{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2014:LI4MSY5B4CCYFG3URYJAUN3QIG","short_pith_number":"pith:LI4MSY5B","canonical_record":{"source":{"id":"1403.6678","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2014-03-20T21:28:52Z","cross_cats_sorted":["cs.LO"],"title_canon_sha256":"3828df84f784ddf4710431dcb098789ecdc4925917d8cbfbe2fe7a6d7b3d186b","abstract_canon_sha256":"28b97f109b792a8b4d70da86e26c75dfad100b718b317d3ac6fe50cd1d48731b"},"schema_version":"1.0"},"canonical_sha256":"5a38c963a1e085829b748e120a377041a1d73a6169979f7f9becb8e4582df151","source":{"kind":"arxiv","id":"1403.6678","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1403.6678","created_at":"2026-05-18T02:55:28Z"},{"alias_kind":"arxiv_version","alias_value":"1403.6678v1","created_at":"2026-05-18T02:55:28Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1403.6678","created_at":"2026-05-18T02:55:28Z"},{"alias_kind":"pith_short_12","alias_value":"LI4MSY5B4CCY","created_at":"2026-05-18T12:28:38Z"},{"alias_kind":"pith_short_16","alias_value":"LI4MSY5B4CCYFG3U","created_at":"2026-05-18T12:28:38Z"},{"alias_kind":"pith_short_8","alias_value":"LI4MSY5B","created_at":"2026-05-18T12:28:38Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2014:LI4MSY5B4CCYFG3URYJAUN3QIG","target":"record","payload":{"canonical_record":{"source":{"id":"1403.6678","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2014-03-20T21:28:52Z","cross_cats_sorted":["cs.LO"],"title_canon_sha256":"3828df84f784ddf4710431dcb098789ecdc4925917d8cbfbe2fe7a6d7b3d186b","abstract_canon_sha256":"28b97f109b792a8b4d70da86e26c75dfad100b718b317d3ac6fe50cd1d48731b"},"schema_version":"1.0"},"canonical_sha256":"5a38c963a1e085829b748e120a377041a1d73a6169979f7f9becb8e4582df151","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:55:28.301921Z","signature_b64":"L+4iFxsurdfyLCHCXMqhtZImTxR183+3XeUUdVPXo/Ffdlcx4YVNyOJOS+Vp7MmjpHODjqsS/Nobw31ucbmzCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"5a38c963a1e085829b748e120a377041a1d73a6169979f7f9becb8e4582df151","last_reissued_at":"2026-05-18T02:55:28.301276Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:55:28.301276Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1403.6678","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:55:28Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"GEJmpZQpzO3irSuni/iJ8qdCzRZ6vKwM/4kDCDOoR02gIYr3/N1QHbqRfAmdt33ICNjU3G6llL2eeDvY17rGCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T08:03:37.012825Z"},"content_sha256":"ed14664b5ad2b6760845c5a75046e6661d5fe15e3d98a3d35ef192258840087c","schema_version":"1.0","event_id":"sha256:ed14664b5ad2b6760845c5a75046e6661d5fe15e3d98a3d35ef192258840087c"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2014:LI4MSY5B4CCYFG3URYJAUN3QIG","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Probabilistic Model Checking of DTMC Models of User Activity Patterns","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LO"],"primary_cat":"cs.SE","authors_text":"Mark Girolami, Matthew Higgs, Muffy Calder, Oana Andrei","submitted_at":"2014-03-20T21:28:52Z","abstract_excerpt":"Software developers cannot always anticipate how users will actually use their software as it may vary from user to user, and even from use to use for an individual user. In order to address questions raised by system developers and evaluators about software usage, we define new probabilistic models that characterise user behaviour, based on activity patterns inferred from actual logged user traces. We encode these new models in a probabilistic model checker and use probabilistic temporal logics to gain insight into software usage. We motivate and illustrate our approach by application to the "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1403.6678","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:55:28Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"AcgEiNdTS3/zzTWv0oLrf0WrjPSHIL/ImU/tGfBwRbPQ5CHkVvdZgLFr6QEqwbpdtp/2SvuILG/6Uu/X+fCPCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T08:03:37.013209Z"},"content_sha256":"789e0a0efc9a3b59dcd4dca4e76ad1c35d1275a55aa5ee19ff3e957d08176717","schema_version":"1.0","event_id":"sha256:789e0a0efc9a3b59dcd4dca4e76ad1c35d1275a55aa5ee19ff3e957d08176717"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/LI4MSY5B4CCYFG3URYJAUN3QIG/bundle.json","state_url":"https://pith.science/pith/LI4MSY5B4CCYFG3URYJAUN3QIG/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/LI4MSY5B4CCYFG3URYJAUN3QIG/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T08:03:37Z","links":{"resolver":"https://pith.science/pith/LI4MSY5B4CCYFG3URYJAUN3QIG","bundle":"https://pith.science/pith/LI4MSY5B4CCYFG3URYJAUN3QIG/bundle.json","state":"https://pith.science/pith/LI4MSY5B4CCYFG3URYJAUN3QIG/state.json","well_known_bundle":"https://pith.science/.well-known/pith/LI4MSY5B4CCYFG3URYJAUN3QIG/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2014:LI4MSY5B4CCYFG3URYJAUN3QIG","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"28b97f109b792a8b4d70da86e26c75dfad100b718b317d3ac6fe50cd1d48731b","cross_cats_sorted":["cs.LO"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2014-03-20T21:28:52Z","title_canon_sha256":"3828df84f784ddf4710431dcb098789ecdc4925917d8cbfbe2fe7a6d7b3d186b"},"schema_version":"1.0","source":{"id":"1403.6678","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1403.6678","created_at":"2026-05-18T02:55:28Z"},{"alias_kind":"arxiv_version","alias_value":"1403.6678v1","created_at":"2026-05-18T02:55:28Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1403.6678","created_at":"2026-05-18T02:55:28Z"},{"alias_kind":"pith_short_12","alias_value":"LI4MSY5B4CCY","created_at":"2026-05-18T12:28:38Z"},{"alias_kind":"pith_short_16","alias_value":"LI4MSY5B4CCYFG3U","created_at":"2026-05-18T12:28:38Z"},{"alias_kind":"pith_short_8","alias_value":"LI4MSY5B","created_at":"2026-05-18T12:28:38Z"}],"graph_snapshots":[{"event_id":"sha256:789e0a0efc9a3b59dcd4dca4e76ad1c35d1275a55aa5ee19ff3e957d08176717","target":"graph","created_at":"2026-05-18T02:55:28Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Software developers cannot always anticipate how users will actually use their software as it may vary from user to user, and even from use to use for an individual user. In order to address questions raised by system developers and evaluators about software usage, we define new probabilistic models that characterise user behaviour, based on activity patterns inferred from actual logged user traces. We encode these new models in a probabilistic model checker and use probabilistic temporal logics to gain insight into software usage. We motivate and illustrate our approach by application to the ","authors_text":"Mark Girolami, Matthew Higgs, Muffy Calder, Oana Andrei","cross_cats":["cs.LO"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2014-03-20T21:28:52Z","title":"Probabilistic Model Checking of DTMC Models of User Activity Patterns"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1403.6678","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ed14664b5ad2b6760845c5a75046e6661d5fe15e3d98a3d35ef192258840087c","target":"record","created_at":"2026-05-18T02:55:28Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"28b97f109b792a8b4d70da86e26c75dfad100b718b317d3ac6fe50cd1d48731b","cross_cats_sorted":["cs.LO"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2014-03-20T21:28:52Z","title_canon_sha256":"3828df84f784ddf4710431dcb098789ecdc4925917d8cbfbe2fe7a6d7b3d186b"},"schema_version":"1.0","source":{"id":"1403.6678","kind":"arxiv","version":1}},"canonical_sha256":"5a38c963a1e085829b748e120a377041a1d73a6169979f7f9becb8e4582df151","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"5a38c963a1e085829b748e120a377041a1d73a6169979f7f9becb8e4582df151","first_computed_at":"2026-05-18T02:55:28.301276Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:55:28.301276Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"L+4iFxsurdfyLCHCXMqhtZImTxR183+3XeUUdVPXo/Ffdlcx4YVNyOJOS+Vp7MmjpHODjqsS/Nobw31ucbmzCA==","signature_status":"signed_v1","signed_at":"2026-05-18T02:55:28.301921Z","signed_message":"canonical_sha256_bytes"},"source_id":"1403.6678","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ed14664b5ad2b6760845c5a75046e6661d5fe15e3d98a3d35ef192258840087c","sha256:789e0a0efc9a3b59dcd4dca4e76ad1c35d1275a55aa5ee19ff3e957d08176717"],"state_sha256":"358af3f41c50480f518e5eaee81471c28518fc231e5af8dd9ce04aca0e31d17f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"cwbqxsUtvDIwy5iBwooZZF5wrWQWCvtOzzNLdDesWCXzqg/7sE9N7ylxdKvEPXFXWgilRdgKeW6YO9X79jFhCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T08:03:37.016503Z","bundle_sha256":"d1706848c1fd955dd7faeab5d690c8ca332af6a92696712ebc8b44739ef76454"}}