{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2014:NQYLLVQT2D2NCB5VW7YA2HT4IU","short_pith_number":"pith:NQYLLVQT","schema_version":"1.0","canonical_sha256":"6c30b5d613d0f4d107b5b7f00d1e7c453672b48b3e32f0927d1866b6055fe057","source":{"kind":"arxiv","id":"1401.5099","version":1},"attestation_state":"computed","paper":{"title":"A Stable Fountain Code Mechanism for Peer-to-Peer Content Distribution","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Cedric Westphal","submitted_at":"2014-01-20T21:38:56Z","abstract_excerpt":"Most peer-to-peer content distribution systems require the peers to privilege the welfare of the overall system over greedily maximizing their own utility. When downloading a file broken up into multiple pieces, peers are often asked to pass on some possible download opportunities of common pieces in order to favor rare pieces. This is to avoid the missing piece syndrome, which throttles the download rate of the peer-to-peer system to that of downloading the file straight from the server. In other situations, peers are asked to stay in the system even though they have collected all the file's "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1401.5099","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2014-01-20T21:38:56Z","cross_cats_sorted":[],"title_canon_sha256":"b55696d355db45bbefd91bb0ce33a05870172524588819857edaa43d1547a2a1","abstract_canon_sha256":"1fb1df9d9182ecfbbb8183e88725634fa8122693c6d19239120db5b5ca3fe091"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:58:41.762140Z","signature_b64":"Cb6YuDTHPZMUKgjB1vyUSCXseRK7RcO0bzsTTdqw+gVH3UKd0Zfp+jt1bCHN63dI1afYdI9Eg3+VS81AIG8HBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"6c30b5d613d0f4d107b5b7f00d1e7c453672b48b3e32f0927d1866b6055fe057","last_reissued_at":"2026-05-18T00:58:41.761518Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:58:41.761518Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"A Stable Fountain Code Mechanism for Peer-to-Peer Content Distribution","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Cedric Westphal","submitted_at":"2014-01-20T21:38:56Z","abstract_excerpt":"Most peer-to-peer content distribution systems require the peers to privilege the welfare of the overall system over greedily maximizing their own utility. When downloading a file broken up into multiple pieces, peers are often asked to pass on some possible download opportunities of common pieces in order to favor rare pieces. This is to avoid the missing piece syndrome, which throttles the download rate of the peer-to-peer system to that of downloading the file straight from the server. In other situations, peers are asked to stay in the system even though they have collected all the file's "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1401.5099","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1401.5099","created_at":"2026-05-18T00:58:41.761598+00:00"},{"alias_kind":"arxiv_version","alias_value":"1401.5099v1","created_at":"2026-05-18T00:58:41.761598+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1401.5099","created_at":"2026-05-18T00:58:41.761598+00:00"},{"alias_kind":"pith_short_12","alias_value":"NQYLLVQT2D2N","created_at":"2026-05-18T12:28:41.024544+00:00"},{"alias_kind":"pith_short_16","alias_value":"NQYLLVQT2D2NCB5V","created_at":"2026-05-18T12:28:41.024544+00:00"},{"alias_kind":"pith_short_8","alias_value":"NQYLLVQT","created_at":"2026-05-18T12:28:41.024544+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/NQYLLVQT2D2NCB5VW7YA2HT4IU","json":"https://pith.science/pith/NQYLLVQT2D2NCB5VW7YA2HT4IU.json","graph_json":"https://pith.science/api/pith-number/NQYLLVQT2D2NCB5VW7YA2HT4IU/graph.json","events_json":"https://pith.science/api/pith-number/NQYLLVQT2D2NCB5VW7YA2HT4IU/events.json","paper":"https://pith.science/paper/NQYLLVQT"},"agent_actions":{"view_html":"https://pith.science/pith/NQYLLVQT2D2NCB5VW7YA2HT4IU","download_json":"https://pith.science/pith/NQYLLVQT2D2NCB5VW7YA2HT4IU.json","view_paper":"https://pith.science/paper/NQYLLVQT","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1401.5099&json=true","fetch_graph":"https://pith.science/api/pith-number/NQYLLVQT2D2NCB5VW7YA2HT4IU/graph.json","fetch_events":"https://pith.science/api/pith-number/NQYLLVQT2D2NCB5VW7YA2HT4IU/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/NQYLLVQT2D2NCB5VW7YA2HT4IU/action/timestamp_anchor","attest_storage":"https://pith.science/pith/NQYLLVQT2D2NCB5VW7YA2HT4IU/action/storage_attestation","attest_author":"https://pith.science/pith/NQYLLVQT2D2NCB5VW7YA2HT4IU/action/author_attestation","sign_citation":"https://pith.science/pith/NQYLLVQT2D2NCB5VW7YA2HT4IU/action/citation_signature","submit_replication":"https://pith.science/pith/NQYLLVQT2D2NCB5VW7YA2HT4IU/action/replication_record"}},"created_at":"2026-05-18T00:58:41.761598+00:00","updated_at":"2026-05-18T00:58:41.761598+00:00"}