{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:I6XS53LD2V6BFWTYXM2XWB737E","short_pith_number":"pith:I6XS53LD","canonical_record":{"source":{"id":"1801.05655","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-01-17T13:30:34Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"aec02db0a560ce8cc8d6ceaca0b9a0080ff6b024d6e660e81d8135584d8adde7","abstract_canon_sha256":"28efc4060f2d44854e67221b4f20a9fbe9536bc7f30430b586ecf9fd05d0b468"},"schema_version":"1.0"},"canonical_sha256":"47af2eed63d57c12da78bb357b07fbf9093d747faf918a7ac701e83c18f10126","source":{"kind":"arxiv","id":"1801.05655","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1801.05655","created_at":"2026-05-18T00:25:40Z"},{"alias_kind":"arxiv_version","alias_value":"1801.05655v1","created_at":"2026-05-18T00:25:40Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.05655","created_at":"2026-05-18T00:25:40Z"},{"alias_kind":"pith_short_12","alias_value":"I6XS53LD2V6B","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_16","alias_value":"I6XS53LD2V6BFWTY","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_8","alias_value":"I6XS53LD","created_at":"2026-05-18T12:32:28Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:I6XS53LD2V6BFWTYXM2XWB737E","target":"record","payload":{"canonical_record":{"source":{"id":"1801.05655","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-01-17T13:30:34Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"aec02db0a560ce8cc8d6ceaca0b9a0080ff6b024d6e660e81d8135584d8adde7","abstract_canon_sha256":"28efc4060f2d44854e67221b4f20a9fbe9536bc7f30430b586ecf9fd05d0b468"},"schema_version":"1.0"},"canonical_sha256":"47af2eed63d57c12da78bb357b07fbf9093d747faf918a7ac701e83c18f10126","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:25:40.535445Z","signature_b64":"6+jX19Vi/+xW06v0eEqmF7aEAf1oiuKnZ0TsT5t5/G3NTr84MdhgaUJaZHh2zc7rubgvp0jHroSitWMZZ5SWCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"47af2eed63d57c12da78bb357b07fbf9093d747faf918a7ac701e83c18f10126","last_reissued_at":"2026-05-18T00:25:40.534704Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:25:40.534704Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1801.05655","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:25:40Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ZfD+LCr/SSNewuBHfpq51MkoMHITrEynYzYgZB6P2MNC2IIAdfJ2QEGdPwiWPEwYq2cVupCZ4bRdWAehyK6wCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T00:10:11.535553Z"},"content_sha256":"5aa556e0d141029c6ebcb456f669917800bb0a3d221ba00c4e55b46bfafec88e","schema_version":"1.0","event_id":"sha256:5aa556e0d141029c6ebcb456f669917800bb0a3d221ba00c4e55b46bfafec88e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:I6XS53LD2V6BFWTYXM2XWB737E","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Rate-Distortion Performance of Sequential Massive Random Access to Gaussian Sources with Memory","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Aline Roumy, Elsa Dupraz, Michel Kieffer, Thomas Maugey","submitted_at":"2018-01-17T13:30:34Z","abstract_excerpt":"In Sequential Massive Random Access (SMRA), a set of correlated sources is jointly encoded and stored on a server, and clients want to access to only a subset of the sources. Since the number of simultaneous clients can be huge, the server is only authorized to extract a bitstream from the stored data: no re-encoding can be performed before the transmission of a request. In this paper, we investigate the SMRA performance of lossy source coding of Gaussian sources with memory. In practical applications such as Free Viewpoint Television, this model permits to take into account not only inter but"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.05655","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:25:40Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"kngvc6vB9nSv5HMUVwEvCMb7L7cpXdBRmmLqcVsze6eOTdCRy7Fuwlp/VkM+re4Gmibwhr4K0KNONO95y+QdDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T00:10:11.535957Z"},"content_sha256":"ce964ce67e0d9d22aa6dbc011d2e92fb5c38a6945ce414f180c87533ffe1b397","schema_version":"1.0","event_id":"sha256:ce964ce67e0d9d22aa6dbc011d2e92fb5c38a6945ce414f180c87533ffe1b397"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/I6XS53LD2V6BFWTYXM2XWB737E/bundle.json","state_url":"https://pith.science/pith/I6XS53LD2V6BFWTYXM2XWB737E/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/I6XS53LD2V6BFWTYXM2XWB737E/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T00:10:11Z","links":{"resolver":"https://pith.science/pith/I6XS53LD2V6BFWTYXM2XWB737E","bundle":"https://pith.science/pith/I6XS53LD2V6BFWTYXM2XWB737E/bundle.json","state":"https://pith.science/pith/I6XS53LD2V6BFWTYXM2XWB737E/state.json","well_known_bundle":"https://pith.science/.well-known/pith/I6XS53LD2V6BFWTYXM2XWB737E/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:I6XS53LD2V6BFWTYXM2XWB737E","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"28efc4060f2d44854e67221b4f20a9fbe9536bc7f30430b586ecf9fd05d0b468","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-01-17T13:30:34Z","title_canon_sha256":"aec02db0a560ce8cc8d6ceaca0b9a0080ff6b024d6e660e81d8135584d8adde7"},"schema_version":"1.0","source":{"id":"1801.05655","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1801.05655","created_at":"2026-05-18T00:25:40Z"},{"alias_kind":"arxiv_version","alias_value":"1801.05655v1","created_at":"2026-05-18T00:25:40Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.05655","created_at":"2026-05-18T00:25:40Z"},{"alias_kind":"pith_short_12","alias_value":"I6XS53LD2V6B","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_16","alias_value":"I6XS53LD2V6BFWTY","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_8","alias_value":"I6XS53LD","created_at":"2026-05-18T12:32:28Z"}],"graph_snapshots":[{"event_id":"sha256:ce964ce67e0d9d22aa6dbc011d2e92fb5c38a6945ce414f180c87533ffe1b397","target":"graph","created_at":"2026-05-18T00:25:40Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In Sequential Massive Random Access (SMRA), a set of correlated sources is jointly encoded and stored on a server, and clients want to access to only a subset of the sources. Since the number of simultaneous clients can be huge, the server is only authorized to extract a bitstream from the stored data: no re-encoding can be performed before the transmission of a request. In this paper, we investigate the SMRA performance of lossy source coding of Gaussian sources with memory. In practical applications such as Free Viewpoint Television, this model permits to take into account not only inter but","authors_text":"Aline Roumy, Elsa Dupraz, Michel Kieffer, Thomas Maugey","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-01-17T13:30:34Z","title":"Rate-Distortion Performance of Sequential Massive Random Access to Gaussian Sources with Memory"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.05655","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:5aa556e0d141029c6ebcb456f669917800bb0a3d221ba00c4e55b46bfafec88e","target":"record","created_at":"2026-05-18T00:25:40Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"28efc4060f2d44854e67221b4f20a9fbe9536bc7f30430b586ecf9fd05d0b468","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-01-17T13:30:34Z","title_canon_sha256":"aec02db0a560ce8cc8d6ceaca0b9a0080ff6b024d6e660e81d8135584d8adde7"},"schema_version":"1.0","source":{"id":"1801.05655","kind":"arxiv","version":1}},"canonical_sha256":"47af2eed63d57c12da78bb357b07fbf9093d747faf918a7ac701e83c18f10126","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"47af2eed63d57c12da78bb357b07fbf9093d747faf918a7ac701e83c18f10126","first_computed_at":"2026-05-18T00:25:40.534704Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:25:40.534704Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"6+jX19Vi/+xW06v0eEqmF7aEAf1oiuKnZ0TsT5t5/G3NTr84MdhgaUJaZHh2zc7rubgvp0jHroSitWMZZ5SWCA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:25:40.535445Z","signed_message":"canonical_sha256_bytes"},"source_id":"1801.05655","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:5aa556e0d141029c6ebcb456f669917800bb0a3d221ba00c4e55b46bfafec88e","sha256:ce964ce67e0d9d22aa6dbc011d2e92fb5c38a6945ce414f180c87533ffe1b397"],"state_sha256":"cb0613a39796372b95eac5b9a3f607e1b27dfa415372674c86f4f2d788766819"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"tsbfnggQsnPvDnaSnJodH9Srukn5U3Gq+bf8wJpV01FoyM4tIZhf8r/JGnnAhuSq5xkTRp/D/9bOGERx1dxhAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T00:10:11.538521Z","bundle_sha256":"5796df6aacc3f240dd3e0cf8ede15ebb203307198f0a118dc1d3d0cd9858f650"}}