{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2008:PWVSLER5KLJPKBQB5T33TTZ6QM","short_pith_number":"pith:PWVSLER5","canonical_record":{"source":{"id":"0805.2996","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2008-05-20T02:45:47Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"d70e37e2bccfa703c420aaa66f622aa6fae68896f1f3554c220f14d794dce590","abstract_canon_sha256":"8a4d30b00e2cacde087b9a6a03f79334b729812e3ff04543e3be290f9c03c7ec"},"schema_version":"1.0"},"canonical_sha256":"7dab25923d52d2f50601ecf7b9cf3e8319d0b230c84634a43abe5242b621b09d","source":{"kind":"arxiv","id":"0805.2996","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"0805.2996","created_at":"2026-05-18T00:58:25Z"},{"alias_kind":"arxiv_version","alias_value":"0805.2996v1","created_at":"2026-05-18T00:58:25Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.0805.2996","created_at":"2026-05-18T00:58:25Z"},{"alias_kind":"pith_short_12","alias_value":"PWVSLER5KLJP","created_at":"2026-05-18T12:25:57Z"},{"alias_kind":"pith_short_16","alias_value":"PWVSLER5KLJPKBQB","created_at":"2026-05-18T12:25:57Z"},{"alias_kind":"pith_short_8","alias_value":"PWVSLER5","created_at":"2026-05-18T12:25:57Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2008:PWVSLER5KLJPKBQB5T33TTZ6QM","target":"record","payload":{"canonical_record":{"source":{"id":"0805.2996","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2008-05-20T02:45:47Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"d70e37e2bccfa703c420aaa66f622aa6fae68896f1f3554c220f14d794dce590","abstract_canon_sha256":"8a4d30b00e2cacde087b9a6a03f79334b729812e3ff04543e3be290f9c03c7ec"},"schema_version":"1.0"},"canonical_sha256":"7dab25923d52d2f50601ecf7b9cf3e8319d0b230c84634a43abe5242b621b09d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:58:25.587098Z","signature_b64":"aJ60TqY7eyPkA2p+7lyM4DFDGj4p3NlvO4QjOO9WeT7Ta73iAoU22aU7fL9ZPqaPlSGDfwFxmclZnToCrCPPCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"7dab25923d52d2f50601ecf7b9cf3e8319d0b230c84634a43abe5242b621b09d","last_reissued_at":"2026-05-18T00:58:25.586405Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:58:25.586405Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"0805.2996","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:25Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Ii7tLGtBNlAfBx20784qLQ5GbRusn3YhrBVxyEECXcC52FAxJD/JnDG9+NLDzdV+EZc5Z1zb2R8VPrWZs+u5Bg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T05:28:25.494817Z"},"content_sha256":"5af95e80fc960dd27cb53c907f90764a0475f5342d5c2b3d679df1777d3f2fa1","schema_version":"1.0","event_id":"sha256:5af95e80fc960dd27cb53c907f90764a0475f5342d5c2b3d679df1777d3f2fa1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2008:PWVSLER5KLJPKBQB5T33TTZ6QM","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Lossy Source Transmission over the Relay Channel","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Andrea J. Goldsmith, Deniz Gunduz, Elza Erkip, H. Vincent Poor","submitted_at":"2008-05-20T02:45:47Z","abstract_excerpt":"Lossy transmission over a relay channel in which the relay has access to correlated side information is considered. First, a joint source-channel decode-and-forward scheme is proposed for general discrete memoryless sources and channels. Then the Gaussian relay channel where the source and the side information are jointly Gaussian is analyzed. For this Gaussian model, several new source-channel cooperation schemes are introduced and analyzed in terms of the squared-error distortion at the destination. A comparison of the proposed upper bounds with the cut-set lower bound is given, and it is se"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"0805.2996","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:25Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"DtgMHs1c4DxbLT9+Ib3a30ZI1hPiqqA1JxfjJO823ZiWmYsR8+llVW+QTTi+QbSQQZYOEaZUXqslkr5/hVEXBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T05:28:25.495469Z"},"content_sha256":"7fca53d54393a25c0b283895168130e2b809943471f9894ec7ba7165cec779b8","schema_version":"1.0","event_id":"sha256:7fca53d54393a25c0b283895168130e2b809943471f9894ec7ba7165cec779b8"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/PWVSLER5KLJPKBQB5T33TTZ6QM/bundle.json","state_url":"https://pith.science/pith/PWVSLER5KLJPKBQB5T33TTZ6QM/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/PWVSLER5KLJPKBQB5T33TTZ6QM/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T05:28:25Z","links":{"resolver":"https://pith.science/pith/PWVSLER5KLJPKBQB5T33TTZ6QM","bundle":"https://pith.science/pith/PWVSLER5KLJPKBQB5T33TTZ6QM/bundle.json","state":"https://pith.science/pith/PWVSLER5KLJPKBQB5T33TTZ6QM/state.json","well_known_bundle":"https://pith.science/.well-known/pith/PWVSLER5KLJPKBQB5T33TTZ6QM/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2008:PWVSLER5KLJPKBQB5T33TTZ6QM","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"8a4d30b00e2cacde087b9a6a03f79334b729812e3ff04543e3be290f9c03c7ec","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2008-05-20T02:45:47Z","title_canon_sha256":"d70e37e2bccfa703c420aaa66f622aa6fae68896f1f3554c220f14d794dce590"},"schema_version":"1.0","source":{"id":"0805.2996","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"0805.2996","created_at":"2026-05-18T00:58:25Z"},{"alias_kind":"arxiv_version","alias_value":"0805.2996v1","created_at":"2026-05-18T00:58:25Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.0805.2996","created_at":"2026-05-18T00:58:25Z"},{"alias_kind":"pith_short_12","alias_value":"PWVSLER5KLJP","created_at":"2026-05-18T12:25:57Z"},{"alias_kind":"pith_short_16","alias_value":"PWVSLER5KLJPKBQB","created_at":"2026-05-18T12:25:57Z"},{"alias_kind":"pith_short_8","alias_value":"PWVSLER5","created_at":"2026-05-18T12:25:57Z"}],"graph_snapshots":[{"event_id":"sha256:7fca53d54393a25c0b283895168130e2b809943471f9894ec7ba7165cec779b8","target":"graph","created_at":"2026-05-18T00:58:25Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Lossy transmission over a relay channel in which the relay has access to correlated side information is considered. First, a joint source-channel decode-and-forward scheme is proposed for general discrete memoryless sources and channels. Then the Gaussian relay channel where the source and the side information are jointly Gaussian is analyzed. For this Gaussian model, several new source-channel cooperation schemes are introduced and analyzed in terms of the squared-error distortion at the destination. A comparison of the proposed upper bounds with the cut-set lower bound is given, and it is se","authors_text":"Andrea J. Goldsmith, Deniz Gunduz, Elza Erkip, H. Vincent Poor","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2008-05-20T02:45:47Z","title":"Lossy Source Transmission over the Relay Channel"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"0805.2996","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:5af95e80fc960dd27cb53c907f90764a0475f5342d5c2b3d679df1777d3f2fa1","target":"record","created_at":"2026-05-18T00:58:25Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"8a4d30b00e2cacde087b9a6a03f79334b729812e3ff04543e3be290f9c03c7ec","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2008-05-20T02:45:47Z","title_canon_sha256":"d70e37e2bccfa703c420aaa66f622aa6fae68896f1f3554c220f14d794dce590"},"schema_version":"1.0","source":{"id":"0805.2996","kind":"arxiv","version":1}},"canonical_sha256":"7dab25923d52d2f50601ecf7b9cf3e8319d0b230c84634a43abe5242b621b09d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"7dab25923d52d2f50601ecf7b9cf3e8319d0b230c84634a43abe5242b621b09d","first_computed_at":"2026-05-18T00:58:25.586405Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:58:25.586405Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"aJ60TqY7eyPkA2p+7lyM4DFDGj4p3NlvO4QjOO9WeT7Ta73iAoU22aU7fL9ZPqaPlSGDfwFxmclZnToCrCPPCw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:58:25.587098Z","signed_message":"canonical_sha256_bytes"},"source_id":"0805.2996","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:5af95e80fc960dd27cb53c907f90764a0475f5342d5c2b3d679df1777d3f2fa1","sha256:7fca53d54393a25c0b283895168130e2b809943471f9894ec7ba7165cec779b8"],"state_sha256":"55b4d6312d39a109d9c10b8ad375563a34f6288d5d89812f758e9ff629c21992"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"HhIsXm+dIAmSD7IspoCXsQeI+eHJT5FTyJcpgaBaMrqgH6cQSRgL8I1g0UpFu9XFkXLF6O/vA/nz08zakPEMAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T05:28:25.499411Z","bundle_sha256":"585e7bfa2df59e07139bbd99dfe1c92cd80658faa7f6cbd514529440a472a69c"}}