{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:MGDCA4A3MZ5NIDPQPYRNPF7BZY","short_pith_number":"pith:MGDCA4A3","canonical_record":{"source":{"id":"1809.00659","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NI","submitted_at":"2018-09-03T17:03:31Z","cross_cats_sorted":[],"title_canon_sha256":"4b739e09857b3f3e235e1416ba4303d2dce32a671856ee755bb101c505c9b4ad","abstract_canon_sha256":"d40ade5f2246a91668fe8a970a7497233bb67d802744963f8ebafa30398c1488"},"schema_version":"1.0"},"canonical_sha256":"618620701b667ad40df07e22d797e1ce093055b203e01e7962df8eefad4c8797","source":{"kind":"arxiv","id":"1809.00659","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1809.00659","created_at":"2026-05-18T00:06:32Z"},{"alias_kind":"arxiv_version","alias_value":"1809.00659v1","created_at":"2026-05-18T00:06:32Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1809.00659","created_at":"2026-05-18T00:06:32Z"},{"alias_kind":"pith_short_12","alias_value":"MGDCA4A3MZ5N","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"MGDCA4A3MZ5NIDPQ","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"MGDCA4A3","created_at":"2026-05-18T12:32:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:MGDCA4A3MZ5NIDPQPYRNPF7BZY","target":"record","payload":{"canonical_record":{"source":{"id":"1809.00659","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NI","submitted_at":"2018-09-03T17:03:31Z","cross_cats_sorted":[],"title_canon_sha256":"4b739e09857b3f3e235e1416ba4303d2dce32a671856ee755bb101c505c9b4ad","abstract_canon_sha256":"d40ade5f2246a91668fe8a970a7497233bb67d802744963f8ebafa30398c1488"},"schema_version":"1.0"},"canonical_sha256":"618620701b667ad40df07e22d797e1ce093055b203e01e7962df8eefad4c8797","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:06:32.854627Z","signature_b64":"h9dT9H3GH1Ic/43sXO0SN55Q0knsviEOuAb4Gf0/YfBuWkEIcB7+tkDVNZ5wjyUXZkW6PLPMv/MulOfz5yN2Aw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"618620701b667ad40df07e22d797e1ce093055b203e01e7962df8eefad4c8797","last_reissued_at":"2026-05-18T00:06:32.854021Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:06:32.854021Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1809.00659","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:06:32Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"kIMfwLf5bp03Wku0HrW4OiJ14pCMNisg1jpbRA1FIRJNEY1kLbfj9P1cgpYBSpA3L43bGHSi1UlNTE+v37fSCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T17:29:26.029008Z"},"content_sha256":"6081b03a7529760180c8d968a54aec6151c3db3836d20e7186e02ac1acc848e1","schema_version":"1.0","event_id":"sha256:6081b03a7529760180c8d968a54aec6151c3db3836d20e7186e02ac1acc848e1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:MGDCA4A3MZ5NIDPQPYRNPF7BZY","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Barriers in Seamless QoS for Mobile Applications","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Hassan Abbas, Mohammad A. Hoque, Pan Hui, Sasu Tarkoma, Tong Li, Yong Li","submitted_at":"2018-09-03T17:03:31Z","abstract_excerpt":"For seamless QoS, it is important that all the stakeholders, such as the hosts, applications, access networks, routers, and other middleboxes, follow a single protocol and they trust each other. In this article, we investigate the participation of these entities in providing QoS over wireless networks in light of DiffServ QoS architecture. We initiate the study by investigating WiFi and Cellular network traces, which further motivates us a thorough investigation of these stakeholders with empirical measurements. Our findings are the followings. (i) Modern mobile VoIP applications request QoS t"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1809.00659","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:06:32Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"846Lc1FSsi5F9gt6WDDIxF87oTfUGu0yV6SzQMi6g7PxqTlMbzVSZRYmr3LwbFzqd7NcMVQT6tQO3r3vuMtKBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T17:29:26.029681Z"},"content_sha256":"2aa2eb2aaf24fd7bc4eece5287208708415bd33f88d7cea6469ede9340a709cd","schema_version":"1.0","event_id":"sha256:2aa2eb2aaf24fd7bc4eece5287208708415bd33f88d7cea6469ede9340a709cd"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/MGDCA4A3MZ5NIDPQPYRNPF7BZY/bundle.json","state_url":"https://pith.science/pith/MGDCA4A3MZ5NIDPQPYRNPF7BZY/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/MGDCA4A3MZ5NIDPQPYRNPF7BZY/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T17:29:26Z","links":{"resolver":"https://pith.science/pith/MGDCA4A3MZ5NIDPQPYRNPF7BZY","bundle":"https://pith.science/pith/MGDCA4A3MZ5NIDPQPYRNPF7BZY/bundle.json","state":"https://pith.science/pith/MGDCA4A3MZ5NIDPQPYRNPF7BZY/state.json","well_known_bundle":"https://pith.science/.well-known/pith/MGDCA4A3MZ5NIDPQPYRNPF7BZY/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:MGDCA4A3MZ5NIDPQPYRNPF7BZY","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"d40ade5f2246a91668fe8a970a7497233bb67d802744963f8ebafa30398c1488","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NI","submitted_at":"2018-09-03T17:03:31Z","title_canon_sha256":"4b739e09857b3f3e235e1416ba4303d2dce32a671856ee755bb101c505c9b4ad"},"schema_version":"1.0","source":{"id":"1809.00659","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1809.00659","created_at":"2026-05-18T00:06:32Z"},{"alias_kind":"arxiv_version","alias_value":"1809.00659v1","created_at":"2026-05-18T00:06:32Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1809.00659","created_at":"2026-05-18T00:06:32Z"},{"alias_kind":"pith_short_12","alias_value":"MGDCA4A3MZ5N","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"MGDCA4A3MZ5NIDPQ","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"MGDCA4A3","created_at":"2026-05-18T12:32:37Z"}],"graph_snapshots":[{"event_id":"sha256:2aa2eb2aaf24fd7bc4eece5287208708415bd33f88d7cea6469ede9340a709cd","target":"graph","created_at":"2026-05-18T00:06:32Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"For seamless QoS, it is important that all the stakeholders, such as the hosts, applications, access networks, routers, and other middleboxes, follow a single protocol and they trust each other. In this article, we investigate the participation of these entities in providing QoS over wireless networks in light of DiffServ QoS architecture. We initiate the study by investigating WiFi and Cellular network traces, which further motivates us a thorough investigation of these stakeholders with empirical measurements. Our findings are the followings. (i) Modern mobile VoIP applications request QoS t","authors_text":"Hassan Abbas, Mohammad A. Hoque, Pan Hui, Sasu Tarkoma, Tong Li, Yong Li","cross_cats":[],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NI","submitted_at":"2018-09-03T17:03:31Z","title":"Barriers in Seamless QoS for Mobile Applications"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1809.00659","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:6081b03a7529760180c8d968a54aec6151c3db3836d20e7186e02ac1acc848e1","target":"record","created_at":"2026-05-18T00:06:32Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"d40ade5f2246a91668fe8a970a7497233bb67d802744963f8ebafa30398c1488","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NI","submitted_at":"2018-09-03T17:03:31Z","title_canon_sha256":"4b739e09857b3f3e235e1416ba4303d2dce32a671856ee755bb101c505c9b4ad"},"schema_version":"1.0","source":{"id":"1809.00659","kind":"arxiv","version":1}},"canonical_sha256":"618620701b667ad40df07e22d797e1ce093055b203e01e7962df8eefad4c8797","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"618620701b667ad40df07e22d797e1ce093055b203e01e7962df8eefad4c8797","first_computed_at":"2026-05-18T00:06:32.854021Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:06:32.854021Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"h9dT9H3GH1Ic/43sXO0SN55Q0knsviEOuAb4Gf0/YfBuWkEIcB7+tkDVNZ5wjyUXZkW6PLPMv/MulOfz5yN2Aw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:06:32.854627Z","signed_message":"canonical_sha256_bytes"},"source_id":"1809.00659","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:6081b03a7529760180c8d968a54aec6151c3db3836d20e7186e02ac1acc848e1","sha256:2aa2eb2aaf24fd7bc4eece5287208708415bd33f88d7cea6469ede9340a709cd"],"state_sha256":"fcc6cad4b30edd243b84e7cf4b8afbe087601eabb321ad2ee346a49a4f2d89b8"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"bC2QkhAORaRDMgvOUNiUJRu25i48SW9BAmupM9ULjQ0pZZKyDNF6oX6wSjvVMMfgwVY+BOUUpSGgikTC98tvDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T17:29:26.033591Z","bundle_sha256":"290e74c5238c15b905a430398cc9e0ee987c501cabe3b90a1af6179c91b959d6"}}