{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:GMC3WZ3T3OZ4DXZLOZRBLPEVC3","short_pith_number":"pith:GMC3WZ3T","canonical_record":{"source":{"id":"1812.03644","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ME","submitted_at":"2018-12-10T06:37:32Z","cross_cats_sorted":[],"title_canon_sha256":"757ba71637f9955aa34f533d50a22f382193559268e6950530ab3830abdbb6af","abstract_canon_sha256":"aa66e8b84621d7608af3880dc21ebb59d7c541b6b0f0919d5a453f6f1fc568ab"},"schema_version":"1.0"},"canonical_sha256":"3305bb6773dbb3c1df2b766215bc9516ef9cc6d1c8a6d1edfb45dd0b4d67a396","source":{"kind":"arxiv","id":"1812.03644","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1812.03644","created_at":"2026-05-17T23:58:44Z"},{"alias_kind":"arxiv_version","alias_value":"1812.03644v1","created_at":"2026-05-17T23:58:44Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1812.03644","created_at":"2026-05-17T23:58:44Z"},{"alias_kind":"pith_short_12","alias_value":"GMC3WZ3T3OZ4","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_16","alias_value":"GMC3WZ3T3OZ4DXZL","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_8","alias_value":"GMC3WZ3T","created_at":"2026-05-18T12:32:25Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:GMC3WZ3T3OZ4DXZLOZRBLPEVC3","target":"record","payload":{"canonical_record":{"source":{"id":"1812.03644","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ME","submitted_at":"2018-12-10T06:37:32Z","cross_cats_sorted":[],"title_canon_sha256":"757ba71637f9955aa34f533d50a22f382193559268e6950530ab3830abdbb6af","abstract_canon_sha256":"aa66e8b84621d7608af3880dc21ebb59d7c541b6b0f0919d5a453f6f1fc568ab"},"schema_version":"1.0"},"canonical_sha256":"3305bb6773dbb3c1df2b766215bc9516ef9cc6d1c8a6d1edfb45dd0b4d67a396","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:58:44.246958Z","signature_b64":"wE6Gvd6acsE29uO02pLJw1/y8eANjuTcbrvNMcS4TyCwBrUFH7ItRq0j361k36LC54/ru8oaA9yBaLwJCun+CA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3305bb6773dbb3c1df2b766215bc9516ef9cc6d1c8a6d1edfb45dd0b4d67a396","last_reissued_at":"2026-05-17T23:58:44.246420Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:58:44.246420Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1812.03644","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:58:44Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"wRtD+Td4ITu7KtgTZIVpHKRMWy/j7MwUvbsGccSrxxAHoBl/eEdAhrq/lX5Dlf9vSbBhWW4HPYurvh9thf+MDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T01:53:10.585765Z"},"content_sha256":"fe8afc54b019e3e68eb89045f55331a434169330c90572b2da9f884a0324c701","schema_version":"1.0","event_id":"sha256:fe8afc54b019e3e68eb89045f55331a434169330c90572b2da9f884a0324c701"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:GMC3WZ3T3OZ4DXZLOZRBLPEVC3","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Post-Selection Inference for Changepoint Detection Algorithms with Application to Copy Number Variation Data","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"stat.ME","authors_text":"Kevin Lin, Max G'Sell, Ryan J. Tibshirani, Sangwon Hyun","submitted_at":"2018-12-10T06:37:32Z","abstract_excerpt":"Changepoint detection methods are used in many areas of science and engineering, e.g., in the analysis of copy number variation data, to detect abnormalities in copy numbers along the genome. Despite the broad array of available tools, methodology for quantifying our uncertainty in the strength (or presence) of given changepoints, post-detection, are lacking. Post-selection inference offers a framework to fill this gap, but the most straightforward application of these methods results in low-powered tests and leaves open several important questions about practical usability. In this work, we c"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1812.03644","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:58:44Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3IGxbIdj6m37VHQPQn2tgAiJgCL24z1EXqJ5F+fgIKbNB8j7Mb9CA5Bd8jgvQWxbFnxr7g59L+C2eeCcAYdiAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T01:53:10.586113Z"},"content_sha256":"83543b712ed9523a26f3b1c9f5a004eb07d7753db7d4f8f6ceb75de71c3d148e","schema_version":"1.0","event_id":"sha256:83543b712ed9523a26f3b1c9f5a004eb07d7753db7d4f8f6ceb75de71c3d148e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/GMC3WZ3T3OZ4DXZLOZRBLPEVC3/bundle.json","state_url":"https://pith.science/pith/GMC3WZ3T3OZ4DXZLOZRBLPEVC3/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/GMC3WZ3T3OZ4DXZLOZRBLPEVC3/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T01:53:10Z","links":{"resolver":"https://pith.science/pith/GMC3WZ3T3OZ4DXZLOZRBLPEVC3","bundle":"https://pith.science/pith/GMC3WZ3T3OZ4DXZLOZRBLPEVC3/bundle.json","state":"https://pith.science/pith/GMC3WZ3T3OZ4DXZLOZRBLPEVC3/state.json","well_known_bundle":"https://pith.science/.well-known/pith/GMC3WZ3T3OZ4DXZLOZRBLPEVC3/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:GMC3WZ3T3OZ4DXZLOZRBLPEVC3","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"aa66e8b84621d7608af3880dc21ebb59d7c541b6b0f0919d5a453f6f1fc568ab","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ME","submitted_at":"2018-12-10T06:37:32Z","title_canon_sha256":"757ba71637f9955aa34f533d50a22f382193559268e6950530ab3830abdbb6af"},"schema_version":"1.0","source":{"id":"1812.03644","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1812.03644","created_at":"2026-05-17T23:58:44Z"},{"alias_kind":"arxiv_version","alias_value":"1812.03644v1","created_at":"2026-05-17T23:58:44Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1812.03644","created_at":"2026-05-17T23:58:44Z"},{"alias_kind":"pith_short_12","alias_value":"GMC3WZ3T3OZ4","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_16","alias_value":"GMC3WZ3T3OZ4DXZL","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_8","alias_value":"GMC3WZ3T","created_at":"2026-05-18T12:32:25Z"}],"graph_snapshots":[{"event_id":"sha256:83543b712ed9523a26f3b1c9f5a004eb07d7753db7d4f8f6ceb75de71c3d148e","target":"graph","created_at":"2026-05-17T23:58:44Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Changepoint detection methods are used in many areas of science and engineering, e.g., in the analysis of copy number variation data, to detect abnormalities in copy numbers along the genome. Despite the broad array of available tools, methodology for quantifying our uncertainty in the strength (or presence) of given changepoints, post-detection, are lacking. Post-selection inference offers a framework to fill this gap, but the most straightforward application of these methods results in low-powered tests and leaves open several important questions about practical usability. In this work, we c","authors_text":"Kevin Lin, Max G'Sell, Ryan J. Tibshirani, Sangwon Hyun","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ME","submitted_at":"2018-12-10T06:37:32Z","title":"Post-Selection Inference for Changepoint Detection Algorithms with Application to Copy Number Variation Data"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1812.03644","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:fe8afc54b019e3e68eb89045f55331a434169330c90572b2da9f884a0324c701","target":"record","created_at":"2026-05-17T23:58:44Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"aa66e8b84621d7608af3880dc21ebb59d7c541b6b0f0919d5a453f6f1fc568ab","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ME","submitted_at":"2018-12-10T06:37:32Z","title_canon_sha256":"757ba71637f9955aa34f533d50a22f382193559268e6950530ab3830abdbb6af"},"schema_version":"1.0","source":{"id":"1812.03644","kind":"arxiv","version":1}},"canonical_sha256":"3305bb6773dbb3c1df2b766215bc9516ef9cc6d1c8a6d1edfb45dd0b4d67a396","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"3305bb6773dbb3c1df2b766215bc9516ef9cc6d1c8a6d1edfb45dd0b4d67a396","first_computed_at":"2026-05-17T23:58:44.246420Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:58:44.246420Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"wE6Gvd6acsE29uO02pLJw1/y8eANjuTcbrvNMcS4TyCwBrUFH7ItRq0j361k36LC54/ru8oaA9yBaLwJCun+CA==","signature_status":"signed_v1","signed_at":"2026-05-17T23:58:44.246958Z","signed_message":"canonical_sha256_bytes"},"source_id":"1812.03644","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:fe8afc54b019e3e68eb89045f55331a434169330c90572b2da9f884a0324c701","sha256:83543b712ed9523a26f3b1c9f5a004eb07d7753db7d4f8f6ceb75de71c3d148e"],"state_sha256":"02f6fe63f6a830deaac49d3deb589603fc8fe5a068db9c990a7b5cd5bbee16e9"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"qzcPa+tDXrYyykbKQ9yrarrn7jH4nD8acOzrO7jz6TN473COlq0AVfnmb2aqDe2K12AUt+FySGyoPZAnAuQiAQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T01:53:10.587287Z","bundle_sha256":"45a830eff643687cca66b2ea01eeefa79f6cbc4fc11d79b5f266b5748e1bb902"}}