{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2014:IGSZ5LKI6EB6CCSMQXIQY52NHW","short_pith_number":"pith:IGSZ5LKI","canonical_record":{"source":{"id":"1410.2291","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-10-08T21:38:36Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"7a3854477da030ee30952106a14502980d540395052d9c4334fc3f7518c9a4fd","abstract_canon_sha256":"ae97bac55abbfae5ae525a648842cb61c3b3b33668edad0f8c660ac4d754b774"},"schema_version":"1.0"},"canonical_sha256":"41a59ead48f103e10a4c85d10c774d3da9d8382716e335eed5ebb76a9d085900","source":{"kind":"arxiv","id":"1410.2291","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1410.2291","created_at":"2026-05-18T00:58:11Z"},{"alias_kind":"arxiv_version","alias_value":"1410.2291v1","created_at":"2026-05-18T00:58:11Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1410.2291","created_at":"2026-05-18T00:58:11Z"},{"alias_kind":"pith_short_12","alias_value":"IGSZ5LKI6EB6","created_at":"2026-05-18T12:28:33Z"},{"alias_kind":"pith_short_16","alias_value":"IGSZ5LKI6EB6CCSM","created_at":"2026-05-18T12:28:33Z"},{"alias_kind":"pith_short_8","alias_value":"IGSZ5LKI","created_at":"2026-05-18T12:28:33Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2014:IGSZ5LKI6EB6CCSMQXIQY52NHW","target":"record","payload":{"canonical_record":{"source":{"id":"1410.2291","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-10-08T21:38:36Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"7a3854477da030ee30952106a14502980d540395052d9c4334fc3f7518c9a4fd","abstract_canon_sha256":"ae97bac55abbfae5ae525a648842cb61c3b3b33668edad0f8c660ac4d754b774"},"schema_version":"1.0"},"canonical_sha256":"41a59ead48f103e10a4c85d10c774d3da9d8382716e335eed5ebb76a9d085900","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:58:11.396860Z","signature_b64":"NysmjNWVlkjR7X3Lvy4KpaADBhwOgYwfXhVCv+AgU+HJBSuS41RCdCR+tAmx9xk6AIR8poBlzBgIv7uRux8DDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"41a59ead48f103e10a4c85d10c774d3da9d8382716e335eed5ebb76a9d085900","last_reissued_at":"2026-05-18T00:58:11.396278Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:58:11.396278Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1410.2291","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:11Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"BcRZR976gawkpai2QfkmMuBa6/rSg91SL0B3V9dWhNMS+y6F315+mB1B7ttcntSi0zO3GqX8wmZi8lcVPkBoAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T17:57:55.103159Z"},"content_sha256":"f4be41ee367b2b2766e894425d8b03aac8314274303edb3e578796c7adea9fbe","schema_version":"1.0","event_id":"sha256:f4be41ee367b2b2766e894425d8b03aac8314274303edb3e578796c7adea9fbe"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2014:IGSZ5LKI6EB6CCSMQXIQY52NHW","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Analysis and Design of Finite Alphabet Iterative Decoders Robust to Faulty Hardware","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Bane Vasic, David Declercq, Elsa Dupraz, Valentin Savin","submitted_at":"2014-10-08T21:38:36Z","abstract_excerpt":"This paper addresses the problem of designing LDPC decoders robust to transient errors introduced by a faulty hardware. We assume that the faulty hardware introduces errors during the message passing updates and we propose a general framework for the definition of the message update faulty functions. Within this framework, we define symmetry conditions for the faulty functions, and derive two simple error models used in the analysis. With this analysis, we propose a new interpretation of the functional Density Evolution threshold previously introduced, and show its limitations in case of highl"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1410.2291","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:11Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"9DUaMoEeQPOjpQovp9VULiTIcfmqJPxEOvJGutdfC4Cbj19cXXVbKf2NayQvYi4QsHcKrqzmeT+3/MIKSMBOAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T17:57:55.103869Z"},"content_sha256":"2d75c71c5153ae01ef08f81493966f9ce8095efea873cc2b376c9a9b4fd090a1","schema_version":"1.0","event_id":"sha256:2d75c71c5153ae01ef08f81493966f9ce8095efea873cc2b376c9a9b4fd090a1"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/IGSZ5LKI6EB6CCSMQXIQY52NHW/bundle.json","state_url":"https://pith.science/pith/IGSZ5LKI6EB6CCSMQXIQY52NHW/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/IGSZ5LKI6EB6CCSMQXIQY52NHW/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T17:57:55Z","links":{"resolver":"https://pith.science/pith/IGSZ5LKI6EB6CCSMQXIQY52NHW","bundle":"https://pith.science/pith/IGSZ5LKI6EB6CCSMQXIQY52NHW/bundle.json","state":"https://pith.science/pith/IGSZ5LKI6EB6CCSMQXIQY52NHW/state.json","well_known_bundle":"https://pith.science/.well-known/pith/IGSZ5LKI6EB6CCSMQXIQY52NHW/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2014:IGSZ5LKI6EB6CCSMQXIQY52NHW","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"ae97bac55abbfae5ae525a648842cb61c3b3b33668edad0f8c660ac4d754b774","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-10-08T21:38:36Z","title_canon_sha256":"7a3854477da030ee30952106a14502980d540395052d9c4334fc3f7518c9a4fd"},"schema_version":"1.0","source":{"id":"1410.2291","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1410.2291","created_at":"2026-05-18T00:58:11Z"},{"alias_kind":"arxiv_version","alias_value":"1410.2291v1","created_at":"2026-05-18T00:58:11Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1410.2291","created_at":"2026-05-18T00:58:11Z"},{"alias_kind":"pith_short_12","alias_value":"IGSZ5LKI6EB6","created_at":"2026-05-18T12:28:33Z"},{"alias_kind":"pith_short_16","alias_value":"IGSZ5LKI6EB6CCSM","created_at":"2026-05-18T12:28:33Z"},{"alias_kind":"pith_short_8","alias_value":"IGSZ5LKI","created_at":"2026-05-18T12:28:33Z"}],"graph_snapshots":[{"event_id":"sha256:2d75c71c5153ae01ef08f81493966f9ce8095efea873cc2b376c9a9b4fd090a1","target":"graph","created_at":"2026-05-18T00:58:11Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This paper addresses the problem of designing LDPC decoders robust to transient errors introduced by a faulty hardware. We assume that the faulty hardware introduces errors during the message passing updates and we propose a general framework for the definition of the message update faulty functions. Within this framework, we define symmetry conditions for the faulty functions, and derive two simple error models used in the analysis. With this analysis, we propose a new interpretation of the functional Density Evolution threshold previously introduced, and show its limitations in case of highl","authors_text":"Bane Vasic, David Declercq, Elsa Dupraz, Valentin Savin","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-10-08T21:38:36Z","title":"Analysis and Design of Finite Alphabet Iterative Decoders Robust to Faulty Hardware"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1410.2291","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:f4be41ee367b2b2766e894425d8b03aac8314274303edb3e578796c7adea9fbe","target":"record","created_at":"2026-05-18T00:58:11Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"ae97bac55abbfae5ae525a648842cb61c3b3b33668edad0f8c660ac4d754b774","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-10-08T21:38:36Z","title_canon_sha256":"7a3854477da030ee30952106a14502980d540395052d9c4334fc3f7518c9a4fd"},"schema_version":"1.0","source":{"id":"1410.2291","kind":"arxiv","version":1}},"canonical_sha256":"41a59ead48f103e10a4c85d10c774d3da9d8382716e335eed5ebb76a9d085900","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"41a59ead48f103e10a4c85d10c774d3da9d8382716e335eed5ebb76a9d085900","first_computed_at":"2026-05-18T00:58:11.396278Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:58:11.396278Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"NysmjNWVlkjR7X3Lvy4KpaADBhwOgYwfXhVCv+AgU+HJBSuS41RCdCR+tAmx9xk6AIR8poBlzBgIv7uRux8DDw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:58:11.396860Z","signed_message":"canonical_sha256_bytes"},"source_id":"1410.2291","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:f4be41ee367b2b2766e894425d8b03aac8314274303edb3e578796c7adea9fbe","sha256:2d75c71c5153ae01ef08f81493966f9ce8095efea873cc2b376c9a9b4fd090a1"],"state_sha256":"f0dff96ea49d589c12855ce77855200b1e99e57b12fc772e15b1f5e1172cd699"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"RhF9ebDxuZvuAEfBraZnFJ8roxLrE3mA6d0ZtgrzDSv3ocq2RoKnMVz5r2UBpmIzLFv6EIeAK0/Jhr0Z6vQ8Bg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T17:57:55.107433Z","bundle_sha256":"4078079d30a3b740c78dcc890e0933e4ed7a17a48e39d9aa59ed039c597eedfc"}}