{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:HTOVCBPGIEPZJ5EMSA4NL5KDID","short_pith_number":"pith:HTOVCBPG","canonical_record":{"source":{"id":"1803.06123","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-03-16T09:37:25Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"154ff42515e7b4be4be0e5ecba2049cfbf26b20e008046a7ccc83edac05d080f","abstract_canon_sha256":"9b15176a45206effc285c91982b9a6cb166d45eae4e7ae09faa427e9fc158a1c"},"schema_version":"1.0"},"canonical_sha256":"3cdd5105e6411f94f48c9038d5f54340ebe6c45bb35d5c83bf34a7482e821f31","source":{"kind":"arxiv","id":"1803.06123","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.06123","created_at":"2026-05-18T00:20:50Z"},{"alias_kind":"arxiv_version","alias_value":"1803.06123v1","created_at":"2026-05-18T00:20:50Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.06123","created_at":"2026-05-18T00:20:50Z"},{"alias_kind":"pith_short_12","alias_value":"HTOVCBPGIEPZ","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_16","alias_value":"HTOVCBPGIEPZJ5EM","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_8","alias_value":"HTOVCBPG","created_at":"2026-05-18T12:32:28Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:HTOVCBPGIEPZJ5EMSA4NL5KDID","target":"record","payload":{"canonical_record":{"source":{"id":"1803.06123","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-03-16T09:37:25Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"154ff42515e7b4be4be0e5ecba2049cfbf26b20e008046a7ccc83edac05d080f","abstract_canon_sha256":"9b15176a45206effc285c91982b9a6cb166d45eae4e7ae09faa427e9fc158a1c"},"schema_version":"1.0"},"canonical_sha256":"3cdd5105e6411f94f48c9038d5f54340ebe6c45bb35d5c83bf34a7482e821f31","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:20:50.535238Z","signature_b64":"6wZORyM3Y5dLmv4Ug48Z2ShOaEd1gxs9mnrXDYMPF8Oqw1i3wKi0eTmBCrJ6J2uH/0NVhW6kompvqqcoEfcIDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3cdd5105e6411f94f48c9038d5f54340ebe6c45bb35d5c83bf34a7482e821f31","last_reissued_at":"2026-05-18T00:20:50.534724Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:20:50.534724Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1803.06123","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:20:50Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"dYHe7YAOIb1tOb9Hz5D6iSUT5cIebihsbHJVqhLNtk1oPV5IioUCfWxXbrO8SpgRiuRk1Wl4UP1GT7vXCDAZDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T13:08:00.120992Z"},"content_sha256":"5e3f00402266dfae8522a2bafc85bbc7ef23aba721546772c64c8f977e350154","schema_version":"1.0","event_id":"sha256:5e3f00402266dfae8522a2bafc85bbc7ef23aba721546772c64c8f977e350154"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:HTOVCBPGIEPZJ5EMSA4NL5KDID","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"On Combination Networks with Cache-aided Relays and Users","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Daniela Tuninetti, Kai Wan, Mingyue Ji, Pablo Piantanida","submitted_at":"2018-03-16T09:37:25Z","abstract_excerpt":"Caching is an efficient way to reduce peak hour network traffic congestion by storing some contents at the user's cache without knowledge of later demands. Coded caching strategy was originally proposed by Maddah-Ali and Niesen to give an additional coded caching gain compared the conventional uncoded scheme. Under practical consideration, the caching model was recently considered in relay network, in particular the combination network, where the central server communicates with $K=\\binom{H}{r}$ users (each is with a cache of $M$ files) through $H$ immediate relays, and each user is connected "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.06123","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:20:50Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"TzWM8QrzY9KHXU/HKzBQFmw3AtNA2wBP7XUkHsjDkyP8JOoR65v/U9YAVxpn5V5CpBYaWZksxRhmqxXNYj57AQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T13:08:00.121754Z"},"content_sha256":"8d63dabd380ad423e9e5b11121de59e91bb03f65551b2e7b526a489da8820309","schema_version":"1.0","event_id":"sha256:8d63dabd380ad423e9e5b11121de59e91bb03f65551b2e7b526a489da8820309"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/HTOVCBPGIEPZJ5EMSA4NL5KDID/bundle.json","state_url":"https://pith.science/pith/HTOVCBPGIEPZJ5EMSA4NL5KDID/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/HTOVCBPGIEPZJ5EMSA4NL5KDID/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T13:08:00Z","links":{"resolver":"https://pith.science/pith/HTOVCBPGIEPZJ5EMSA4NL5KDID","bundle":"https://pith.science/pith/HTOVCBPGIEPZJ5EMSA4NL5KDID/bundle.json","state":"https://pith.science/pith/HTOVCBPGIEPZJ5EMSA4NL5KDID/state.json","well_known_bundle":"https://pith.science/.well-known/pith/HTOVCBPGIEPZJ5EMSA4NL5KDID/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:HTOVCBPGIEPZJ5EMSA4NL5KDID","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"9b15176a45206effc285c91982b9a6cb166d45eae4e7ae09faa427e9fc158a1c","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-03-16T09:37:25Z","title_canon_sha256":"154ff42515e7b4be4be0e5ecba2049cfbf26b20e008046a7ccc83edac05d080f"},"schema_version":"1.0","source":{"id":"1803.06123","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.06123","created_at":"2026-05-18T00:20:50Z"},{"alias_kind":"arxiv_version","alias_value":"1803.06123v1","created_at":"2026-05-18T00:20:50Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.06123","created_at":"2026-05-18T00:20:50Z"},{"alias_kind":"pith_short_12","alias_value":"HTOVCBPGIEPZ","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_16","alias_value":"HTOVCBPGIEPZJ5EM","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_8","alias_value":"HTOVCBPG","created_at":"2026-05-18T12:32:28Z"}],"graph_snapshots":[{"event_id":"sha256:8d63dabd380ad423e9e5b11121de59e91bb03f65551b2e7b526a489da8820309","target":"graph","created_at":"2026-05-18T00:20:50Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Caching is an efficient way to reduce peak hour network traffic congestion by storing some contents at the user's cache without knowledge of later demands. Coded caching strategy was originally proposed by Maddah-Ali and Niesen to give an additional coded caching gain compared the conventional uncoded scheme. Under practical consideration, the caching model was recently considered in relay network, in particular the combination network, where the central server communicates with $K=\\binom{H}{r}$ users (each is with a cache of $M$ files) through $H$ immediate relays, and each user is connected ","authors_text":"Daniela Tuninetti, Kai Wan, Mingyue Ji, Pablo Piantanida","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-03-16T09:37:25Z","title":"On Combination Networks with Cache-aided Relays and Users"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.06123","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:5e3f00402266dfae8522a2bafc85bbc7ef23aba721546772c64c8f977e350154","target":"record","created_at":"2026-05-18T00:20:50Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"9b15176a45206effc285c91982b9a6cb166d45eae4e7ae09faa427e9fc158a1c","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-03-16T09:37:25Z","title_canon_sha256":"154ff42515e7b4be4be0e5ecba2049cfbf26b20e008046a7ccc83edac05d080f"},"schema_version":"1.0","source":{"id":"1803.06123","kind":"arxiv","version":1}},"canonical_sha256":"3cdd5105e6411f94f48c9038d5f54340ebe6c45bb35d5c83bf34a7482e821f31","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"3cdd5105e6411f94f48c9038d5f54340ebe6c45bb35d5c83bf34a7482e821f31","first_computed_at":"2026-05-18T00:20:50.534724Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:20:50.534724Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"6wZORyM3Y5dLmv4Ug48Z2ShOaEd1gxs9mnrXDYMPF8Oqw1i3wKi0eTmBCrJ6J2uH/0NVhW6kompvqqcoEfcIDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:20:50.535238Z","signed_message":"canonical_sha256_bytes"},"source_id":"1803.06123","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:5e3f00402266dfae8522a2bafc85bbc7ef23aba721546772c64c8f977e350154","sha256:8d63dabd380ad423e9e5b11121de59e91bb03f65551b2e7b526a489da8820309"],"state_sha256":"01a55b1239f08a103aca741b2e0ec5f4a27ed84fa5389ab170c0f3b7e035e144"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"BaUnZiDATvam6LkwgaYjSPplHwr2g0mDKF4bIIO2mLaoQom+3GHPcB1jgHTi7JN8hFwYZTSApciXHE0rT+wLBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T13:08:00.125819Z","bundle_sha256":"6c7354cfe9a9b64a2a4279f3dea6e37b30ec670c94ea4cd0fd5d4c102f4941d9"}}