{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:DY77NCA6XT4D2AWISCJSZBMK3S","short_pith_number":"pith:DY77NCA6","canonical_record":{"source":{"id":"1304.5518","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2013-04-19T19:50:04Z","cross_cats_sorted":[],"title_canon_sha256":"01c50a0f206564edf705c40eb99d945e341d6f1e610990764160ee256efd988a","abstract_canon_sha256":"ada76a702eca2b9ffd9e10bb559c630012043f4c8a81d3df416eed7da2793f31"},"schema_version":"1.0"},"canonical_sha256":"1e3ff6881ebcf83d02c890932c858adcb1c17cc70eef74d3d414e924931c545b","source":{"kind":"arxiv","id":"1304.5518","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1304.5518","created_at":"2026-05-18T03:18:28Z"},{"alias_kind":"arxiv_version","alias_value":"1304.5518v2","created_at":"2026-05-18T03:18:28Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1304.5518","created_at":"2026-05-18T03:18:28Z"},{"alias_kind":"pith_short_12","alias_value":"DY77NCA6XT4D","created_at":"2026-05-18T12:27:43Z"},{"alias_kind":"pith_short_16","alias_value":"DY77NCA6XT4D2AWI","created_at":"2026-05-18T12:27:43Z"},{"alias_kind":"pith_short_8","alias_value":"DY77NCA6","created_at":"2026-05-18T12:27:43Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:DY77NCA6XT4D2AWISCJSZBMK3S","target":"record","payload":{"canonical_record":{"source":{"id":"1304.5518","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2013-04-19T19:50:04Z","cross_cats_sorted":[],"title_canon_sha256":"01c50a0f206564edf705c40eb99d945e341d6f1e610990764160ee256efd988a","abstract_canon_sha256":"ada76a702eca2b9ffd9e10bb559c630012043f4c8a81d3df416eed7da2793f31"},"schema_version":"1.0"},"canonical_sha256":"1e3ff6881ebcf83d02c890932c858adcb1c17cc70eef74d3d414e924931c545b","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:18:28.919333Z","signature_b64":"aDH2/z1Q8AokAYoeGKun7Qi+b2L1Vy6BYYPtZJ48YWXLIMDNxOxI4IBhagY9SMueVBXpt9nxOfc+oXTrdUevAw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"1e3ff6881ebcf83d02c890932c858adcb1c17cc70eef74d3d414e924931c545b","last_reissued_at":"2026-05-18T03:18:28.918741Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:18:28.918741Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1304.5518","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:18:28Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Q2PTnXFgpW2qcI8Rb2u33rLHwzFzBIr8Xskq45id66PvNQsXvz+gTc4HFmMeFlqpEP23eLHnTaKR30PNvwOqDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T11:28:59.628655Z"},"content_sha256":"33abfd75f88443e328df1728c03b26da765af07f4e71d3d38164df52d74abc65","schema_version":"1.0","event_id":"sha256:33abfd75f88443e328df1728c03b26da765af07f4e71d3d38164df52d74abc65"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:DY77NCA6XT4D2AWISCJSZBMK3S","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Upper and Lower Bounds for Weak Backdoor Set Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.DS","authors_text":"Neeldhara Misra, Sebastian Ordyniak, Stefan Szeider, Venkatesh Raman","submitted_at":"2013-04-19T19:50:04Z","abstract_excerpt":"We obtain upper and lower bounds for running times of exponential time algorithms for the detection of weak backdoor sets of 3CNF formulas, considering various base classes. These results include (omitting polynomial factors), (i) a 4.54^k algorithm to detect whether there is a weak backdoor set of at most k variables into the class of Horn formulas; (ii) a 2.27^k algorithm to detect whether there is a weak backdoor set of at most k variables into the class of Krom formulas. These bounds improve an earlier known bound of 6^k. We also prove a 2^k lower bound for these problems, subject to the S"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1304.5518","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:18:28Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"KAFdx0vw9dp0UJ1cAwvvV0POo3p3f/2pdsUHuAb1+QQUW+drNepuJf7ra/8kshqpHARLmhQOs5RcLOp7Q5vBDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T11:28:59.629372Z"},"content_sha256":"7b77be1679c26e8c00f410e18234f7400e3ce1b3fb805d505777d77293be93bf","schema_version":"1.0","event_id":"sha256:7b77be1679c26e8c00f410e18234f7400e3ce1b3fb805d505777d77293be93bf"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/DY77NCA6XT4D2AWISCJSZBMK3S/bundle.json","state_url":"https://pith.science/pith/DY77NCA6XT4D2AWISCJSZBMK3S/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/DY77NCA6XT4D2AWISCJSZBMK3S/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T11:28:59Z","links":{"resolver":"https://pith.science/pith/DY77NCA6XT4D2AWISCJSZBMK3S","bundle":"https://pith.science/pith/DY77NCA6XT4D2AWISCJSZBMK3S/bundle.json","state":"https://pith.science/pith/DY77NCA6XT4D2AWISCJSZBMK3S/state.json","well_known_bundle":"https://pith.science/.well-known/pith/DY77NCA6XT4D2AWISCJSZBMK3S/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:DY77NCA6XT4D2AWISCJSZBMK3S","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"ada76a702eca2b9ffd9e10bb559c630012043f4c8a81d3df416eed7da2793f31","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2013-04-19T19:50:04Z","title_canon_sha256":"01c50a0f206564edf705c40eb99d945e341d6f1e610990764160ee256efd988a"},"schema_version":"1.0","source":{"id":"1304.5518","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1304.5518","created_at":"2026-05-18T03:18:28Z"},{"alias_kind":"arxiv_version","alias_value":"1304.5518v2","created_at":"2026-05-18T03:18:28Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1304.5518","created_at":"2026-05-18T03:18:28Z"},{"alias_kind":"pith_short_12","alias_value":"DY77NCA6XT4D","created_at":"2026-05-18T12:27:43Z"},{"alias_kind":"pith_short_16","alias_value":"DY77NCA6XT4D2AWI","created_at":"2026-05-18T12:27:43Z"},{"alias_kind":"pith_short_8","alias_value":"DY77NCA6","created_at":"2026-05-18T12:27:43Z"}],"graph_snapshots":[{"event_id":"sha256:7b77be1679c26e8c00f410e18234f7400e3ce1b3fb805d505777d77293be93bf","target":"graph","created_at":"2026-05-18T03:18:28Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We obtain upper and lower bounds for running times of exponential time algorithms for the detection of weak backdoor sets of 3CNF formulas, considering various base classes. These results include (omitting polynomial factors), (i) a 4.54^k algorithm to detect whether there is a weak backdoor set of at most k variables into the class of Horn formulas; (ii) a 2.27^k algorithm to detect whether there is a weak backdoor set of at most k variables into the class of Krom formulas. These bounds improve an earlier known bound of 6^k. We also prove a 2^k lower bound for these problems, subject to the S","authors_text":"Neeldhara Misra, Sebastian Ordyniak, Stefan Szeider, Venkatesh Raman","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2013-04-19T19:50:04Z","title":"Upper and Lower Bounds for Weak Backdoor Set Detection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1304.5518","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:33abfd75f88443e328df1728c03b26da765af07f4e71d3d38164df52d74abc65","target":"record","created_at":"2026-05-18T03:18:28Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"ada76a702eca2b9ffd9e10bb559c630012043f4c8a81d3df416eed7da2793f31","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DS","submitted_at":"2013-04-19T19:50:04Z","title_canon_sha256":"01c50a0f206564edf705c40eb99d945e341d6f1e610990764160ee256efd988a"},"schema_version":"1.0","source":{"id":"1304.5518","kind":"arxiv","version":2}},"canonical_sha256":"1e3ff6881ebcf83d02c890932c858adcb1c17cc70eef74d3d414e924931c545b","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"1e3ff6881ebcf83d02c890932c858adcb1c17cc70eef74d3d414e924931c545b","first_computed_at":"2026-05-18T03:18:28.918741Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:18:28.918741Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"aDH2/z1Q8AokAYoeGKun7Qi+b2L1Vy6BYYPtZJ48YWXLIMDNxOxI4IBhagY9SMueVBXpt9nxOfc+oXTrdUevAw==","signature_status":"signed_v1","signed_at":"2026-05-18T03:18:28.919333Z","signed_message":"canonical_sha256_bytes"},"source_id":"1304.5518","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:33abfd75f88443e328df1728c03b26da765af07f4e71d3d38164df52d74abc65","sha256:7b77be1679c26e8c00f410e18234f7400e3ce1b3fb805d505777d77293be93bf"],"state_sha256":"7b78c5f35f97eb2ca391d136dd7f6d889d3cc8b71d8d98fb4eff5913c1d5d314"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Suo7J1yMiKwTovxuGXVyUYkGEcunEenk9A5617QaOmax/3CtvKy1orhWvWKdLt1aer0ojkU+K3amdNuG/FbTDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T11:28:59.633368Z","bundle_sha256":"784f948548da6fe3dd14695510de87bb9b341ccfa87267e537709035dcf57afb"}}