{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:QHBY5CSJ3IIGQC723EJTLK7ZPL","short_pith_number":"pith:QHBY5CSJ","canonical_record":{"source":{"id":"1503.04768","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2015-03-16T19:01:10Z","cross_cats_sorted":["cs.GT"],"title_canon_sha256":"efe36bbf1163bf4cb5355c8661e6804a2d006d20d741921c56f3ebf34f8bcde5","abstract_canon_sha256":"0b8e03854b26cfac3a9bd83258d04953c3a6e88f23b3aee49182a6ed51b6f765"},"schema_version":"1.0"},"canonical_sha256":"81c38e8a49da10680bfad91335abf97afa1d4c83507ec39dac98e376a3922a1b","source":{"kind":"arxiv","id":"1503.04768","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1503.04768","created_at":"2026-05-18T01:35:26Z"},{"alias_kind":"arxiv_version","alias_value":"1503.04768v2","created_at":"2026-05-18T01:35:26Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1503.04768","created_at":"2026-05-18T01:35:26Z"},{"alias_kind":"pith_short_12","alias_value":"QHBY5CSJ3IIG","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_16","alias_value":"QHBY5CSJ3IIGQC72","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_8","alias_value":"QHBY5CSJ","created_at":"2026-05-18T12:29:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:QHBY5CSJ3IIGQC723EJTLK7ZPL","target":"record","payload":{"canonical_record":{"source":{"id":"1503.04768","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2015-03-16T19:01:10Z","cross_cats_sorted":["cs.GT"],"title_canon_sha256":"efe36bbf1163bf4cb5355c8661e6804a2d006d20d741921c56f3ebf34f8bcde5","abstract_canon_sha256":"0b8e03854b26cfac3a9bd83258d04953c3a6e88f23b3aee49182a6ed51b6f765"},"schema_version":"1.0"},"canonical_sha256":"81c38e8a49da10680bfad91335abf97afa1d4c83507ec39dac98e376a3922a1b","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:35:26.863013Z","signature_b64":"YVTu6q7hN6wBdPzJolsS1iBYHkE8u1+owvDQCMTllZuhwFycZeq2eZ5TacoJh9EcBgeO2ofxCTDxE51Zoa3sDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"81c38e8a49da10680bfad91335abf97afa1d4c83507ec39dac98e376a3922a1b","last_reissued_at":"2026-05-18T01:35:26.862493Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:35:26.862493Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1503.04768","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:35:26Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"nAq6uZXms3J5AH5dx5pYwEHJkBHsMNyRKGwa89kOgOvxQrBuwt+KS7M4PUH5ZPdJgeCShcqzFdaU9Cg2y+g0AA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T17:22:36.691812Z"},"content_sha256":"9b009e5c181b39b61c8e9c4d5a2610c24dfd4265aa35289832c5a6cb985a93a1","schema_version":"1.0","event_id":"sha256:9b009e5c181b39b61c8e9c4d5a2610c24dfd4265aa35289832c5a6cb985a93a1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:QHBY5CSJ3IIGQC723EJTLK7ZPL","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Self-organizing Networks of Information Gathering Cognitive Agents","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.GT"],"primary_cat":"cs.SI","authors_text":"Ahmed M. Alaa, Kartik Ahuja, Mihaela van der Schaar","submitted_at":"2015-03-16T19:01:10Z","abstract_excerpt":"In many scenarios, networks emerge endogenously as cognitive agents establish links in order to exchange information. Network formation has been widely studied in economics, but only on the basis of simplistic models that assume that the value of each additional piece of information is constant. In this paper we present a first model and associated analysis for network formation under the much more realistic assumption that the value of each additional piece of information depends on the type of that piece of information and on the information already possessed: information may be complementar"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1503.04768","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:35:26Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ya/oTUVvG8ln+nffnoraORFqD3f9IR/EqOLsx9keN6TSVpFOhtk0+bJPNJXTaoxBqOCrhpUalhwj/HZSkcdcCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T17:22:36.692201Z"},"content_sha256":"8d63568007da66c3be570bd2bc861500e719ead9da93a486a192f74ae90416f6","schema_version":"1.0","event_id":"sha256:8d63568007da66c3be570bd2bc861500e719ead9da93a486a192f74ae90416f6"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/QHBY5CSJ3IIGQC723EJTLK7ZPL/bundle.json","state_url":"https://pith.science/pith/QHBY5CSJ3IIGQC723EJTLK7ZPL/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/QHBY5CSJ3IIGQC723EJTLK7ZPL/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T17:22:36Z","links":{"resolver":"https://pith.science/pith/QHBY5CSJ3IIGQC723EJTLK7ZPL","bundle":"https://pith.science/pith/QHBY5CSJ3IIGQC723EJTLK7ZPL/bundle.json","state":"https://pith.science/pith/QHBY5CSJ3IIGQC723EJTLK7ZPL/state.json","well_known_bundle":"https://pith.science/.well-known/pith/QHBY5CSJ3IIGQC723EJTLK7ZPL/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:QHBY5CSJ3IIGQC723EJTLK7ZPL","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"0b8e03854b26cfac3a9bd83258d04953c3a6e88f23b3aee49182a6ed51b6f765","cross_cats_sorted":["cs.GT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2015-03-16T19:01:10Z","title_canon_sha256":"efe36bbf1163bf4cb5355c8661e6804a2d006d20d741921c56f3ebf34f8bcde5"},"schema_version":"1.0","source":{"id":"1503.04768","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1503.04768","created_at":"2026-05-18T01:35:26Z"},{"alias_kind":"arxiv_version","alias_value":"1503.04768v2","created_at":"2026-05-18T01:35:26Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1503.04768","created_at":"2026-05-18T01:35:26Z"},{"alias_kind":"pith_short_12","alias_value":"QHBY5CSJ3IIG","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_16","alias_value":"QHBY5CSJ3IIGQC72","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_8","alias_value":"QHBY5CSJ","created_at":"2026-05-18T12:29:37Z"}],"graph_snapshots":[{"event_id":"sha256:8d63568007da66c3be570bd2bc861500e719ead9da93a486a192f74ae90416f6","target":"graph","created_at":"2026-05-18T01:35:26Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In many scenarios, networks emerge endogenously as cognitive agents establish links in order to exchange information. Network formation has been widely studied in economics, but only on the basis of simplistic models that assume that the value of each additional piece of information is constant. In this paper we present a first model and associated analysis for network formation under the much more realistic assumption that the value of each additional piece of information depends on the type of that piece of information and on the information already possessed: information may be complementar","authors_text":"Ahmed M. Alaa, Kartik Ahuja, Mihaela van der Schaar","cross_cats":["cs.GT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2015-03-16T19:01:10Z","title":"Self-organizing Networks of Information Gathering Cognitive Agents"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1503.04768","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:9b009e5c181b39b61c8e9c4d5a2610c24dfd4265aa35289832c5a6cb985a93a1","target":"record","created_at":"2026-05-18T01:35:26Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"0b8e03854b26cfac3a9bd83258d04953c3a6e88f23b3aee49182a6ed51b6f765","cross_cats_sorted":["cs.GT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2015-03-16T19:01:10Z","title_canon_sha256":"efe36bbf1163bf4cb5355c8661e6804a2d006d20d741921c56f3ebf34f8bcde5"},"schema_version":"1.0","source":{"id":"1503.04768","kind":"arxiv","version":2}},"canonical_sha256":"81c38e8a49da10680bfad91335abf97afa1d4c83507ec39dac98e376a3922a1b","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"81c38e8a49da10680bfad91335abf97afa1d4c83507ec39dac98e376a3922a1b","first_computed_at":"2026-05-18T01:35:26.862493Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:35:26.862493Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"YVTu6q7hN6wBdPzJolsS1iBYHkE8u1+owvDQCMTllZuhwFycZeq2eZ5TacoJh9EcBgeO2ofxCTDxE51Zoa3sDA==","signature_status":"signed_v1","signed_at":"2026-05-18T01:35:26.863013Z","signed_message":"canonical_sha256_bytes"},"source_id":"1503.04768","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:9b009e5c181b39b61c8e9c4d5a2610c24dfd4265aa35289832c5a6cb985a93a1","sha256:8d63568007da66c3be570bd2bc861500e719ead9da93a486a192f74ae90416f6"],"state_sha256":"0d217824ecfb960c60a615a1534751a7261321835ea6c686e52e8c4b04da20dd"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ObZM/o4CAOtNjYte6FGl87d4bp1At9JevXxzF1Hcj2ERsEelmh64QVLLRcsn8oHXX6Nt8glfK5bcggCDVdGeCA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T17:22:36.694586Z","bundle_sha256":"e3daae227d5db16d236a3ba7a0ea8eb7e646da3c692861e919b302beb883fe4b"}}