{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2012:EZHA6PZNGA6P6OM6VBX6IMHAQ2","short_pith_number":"pith:EZHA6PZN","canonical_record":{"source":{"id":"1212.4444","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2012-12-17T03:42:30Z","cross_cats_sorted":["cs.DC","cs.NI","cs.SE"],"title_canon_sha256":"5c9958f93d03acb47dd300308693ae2b50e0f34a9c9529ce73da967417716389","abstract_canon_sha256":"ce9c7363908d61c6340869156847f9b843427cda81e0ca771d5800b5a28b1bef"},"schema_version":"1.0"},"canonical_sha256":"264e0f3f2d303cff399ea86fe430e086be3d62111eae3dee9e0a5c921faaf044","source":{"kind":"arxiv","id":"1212.4444","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1212.4444","created_at":"2026-05-18T03:38:12Z"},{"alias_kind":"arxiv_version","alias_value":"1212.4444v1","created_at":"2026-05-18T03:38:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1212.4444","created_at":"2026-05-18T03:38:12Z"},{"alias_kind":"pith_short_12","alias_value":"EZHA6PZNGA6P","created_at":"2026-05-18T12:27:04Z"},{"alias_kind":"pith_short_16","alias_value":"EZHA6PZNGA6P6OM6","created_at":"2026-05-18T12:27:04Z"},{"alias_kind":"pith_short_8","alias_value":"EZHA6PZN","created_at":"2026-05-18T12:27:04Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2012:EZHA6PZNGA6P6OM6VBX6IMHAQ2","target":"record","payload":{"canonical_record":{"source":{"id":"1212.4444","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2012-12-17T03:42:30Z","cross_cats_sorted":["cs.DC","cs.NI","cs.SE"],"title_canon_sha256":"5c9958f93d03acb47dd300308693ae2b50e0f34a9c9529ce73da967417716389","abstract_canon_sha256":"ce9c7363908d61c6340869156847f9b843427cda81e0ca771d5800b5a28b1bef"},"schema_version":"1.0"},"canonical_sha256":"264e0f3f2d303cff399ea86fe430e086be3d62111eae3dee9e0a5c921faaf044","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:38:12.957985Z","signature_b64":"E4/7sF2ZAaTgydUBb8wcdmiDTPl0w6cx9doTqIZn47x1lMWeMcMvQjnoDZLPLhqMZUcpEkBeylGn/5KlYrqTBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"264e0f3f2d303cff399ea86fe430e086be3d62111eae3dee9e0a5c921faaf044","last_reissued_at":"2026-05-18T03:38:12.957355Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:38:12.957355Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1212.4444","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:38:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pADH2KiyGCFe+6OikK/ibpGBW50f36a02iTT85y4hc0nxUi3MMXepf5uK/MeWRzWkytyOjELBfj+N52qlqvUCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T17:34:53.221364Z"},"content_sha256":"4069b1f46dc9f5d50b1c1e9dfb4adb570c3e244474ca1fdbf1efdddbef5c72aa","schema_version":"1.0","event_id":"sha256:4069b1f46dc9f5d50b1c1e9dfb4adb570c3e244474ca1fdbf1efdddbef5c72aa"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2012:EZHA6PZNGA6P6OM6VBX6IMHAQ2","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Enforcing Architectural Styles in Presence of Unexpected Distributed Reconfigurations","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.DC","cs.NI","cs.SE"],"primary_cat":"cs.LO","authors_text":"Emilio Tuosto, Kyriakos Poyias","submitted_at":"2012-12-17T03:42:30Z","abstract_excerpt":"Architectural Design Rewriting (ADR, for short) is a rule-based formal framework for modelling the evolution of architectures of distributed systems. Rules allow ADR graphs to be refined. After equipping ADR with a simple logic, we equip rules with pre- and post-conditions; the former constraints the applicability of the rules while the later specifies properties of the resulting graphs. We give an algorithm to compute the weakest pre-condition out of a rule and its post-condition. On top of this algorithm, we design a simple methodology that allows us to select which rules can be applied at t"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1212.4444","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:38:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"x+9EA+k68toNkmeNUMKKIYXlt1wGE/9Dy6IHYERVu7jhyNK00cKtuYngZ3m6+We2Qz5H++3E0p1B693pC5QSAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T17:34:53.221781Z"},"content_sha256":"c79df73bae0fcd47e533f66158190709dae36dc11f2b5e15be4d989413fd6448","schema_version":"1.0","event_id":"sha256:c79df73bae0fcd47e533f66158190709dae36dc11f2b5e15be4d989413fd6448"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/EZHA6PZNGA6P6OM6VBX6IMHAQ2/bundle.json","state_url":"https://pith.science/pith/EZHA6PZNGA6P6OM6VBX6IMHAQ2/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/EZHA6PZNGA6P6OM6VBX6IMHAQ2/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T17:34:53Z","links":{"resolver":"https://pith.science/pith/EZHA6PZNGA6P6OM6VBX6IMHAQ2","bundle":"https://pith.science/pith/EZHA6PZNGA6P6OM6VBX6IMHAQ2/bundle.json","state":"https://pith.science/pith/EZHA6PZNGA6P6OM6VBX6IMHAQ2/state.json","well_known_bundle":"https://pith.science/.well-known/pith/EZHA6PZNGA6P6OM6VBX6IMHAQ2/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2012:EZHA6PZNGA6P6OM6VBX6IMHAQ2","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"ce9c7363908d61c6340869156847f9b843427cda81e0ca771d5800b5a28b1bef","cross_cats_sorted":["cs.DC","cs.NI","cs.SE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2012-12-17T03:42:30Z","title_canon_sha256":"5c9958f93d03acb47dd300308693ae2b50e0f34a9c9529ce73da967417716389"},"schema_version":"1.0","source":{"id":"1212.4444","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1212.4444","created_at":"2026-05-18T03:38:12Z"},{"alias_kind":"arxiv_version","alias_value":"1212.4444v1","created_at":"2026-05-18T03:38:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1212.4444","created_at":"2026-05-18T03:38:12Z"},{"alias_kind":"pith_short_12","alias_value":"EZHA6PZNGA6P","created_at":"2026-05-18T12:27:04Z"},{"alias_kind":"pith_short_16","alias_value":"EZHA6PZNGA6P6OM6","created_at":"2026-05-18T12:27:04Z"},{"alias_kind":"pith_short_8","alias_value":"EZHA6PZN","created_at":"2026-05-18T12:27:04Z"}],"graph_snapshots":[{"event_id":"sha256:c79df73bae0fcd47e533f66158190709dae36dc11f2b5e15be4d989413fd6448","target":"graph","created_at":"2026-05-18T03:38:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Architectural Design Rewriting (ADR, for short) is a rule-based formal framework for modelling the evolution of architectures of distributed systems. Rules allow ADR graphs to be refined. After equipping ADR with a simple logic, we equip rules with pre- and post-conditions; the former constraints the applicability of the rules while the later specifies properties of the resulting graphs. We give an algorithm to compute the weakest pre-condition out of a rule and its post-condition. On top of this algorithm, we design a simple methodology that allows us to select which rules can be applied at t","authors_text":"Emilio Tuosto, Kyriakos Poyias","cross_cats":["cs.DC","cs.NI","cs.SE"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2012-12-17T03:42:30Z","title":"Enforcing Architectural Styles in Presence of Unexpected Distributed Reconfigurations"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1212.4444","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4069b1f46dc9f5d50b1c1e9dfb4adb570c3e244474ca1fdbf1efdddbef5c72aa","target":"record","created_at":"2026-05-18T03:38:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"ce9c7363908d61c6340869156847f9b843427cda81e0ca771d5800b5a28b1bef","cross_cats_sorted":["cs.DC","cs.NI","cs.SE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2012-12-17T03:42:30Z","title_canon_sha256":"5c9958f93d03acb47dd300308693ae2b50e0f34a9c9529ce73da967417716389"},"schema_version":"1.0","source":{"id":"1212.4444","kind":"arxiv","version":1}},"canonical_sha256":"264e0f3f2d303cff399ea86fe430e086be3d62111eae3dee9e0a5c921faaf044","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"264e0f3f2d303cff399ea86fe430e086be3d62111eae3dee9e0a5c921faaf044","first_computed_at":"2026-05-18T03:38:12.957355Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:38:12.957355Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"E4/7sF2ZAaTgydUBb8wcdmiDTPl0w6cx9doTqIZn47x1lMWeMcMvQjnoDZLPLhqMZUcpEkBeylGn/5KlYrqTBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T03:38:12.957985Z","signed_message":"canonical_sha256_bytes"},"source_id":"1212.4444","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4069b1f46dc9f5d50b1c1e9dfb4adb570c3e244474ca1fdbf1efdddbef5c72aa","sha256:c79df73bae0fcd47e533f66158190709dae36dc11f2b5e15be4d989413fd6448"],"state_sha256":"7a055c62b9d1a224d38cf6c86d314ae78fad1d47232232397c16b229a6058900"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"mxggo0WZXHiKelkYRZManPsOm/3mTBvPdxSwGIDA+HaBl5Z6bX9YUUE0Zjv3WT0JISDyAYBTNe2e7aA7NEheAQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T17:34:53.224090Z","bundle_sha256":"1c6598938f702c5fec0b3218356a26e2e4fea67ecff99d4a0ac269d354de93c5"}}