Pith Number
pith:F5UMRACA
pith:2015:F5UMRACA6N65JAI4YEWL5AX2P4
not attested
not anchored
not stored
refs pending
Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-Hoc Networks
arxiv:1510.01866 v1 · 2015-10-07 · cs.NI · cs.IT · math.IT
Add to your LaTeX paper
\usepackage{pith}
\pithnumber{F5UMRACA6N65JAI4YEWL5AX2P4}
Prints a linked badge after your title and injects PDF metadata. Compiles on arXiv. Learn more
Record completeness
1
Bitcoin timestamp
2
Internet Archive
3
Author claim
· sign in to
claim
4
Citations
5
Replications
✓
Portable graph bundle live · download bundle · merged
state
The bundle contains the canonical record plus signed events. A mirror can host it anywhere and recompute the same
current state with the deterministic merge algorithm.
Receipt and verification
| First computed | 2026-05-18T01:30:50.165782Z |
|---|---|
| Builder | pith-number-builder-2026-05-17-v1 |
| Signature | Pith Ed25519
(pith-v1-2026-05) · public key |
| Schema | pith-number/v1.0 |
Canonical hash
2f68c88040f37dd4811cc12cbe82fa7f3cb50caf1492ca9620f41e114447f67a
Aliases
· · · · ·Agent API
Verify this Pith Number yourself
curl -sH 'Accept: application/ld+json' https://pith.science/pith/F5UMRACA6N65JAI4YEWL5AX2P4 \
| jq -c '.canonical_record' \
| python3 -c "import sys,json,hashlib; b=json.dumps(json.loads(sys.stdin.read()), sort_keys=True, separators=(',',':'), ensure_ascii=False).encode(); print(hashlib.sha256(b).hexdigest())"
# expect: 2f68c88040f37dd4811cc12cbe82fa7f3cb50caf1492ca9620f41e114447f67a
Canonical record JSON
{
"metadata": {
"abstract_canon_sha256": "65d7494c1ceef0c687eb203842bcf870c87da1fb567c7acfcdf63c44b0bbf6a3",
"cross_cats_sorted": [
"cs.IT",
"math.IT"
],
"license": "http://arxiv.org/licenses/nonexclusive-distrib/1.0/",
"primary_cat": "cs.NI",
"submitted_at": "2015-10-07T09:12:10Z",
"title_canon_sha256": "7dff4eb2149197c77bc6143652302d6aa41df607a79d88774378a7f90f1b7ea4"
},
"schema_version": "1.0",
"source": {
"id": "1510.01866",
"kind": "arxiv",
"version": 1
}
}