{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:OMQRVVPK4AXVACXPSVFTA2VKLH","short_pith_number":"pith:OMQRVVPK","canonical_record":{"source":{"id":"1509.08001","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-09-26T16:01:26Z","cross_cats_sorted":["cs.DC","cs.IT","math.IT"],"title_canon_sha256":"283bb999354ded4a6b80c1ebed2da6228831fad601657997e4b4004b8d546fb5","abstract_canon_sha256":"d7f0204c9dcc7dadfbee225d43441edda63e7835cff1fb967a4d8acf374a547d"},"schema_version":"1.0"},"canonical_sha256":"73211ad5eae02f500aef954b306aaa59c38f31bb8e38b35b6ca1910903294cc8","source":{"kind":"arxiv","id":"1509.08001","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1509.08001","created_at":"2026-05-18T01:31:54Z"},{"alias_kind":"arxiv_version","alias_value":"1509.08001v1","created_at":"2026-05-18T01:31:54Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1509.08001","created_at":"2026-05-18T01:31:54Z"},{"alias_kind":"pith_short_12","alias_value":"OMQRVVPK4AXV","created_at":"2026-05-18T12:29:34Z"},{"alias_kind":"pith_short_16","alias_value":"OMQRVVPK4AXVACXP","created_at":"2026-05-18T12:29:34Z"},{"alias_kind":"pith_short_8","alias_value":"OMQRVVPK","created_at":"2026-05-18T12:29:34Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:OMQRVVPK4AXVACXPSVFTA2VKLH","target":"record","payload":{"canonical_record":{"source":{"id":"1509.08001","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-09-26T16:01:26Z","cross_cats_sorted":["cs.DC","cs.IT","math.IT"],"title_canon_sha256":"283bb999354ded4a6b80c1ebed2da6228831fad601657997e4b4004b8d546fb5","abstract_canon_sha256":"d7f0204c9dcc7dadfbee225d43441edda63e7835cff1fb967a4d8acf374a547d"},"schema_version":"1.0"},"canonical_sha256":"73211ad5eae02f500aef954b306aaa59c38f31bb8e38b35b6ca1910903294cc8","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:31:54.955074Z","signature_b64":"m1DbgDVckaYcIyCuGbL+dj4LQXqL5mYuIpDUD/VVwaISMH7SJcnW8/VCibrXwsaQtzshpSM4vuXM3Or1/t/QAw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"73211ad5eae02f500aef954b306aaa59c38f31bb8e38b35b6ca1910903294cc8","last_reissued_at":"2026-05-18T01:31:54.954662Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:31:54.954662Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1509.08001","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:31:54Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"mHF17pfNXWdvtxvp3wX2GLBamHlrG4f6LPUfBIIoGxt8xmOIkph897shiDQU+wbcIMlYag4e01ClXOnmkca+BQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T19:27:40.068012Z"},"content_sha256":"ed2f0185303db402b2685c7064a02dafde0b271325d9cc5612c2974c9f44d684","schema_version":"1.0","event_id":"sha256:ed2f0185303db402b2685c7064a02dafde0b271325d9cc5612c2974c9f44d684"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:OMQRVVPK4AXVACXPSVFTA2VKLH","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Approaching Single-Hop Performance in Multi-Hop Networks: End-To-End Known-Interference Cancellation (E2E-KIC)","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.DC","cs.IT","math.IT"],"primary_cat":"cs.NI","authors_text":"Abbas Jamalipour, Fanzhao Wang, Lei Guo, Qingyang Song, Shiqiang Wang","submitted_at":"2015-09-26T16:01:26Z","abstract_excerpt":"To improve the efficiency of wireless data communications, new physical-layer transmission methods based on known-interference cancellation (KIC) have been developed. These methods share the common idea that the interference can be cancelled when the content of it is known. Existing work on KIC mainly focuses on single-hop or two-hop networks, with physical-layer network coding (PNC) and full-duplex (FD) communications as typical examples. This paper extends the idea of KIC to general multi-hop networks, and proposes an end-to-end KIC (E2E-KIC) transmission method together with its MAC design."},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1509.08001","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:31:54Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"qae9GAk8Ln1udNvOLO3CyUBkya4FtXEZ8FCm+2uTVPkwPy5P3fhqfE+3k9i8G82EwHJaB2qwgq8386NlSNcgDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T19:27:40.068578Z"},"content_sha256":"ffef6f8037c46eb82c2e5c89fba1c4b89411bdc6655a6233858087a51565988d","schema_version":"1.0","event_id":"sha256:ffef6f8037c46eb82c2e5c89fba1c4b89411bdc6655a6233858087a51565988d"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/OMQRVVPK4AXVACXPSVFTA2VKLH/bundle.json","state_url":"https://pith.science/pith/OMQRVVPK4AXVACXPSVFTA2VKLH/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/OMQRVVPK4AXVACXPSVFTA2VKLH/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-18T19:27:40Z","links":{"resolver":"https://pith.science/pith/OMQRVVPK4AXVACXPSVFTA2VKLH","bundle":"https://pith.science/pith/OMQRVVPK4AXVACXPSVFTA2VKLH/bundle.json","state":"https://pith.science/pith/OMQRVVPK4AXVACXPSVFTA2VKLH/state.json","well_known_bundle":"https://pith.science/.well-known/pith/OMQRVVPK4AXVACXPSVFTA2VKLH/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:OMQRVVPK4AXVACXPSVFTA2VKLH","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"d7f0204c9dcc7dadfbee225d43441edda63e7835cff1fb967a4d8acf374a547d","cross_cats_sorted":["cs.DC","cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-09-26T16:01:26Z","title_canon_sha256":"283bb999354ded4a6b80c1ebed2da6228831fad601657997e4b4004b8d546fb5"},"schema_version":"1.0","source":{"id":"1509.08001","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1509.08001","created_at":"2026-05-18T01:31:54Z"},{"alias_kind":"arxiv_version","alias_value":"1509.08001v1","created_at":"2026-05-18T01:31:54Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1509.08001","created_at":"2026-05-18T01:31:54Z"},{"alias_kind":"pith_short_12","alias_value":"OMQRVVPK4AXV","created_at":"2026-05-18T12:29:34Z"},{"alias_kind":"pith_short_16","alias_value":"OMQRVVPK4AXVACXP","created_at":"2026-05-18T12:29:34Z"},{"alias_kind":"pith_short_8","alias_value":"OMQRVVPK","created_at":"2026-05-18T12:29:34Z"}],"graph_snapshots":[{"event_id":"sha256:ffef6f8037c46eb82c2e5c89fba1c4b89411bdc6655a6233858087a51565988d","target":"graph","created_at":"2026-05-18T01:31:54Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"To improve the efficiency of wireless data communications, new physical-layer transmission methods based on known-interference cancellation (KIC) have been developed. These methods share the common idea that the interference can be cancelled when the content of it is known. Existing work on KIC mainly focuses on single-hop or two-hop networks, with physical-layer network coding (PNC) and full-duplex (FD) communications as typical examples. This paper extends the idea of KIC to general multi-hop networks, and proposes an end-to-end KIC (E2E-KIC) transmission method together with its MAC design.","authors_text":"Abbas Jamalipour, Fanzhao Wang, Lei Guo, Qingyang Song, Shiqiang Wang","cross_cats":["cs.DC","cs.IT","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-09-26T16:01:26Z","title":"Approaching Single-Hop Performance in Multi-Hop Networks: End-To-End Known-Interference Cancellation (E2E-KIC)"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1509.08001","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ed2f0185303db402b2685c7064a02dafde0b271325d9cc5612c2974c9f44d684","target":"record","created_at":"2026-05-18T01:31:54Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"d7f0204c9dcc7dadfbee225d43441edda63e7835cff1fb967a4d8acf374a547d","cross_cats_sorted":["cs.DC","cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2015-09-26T16:01:26Z","title_canon_sha256":"283bb999354ded4a6b80c1ebed2da6228831fad601657997e4b4004b8d546fb5"},"schema_version":"1.0","source":{"id":"1509.08001","kind":"arxiv","version":1}},"canonical_sha256":"73211ad5eae02f500aef954b306aaa59c38f31bb8e38b35b6ca1910903294cc8","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"73211ad5eae02f500aef954b306aaa59c38f31bb8e38b35b6ca1910903294cc8","first_computed_at":"2026-05-18T01:31:54.954662Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:31:54.954662Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"m1DbgDVckaYcIyCuGbL+dj4LQXqL5mYuIpDUD/VVwaISMH7SJcnW8/VCibrXwsaQtzshpSM4vuXM3Or1/t/QAw==","signature_status":"signed_v1","signed_at":"2026-05-18T01:31:54.955074Z","signed_message":"canonical_sha256_bytes"},"source_id":"1509.08001","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ed2f0185303db402b2685c7064a02dafde0b271325d9cc5612c2974c9f44d684","sha256:ffef6f8037c46eb82c2e5c89fba1c4b89411bdc6655a6233858087a51565988d"],"state_sha256":"e39198ee3d83beb3d060fd18e5dfd7f3167c288425b9f61e72e568ad750b8766"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"QwXwwZPgpBIcKeUxi+Mm7hzlRpNgXi6MOHaLXa1aoVQvQ7/toSYyeKbseLxEjMA8guIm1Yzz42wjtNL3RxvEAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-18T19:27:40.070380Z","bundle_sha256":"b74dd50ec75dbd705ee36b96a65db5ae83f9c9a82da1f2ee1eca4b2667b0cb29"}}