{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:KNUYP6W4J6KB5OSEVSR5MNEZWI","short_pith_number":"pith:KNUYP6W4","canonical_record":{"source":{"id":"1703.10666","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.IT","submitted_at":"2017-03-30T20:34:20Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"9802827c1f1e649712ec50ee0ff2de05763cdf8b06834ab4b2c2e78b6062d3c2","abstract_canon_sha256":"7b8dd3cd21b330980dffa5b1d612558330b7ba4c4499e984f49757f5446e9a72"},"schema_version":"1.0"},"canonical_sha256":"536987fadc4f941eba44aca3d63499b2161904b6d42fc6c0c094fe0793409a93","source":{"kind":"arxiv","id":"1703.10666","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.10666","created_at":"2026-05-18T00:47:33Z"},{"alias_kind":"arxiv_version","alias_value":"1703.10666v1","created_at":"2026-05-18T00:47:33Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.10666","created_at":"2026-05-18T00:47:33Z"},{"alias_kind":"pith_short_12","alias_value":"KNUYP6W4J6KB","created_at":"2026-05-18T12:31:24Z"},{"alias_kind":"pith_short_16","alias_value":"KNUYP6W4J6KB5OSE","created_at":"2026-05-18T12:31:24Z"},{"alias_kind":"pith_short_8","alias_value":"KNUYP6W4","created_at":"2026-05-18T12:31:24Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:KNUYP6W4J6KB5OSEVSR5MNEZWI","target":"record","payload":{"canonical_record":{"source":{"id":"1703.10666","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.IT","submitted_at":"2017-03-30T20:34:20Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"9802827c1f1e649712ec50ee0ff2de05763cdf8b06834ab4b2c2e78b6062d3c2","abstract_canon_sha256":"7b8dd3cd21b330980dffa5b1d612558330b7ba4c4499e984f49757f5446e9a72"},"schema_version":"1.0"},"canonical_sha256":"536987fadc4f941eba44aca3d63499b2161904b6d42fc6c0c094fe0793409a93","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:47:33.032387Z","signature_b64":"QVWlRk9ogo7uRSWNfyYmUoP8kvXaQ3MhF9yIunuLGYNyzm1YeWqiTNcJdBcHRGFxmS3AiyyqtFrUWgHYfZqdDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"536987fadc4f941eba44aca3d63499b2161904b6d42fc6c0c094fe0793409a93","last_reissued_at":"2026-05-18T00:47:33.031797Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:47:33.031797Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1703.10666","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:47:33Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"79WeKw051d1RPjy7E8F/liI+yrrvuQPa3zWCiWF9E5AH0chGK8ofm5P8br03CKL49sCyB4skwc4scz8VWrYnCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T00:29:01.196305Z"},"content_sha256":"8d4d20b424adcfffc9bc35b5a7380170f88a50406dded576afbcbbeb6668785a","schema_version":"1.0","event_id":"sha256:8d4d20b424adcfffc9bc35b5a7380170f88a50406dded576afbcbbeb6668785a"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:KNUYP6W4J6KB5OSEVSR5MNEZWI","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Interference Exploitation in Full Duplex Communications: Trading Interference Power for Both Uplink and Downlink Power Savings","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Christos Masouros, Mahmoud T. Kabir, Muhammad R. A. Khandaker","submitted_at":"2017-03-30T20:34:20Z","abstract_excerpt":"This paper considers a multiuser full-duplex (FD) wireless communication system, where a FD radio base station (BS) serves multiple single-antenna half-duplex (HD) uplink and downlink users simultaneously. Unlike conventional interference mitigation approaches, we propose to use the knowledge of the data symbols and the channel state information (CSI) at the FD radio BS to exploit the multi-user interference constructively rather than to suppress it. We propose a multi-objective optimisation problem (MOOP) via the weighted Tchebycheff method to study the trade-off between the two desirable sys"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.10666","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:47:33Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"RME12z48rJuMhqiq0WVFU9N01W6UDJqnrk0MQDW0U4cy3G3raNCb16vnSOsLHiVE1/OTu1sYAnCCa0uj47rsDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T00:29:01.196994Z"},"content_sha256":"06e4d68d67b9c7fd75a771f9c78f41243fe5cb89ffcc37194f7e9d4fdc44f5de","schema_version":"1.0","event_id":"sha256:06e4d68d67b9c7fd75a771f9c78f41243fe5cb89ffcc37194f7e9d4fdc44f5de"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/bundle.json","state_url":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T00:29:01Z","links":{"resolver":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI","bundle":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/bundle.json","state":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/state.json","well_known_bundle":"https://pith.science/.well-known/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:KNUYP6W4J6KB5OSEVSR5MNEZWI","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"7b8dd3cd21b330980dffa5b1d612558330b7ba4c4499e984f49757f5446e9a72","cross_cats_sorted":["math.IT"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.IT","submitted_at":"2017-03-30T20:34:20Z","title_canon_sha256":"9802827c1f1e649712ec50ee0ff2de05763cdf8b06834ab4b2c2e78b6062d3c2"},"schema_version":"1.0","source":{"id":"1703.10666","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.10666","created_at":"2026-05-18T00:47:33Z"},{"alias_kind":"arxiv_version","alias_value":"1703.10666v1","created_at":"2026-05-18T00:47:33Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.10666","created_at":"2026-05-18T00:47:33Z"},{"alias_kind":"pith_short_12","alias_value":"KNUYP6W4J6KB","created_at":"2026-05-18T12:31:24Z"},{"alias_kind":"pith_short_16","alias_value":"KNUYP6W4J6KB5OSE","created_at":"2026-05-18T12:31:24Z"},{"alias_kind":"pith_short_8","alias_value":"KNUYP6W4","created_at":"2026-05-18T12:31:24Z"}],"graph_snapshots":[{"event_id":"sha256:06e4d68d67b9c7fd75a771f9c78f41243fe5cb89ffcc37194f7e9d4fdc44f5de","target":"graph","created_at":"2026-05-18T00:47:33Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This paper considers a multiuser full-duplex (FD) wireless communication system, where a FD radio base station (BS) serves multiple single-antenna half-duplex (HD) uplink and downlink users simultaneously. Unlike conventional interference mitigation approaches, we propose to use the knowledge of the data symbols and the channel state information (CSI) at the FD radio BS to exploit the multi-user interference constructively rather than to suppress it. We propose a multi-objective optimisation problem (MOOP) via the weighted Tchebycheff method to study the trade-off between the two desirable sys","authors_text":"Christos Masouros, Mahmoud T. Kabir, Muhammad R. A. Khandaker","cross_cats":["math.IT"],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.IT","submitted_at":"2017-03-30T20:34:20Z","title":"Interference Exploitation in Full Duplex Communications: Trading Interference Power for Both Uplink and Downlink Power Savings"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.10666","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:8d4d20b424adcfffc9bc35b5a7380170f88a50406dded576afbcbbeb6668785a","target":"record","created_at":"2026-05-18T00:47:33Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"7b8dd3cd21b330980dffa5b1d612558330b7ba4c4499e984f49757f5446e9a72","cross_cats_sorted":["math.IT"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.IT","submitted_at":"2017-03-30T20:34:20Z","title_canon_sha256":"9802827c1f1e649712ec50ee0ff2de05763cdf8b06834ab4b2c2e78b6062d3c2"},"schema_version":"1.0","source":{"id":"1703.10666","kind":"arxiv","version":1}},"canonical_sha256":"536987fadc4f941eba44aca3d63499b2161904b6d42fc6c0c094fe0793409a93","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"536987fadc4f941eba44aca3d63499b2161904b6d42fc6c0c094fe0793409a93","first_computed_at":"2026-05-18T00:47:33.031797Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:47:33.031797Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"QVWlRk9ogo7uRSWNfyYmUoP8kvXaQ3MhF9yIunuLGYNyzm1YeWqiTNcJdBcHRGFxmS3AiyyqtFrUWgHYfZqdDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:47:33.032387Z","signed_message":"canonical_sha256_bytes"},"source_id":"1703.10666","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:8d4d20b424adcfffc9bc35b5a7380170f88a50406dded576afbcbbeb6668785a","sha256:06e4d68d67b9c7fd75a771f9c78f41243fe5cb89ffcc37194f7e9d4fdc44f5de"],"state_sha256":"6fb3565d92e06b8eddfe17946b1f1b5cb749ff0b76ce692cbc6d2321a04c9cfb"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"AfeZ2sxpV9j5o/zBCyWftjKBj3ZHN/nHEuf37F5z1to6VPQPFO1voxNkmVGstl9jF4u2fKHNiXD4ELJ3uguwAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T00:29:01.200554Z","bundle_sha256":"ac37a5fa1e8e64a884ecb7806920f5e5f759d5522630f2a35d75e9cc8b0548a0"}}