{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:EEAOK64BAYPV724UIJYDNOVPQQ","short_pith_number":"pith:EEAOK64B","canonical_record":{"source":{"id":"1606.03493","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2016-06-10T22:23:27Z","cross_cats_sorted":[],"title_canon_sha256":"417783189b39f9f1d33528b9de2c112e0eee99aeeddf55ef1a488d9e9b234aa0","abstract_canon_sha256":"32d0899d5fc54e83f7e9a2f7bf28ca3346f6539ddd149f7d12d7938462cd68e0"},"schema_version":"1.0"},"canonical_sha256":"2100e57b81061f5feb94427036baaf84391c0eb97036d3cc0ac5bfa726af2acc","source":{"kind":"arxiv","id":"1606.03493","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1606.03493","created_at":"2026-05-18T00:47:58Z"},{"alias_kind":"arxiv_version","alias_value":"1606.03493v2","created_at":"2026-05-18T00:47:58Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1606.03493","created_at":"2026-05-18T00:47:58Z"},{"alias_kind":"pith_short_12","alias_value":"EEAOK64BAYPV","created_at":"2026-05-18T12:30:12Z"},{"alias_kind":"pith_short_16","alias_value":"EEAOK64BAYPV724U","created_at":"2026-05-18T12:30:12Z"},{"alias_kind":"pith_short_8","alias_value":"EEAOK64B","created_at":"2026-05-18T12:30:12Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:EEAOK64BAYPV724UIJYDNOVPQQ","target":"record","payload":{"canonical_record":{"source":{"id":"1606.03493","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2016-06-10T22:23:27Z","cross_cats_sorted":[],"title_canon_sha256":"417783189b39f9f1d33528b9de2c112e0eee99aeeddf55ef1a488d9e9b234aa0","abstract_canon_sha256":"32d0899d5fc54e83f7e9a2f7bf28ca3346f6539ddd149f7d12d7938462cd68e0"},"schema_version":"1.0"},"canonical_sha256":"2100e57b81061f5feb94427036baaf84391c0eb97036d3cc0ac5bfa726af2acc","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:47:58.973352Z","signature_b64":"EsHu3caqwfzrZifnyrEAd4L7zYOxffgxhnW+C/3qj8w6uTiOMfYr8UR7YJuj9hDKt65ma0NQZt7KOFTo1LkDDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"2100e57b81061f5feb94427036baaf84391c0eb97036d3cc0ac5bfa726af2acc","last_reissued_at":"2026-05-18T00:47:58.972803Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:47:58.972803Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1606.03493","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:47:58Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"53AwBdBjlqEyJ1e5xDM9+EBLoDBmKv9b0L6gjMUExvJtc1snt9B/eqyumYbU0gcwzjcyjfEFzeR+xdecp4D3Bw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T23:32:28.936899Z"},"content_sha256":"2df67e61faa262f33956a697c1b7b06a7e3f72b3eab74257effbaf0154f85a8f","schema_version":"1.0","event_id":"sha256:2df67e61faa262f33956a697c1b7b06a7e3f72b3eab74257effbaf0154f85a8f"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:EEAOK64BAYPV724UIJYDNOVPQQ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Cooperative Data Offload in Opportunistic Networks: From Mobile Devices to Infrastructure","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Thomas la Porta, Xiao Sun, Zongqing Lu","submitted_at":"2016-06-10T22:23:27Z","abstract_excerpt":"Opportunistic mobile networks consisting of intermittently connected mobile devices have been exploited for various applications, such as computational offloading and mitigating cellular traffic load. In contrast to existing work, in this paper, we focus on cooperatively offloading data among mobile devices to maximally improve the probability of data delivery from a mobile device to intermittently connected infrastructure within a given time constraint, which is referred to as the \\textit{cooperative offloading} problem. Unfortunately, the estimation of data delivery probability over an oppor"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1606.03493","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:47:58Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"S4f8cw1+CkSjDSoJ1/fhImku9lypxBt7PoFZ//aZxHR8xFvxT4kAG+OIczhuVt6XOjhelBzSiSgE5Gzt6wNcCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T23:32:28.937572Z"},"content_sha256":"e6f358e43ecbf5e1a7db41d1fd0c5253e4a7338c05563a7c88ec862c83cd5664","schema_version":"1.0","event_id":"sha256:e6f358e43ecbf5e1a7db41d1fd0c5253e4a7338c05563a7c88ec862c83cd5664"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/EEAOK64BAYPV724UIJYDNOVPQQ/bundle.json","state_url":"https://pith.science/pith/EEAOK64BAYPV724UIJYDNOVPQQ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/EEAOK64BAYPV724UIJYDNOVPQQ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T23:32:28Z","links":{"resolver":"https://pith.science/pith/EEAOK64BAYPV724UIJYDNOVPQQ","bundle":"https://pith.science/pith/EEAOK64BAYPV724UIJYDNOVPQQ/bundle.json","state":"https://pith.science/pith/EEAOK64BAYPV724UIJYDNOVPQQ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/EEAOK64BAYPV724UIJYDNOVPQQ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:EEAOK64BAYPV724UIJYDNOVPQQ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"32d0899d5fc54e83f7e9a2f7bf28ca3346f6539ddd149f7d12d7938462cd68e0","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2016-06-10T22:23:27Z","title_canon_sha256":"417783189b39f9f1d33528b9de2c112e0eee99aeeddf55ef1a488d9e9b234aa0"},"schema_version":"1.0","source":{"id":"1606.03493","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1606.03493","created_at":"2026-05-18T00:47:58Z"},{"alias_kind":"arxiv_version","alias_value":"1606.03493v2","created_at":"2026-05-18T00:47:58Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1606.03493","created_at":"2026-05-18T00:47:58Z"},{"alias_kind":"pith_short_12","alias_value":"EEAOK64BAYPV","created_at":"2026-05-18T12:30:12Z"},{"alias_kind":"pith_short_16","alias_value":"EEAOK64BAYPV724U","created_at":"2026-05-18T12:30:12Z"},{"alias_kind":"pith_short_8","alias_value":"EEAOK64B","created_at":"2026-05-18T12:30:12Z"}],"graph_snapshots":[{"event_id":"sha256:e6f358e43ecbf5e1a7db41d1fd0c5253e4a7338c05563a7c88ec862c83cd5664","target":"graph","created_at":"2026-05-18T00:47:58Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Opportunistic mobile networks consisting of intermittently connected mobile devices have been exploited for various applications, such as computational offloading and mitigating cellular traffic load. In contrast to existing work, in this paper, we focus on cooperatively offloading data among mobile devices to maximally improve the probability of data delivery from a mobile device to intermittently connected infrastructure within a given time constraint, which is referred to as the \\textit{cooperative offloading} problem. Unfortunately, the estimation of data delivery probability over an oppor","authors_text":"Thomas la Porta, Xiao Sun, Zongqing Lu","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2016-06-10T22:23:27Z","title":"Cooperative Data Offload in Opportunistic Networks: From Mobile Devices to Infrastructure"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1606.03493","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:2df67e61faa262f33956a697c1b7b06a7e3f72b3eab74257effbaf0154f85a8f","target":"record","created_at":"2026-05-18T00:47:58Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"32d0899d5fc54e83f7e9a2f7bf28ca3346f6539ddd149f7d12d7938462cd68e0","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2016-06-10T22:23:27Z","title_canon_sha256":"417783189b39f9f1d33528b9de2c112e0eee99aeeddf55ef1a488d9e9b234aa0"},"schema_version":"1.0","source":{"id":"1606.03493","kind":"arxiv","version":2}},"canonical_sha256":"2100e57b81061f5feb94427036baaf84391c0eb97036d3cc0ac5bfa726af2acc","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"2100e57b81061f5feb94427036baaf84391c0eb97036d3cc0ac5bfa726af2acc","first_computed_at":"2026-05-18T00:47:58.972803Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:47:58.972803Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"EsHu3caqwfzrZifnyrEAd4L7zYOxffgxhnW+C/3qj8w6uTiOMfYr8UR7YJuj9hDKt65ma0NQZt7KOFTo1LkDDg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:47:58.973352Z","signed_message":"canonical_sha256_bytes"},"source_id":"1606.03493","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:2df67e61faa262f33956a697c1b7b06a7e3f72b3eab74257effbaf0154f85a8f","sha256:e6f358e43ecbf5e1a7db41d1fd0c5253e4a7338c05563a7c88ec862c83cd5664"],"state_sha256":"daa88c2b9164d485c17608a4f1b67b22a785438ef6b83001886163fd3cc5cf6a"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"S6vYHZuN8RQ/wM1lVUzDaAyW3EI3hE1jwL6sZHK897vOtREqLwUD0kjr2jYWao1GS4GtaQw57f+2TUoKGJCqCQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T23:32:28.941144Z","bundle_sha256":"421883e20c91498d0c1e7cdbb5e3b759690eaf3c93d2cf39e19b55061e685c58"}}