhuri","submitted_at":"2013-01-31T05:27:48Z","abstract_excerpt":"This paper describes a content centric network architecture which uses software defined networking principles to implement efficient metadata driven services by extracting content metadata at the network layer. The ability to access content metadata transparently enables a number of new services in the network. Specific examples discussed here include: a metadata driven traffic engineering scheme which uses prior knowledge of content length to optimize content delivery, a metadata driven content firewall which is more resilient than traditional firewalls and differentiated treatment of content"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1301.7517","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:34:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"d1a9LjNhMWQeFD4fSFyzYMSBGHSPll06IV1p7lta7SCPG0IcEStlxNYSInh4tw2G+c2A7HmMvC8QDgs4Yj22CQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T00:08:35.115596Z"},"content_sha256":"238856b3ed9832166e675a5477aa68ecf639cbe1a76ea369b27ce971c8e2b7fc","schema_version":"1.0","event_id":"sha256:238856b3ed9832166e675a5477aa68ecf639cbe1a76ea369b27ce971c8e2b7fc"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/C7U2OOVTC2UI3KSNB67QLTQF3U/bundle.json","state_url":"https://pith.science/pith/C7U2OOVTC2UI3KSNB67QLTQF3U/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/C7U2OOVTC2UI3KSNB67QLTQF3U/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T00:08:35Z","links":{"resolver":"https://pith.science/pith/C7U2OOVTC2UI3KSNB67QLTQF3U","bundle":"https://pith.science/pith/C7U2OOVTC2UI3KSNB67QLTQF3U/bundle.json","state":"https://pith.science/pith/C7U2OOVTC2UI3KSNB67QLTQF3U/state.json","well_known_bundle":"https://pith.science/.well-known/pith/C7U2OOVTC2UI3KSNB67QLTQF3U/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:C7U2OOVTC2UI3KSNB67QLTQF3U","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"38aaeb4e728bc7e6607ad877a090dcc2abde203060ca0f553aee5a48524acdba","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-01-31T05:27:48Z","title_canon_sha256":"e9bcf49456a32f6528b5f0983b81e4cc499af176988c18d2b6f597269d741e1f"},"schema_version":"1.0","source":{"id":"1301.7517","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1301.7517","created_at":"2026-05-18T03:34:49Z"},{"alias_kind":"arxiv_version","alias_value":"1301.7517v1","created_at":"2026-05-18T03:34:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1301.7517","created_at":"2026-05-18T03:34:49Z"},{"alias_kind":"pith_short_12","alias_value":"C7U2OOVTC2UI","created_at":"2026-05-18T12:27:40Z"},{"alias_kind":"pith_short_16","alias_value":"C7U2OOVTC2UI3KSN","created_at":"2026-05-18T12:27:40Z"},{"alias_kind":"pith_short_8","alias_value":"C7U2OOVT","created_at":"2026-05-18T12:27:40Z"}],"graph_snapshots":[{"event_id":"sha256:238856b3ed9832166e675a5477aa68ecf639cbe1a76ea369b27ce971c8e2b7fc","target":"graph","created_at":"2026-05-18T03:34:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This paper describes a content centric network architecture which uses software defined networking principles to implement efficient metadata driven services by extracting content metadata at the network layer. The ability to access content metadata transparently enables a number of new services in the network. Specific examples discussed here include: a metadata driven traffic engineering scheme which uses prior knowledge of content length to optimize content delivery, a metadata driven content firewall which is more resilient than traditional firewalls and differentiated treatment of content","authors_text":"Abhishek Chanda, Cedric Westphal, Dipankar Raychaudhuri","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-01-31T05:27:48Z","title":"Content Based Traffic Engineering in Software Defined Information Centric Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1301.7517","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:edf7f0b4b5d1d384c4487d02de3d5f8190f593ed9fe3906eb2991ff8a8af444c","target":"record","created_at":"2026-05-18T03:34:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"38aaeb4e728bc7e6607ad877a090dcc2abde203060ca0f553aee5a48524acdba","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-01-31T05:27:48Z","title_canon_sha256":"e9bcf49456a32f6528b5f0983b81e4cc499af176988c18d2b6f597269d741e1f"},"schema_version":"1.0","source":{"id":"1301.7517","kind":"arxiv","version":1}},"canonical_sha256":"17e9a73ab316a88daa4d0fbf05ce05dd16e57d555e25b3274bfb60b9bc6b3218","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"17e9a73ab316a88daa4d0fbf05ce05dd16e57d555e25b3274bfb60b9bc6b3218","first_computed_at":"2026-05-18T03:34:49.354066Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:34:49.354066Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ACcHA9qwIE1NMeJV1c09oBHke9gQl8cjxWf4Z+FbOE2V1lI1QnxYzE8cgsqIZWsw+MmTzMoLxeMVoCxN0JGDDg==","signature_status":"signed_v1","signed_at":"2026-05-18T03:34:49.354669Z","signed_message":"canonical_sha256_bytes"},"source_id":"1301.7517","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:edf7f0b4b5d1d384c4487d02de3d5f8190f593ed9fe3906eb2991ff8a8af444c","sha256:238856b3ed9832166e675a5477aa68ecf639cbe1a76ea369b27ce971c8e2b7fc"],"state_sha256":"7d228ac05960844d89600f8b808c85e7541b55b94c3b9345f7d381d4f4de305e"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"+2AC7hF8IYzj0ZtMJ+OYXRKF59asRR/xU64DQbawRPlEdrWTQDuPlAngcm9wxRxwbhozQME/sUmbN/KW8rj/DQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T00:08:35.118899Z","bundle_sha256":"3646dc9d5cb02124b66632b9c3661de120c016a9ff9a0255a40fb476159e0339"}}