{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2010:RIWMVQ52PCASGYSLOOYWWXUIHY","short_pith_number":"pith:RIWMVQ52","canonical_record":{"source":{"id":"1008.0147","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-08-01T04:33:27Z","cross_cats_sorted":["cs.MA"],"title_canon_sha256":"972a777bf5add1011ac2c10fe42effb4ba193a27d7ceba4ee75814bfe28c6f64","abstract_canon_sha256":"357167ef054a02dbe8f710386776337d264a499494faf922ec0a1ca40311ad99"},"schema_version":"1.0"},"canonical_sha256":"8a2ccac3ba788123624b73b16b5e883e0e7a20507392a320d3e10305d2efa20e","source":{"kind":"arxiv","id":"1008.0147","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.0147","created_at":"2026-05-18T04:42:43Z"},{"alias_kind":"arxiv_version","alias_value":"1008.0147v1","created_at":"2026-05-18T04:42:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.0147","created_at":"2026-05-18T04:42:43Z"},{"alias_kind":"pith_short_12","alias_value":"RIWMVQ52PCAS","created_at":"2026-05-18T12:26:13Z"},{"alias_kind":"pith_short_16","alias_value":"RIWMVQ52PCASGYSL","created_at":"2026-05-18T12:26:13Z"},{"alias_kind":"pith_short_8","alias_value":"RIWMVQ52","created_at":"2026-05-18T12:26:13Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2010:RIWMVQ52PCASGYSLOOYWWXUIHY","target":"record","payload":{"canonical_record":{"source":{"id":"1008.0147","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-08-01T04:33:27Z","cross_cats_sorted":["cs.MA"],"title_canon_sha256":"972a777bf5add1011ac2c10fe42effb4ba193a27d7ceba4ee75814bfe28c6f64","abstract_canon_sha256":"357167ef054a02dbe8f710386776337d264a499494faf922ec0a1ca40311ad99"},"schema_version":"1.0"},"canonical_sha256":"8a2ccac3ba788123624b73b16b5e883e0e7a20507392a320d3e10305d2efa20e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:42:43.962454Z","signature_b64":"bK9AFjnfd+V7ldrjkKHhCXBkUrisKrlMUbKO9EOqKgKlJKOUT6NFfatC93N3txQBvU4clDMbgUvGtxQysNWPDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8a2ccac3ba788123624b73b16b5e883e0e7a20507392a320d3e10305d2efa20e","last_reissued_at":"2026-05-18T04:42:43.961758Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:42:43.961758Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1008.0147","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:42:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"swqXw2VEziSSCtZ6kCgXmUyN/ne3rM4t4RrUQbRbzcZFKU+T3WidOjUVTxETgBjk4eAohaC4C0fIetNpkq1tAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T17:47:49.757549Z"},"content_sha256":"adc8139814fda1ed6f36df1da9777cc3b5d5a7ebeb5086ce7d4e17cd887ec68d","schema_version":"1.0","event_id":"sha256:adc8139814fda1ed6f36df1da9777cc3b5d5a7ebeb5086ce7d4e17cd887ec68d"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2010:RIWMVQ52PCASGYSLOOYWWXUIHY","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Intervention Mechanism Design for Networks With Selfish Users","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.MA"],"primary_cat":"cs.GT","authors_text":"Jaeok Park, Mihaela van der Schaar","submitted_at":"2010-08-01T04:33:27Z","abstract_excerpt":"We consider a multi-user network where a network manager and selfish users interact. The network manager monitors the behavior of users and intervenes in the interaction among users if necessary, while users make decisions independently to optimize their individual objectives. In this paper, we develop a framework of intervention mechanism design, which is aimed to optimize the objective of the manager, or the network performance, taking the incentives of selfish users into account. Our framework is general enough to cover a wide range of application scenarios, and it has advantages over exist"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.0147","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:42:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"TULrF70ELwJYUrecYHm5Al4sR8OE7E3J9HkCbguuf2Jwk60cw6KLL/Wo0UZjGxXigZAz/uV3p37zmus7EbJwCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T17:47:49.757920Z"},"content_sha256":"ef1357a990b85dc74255e2f777d8932e45ef6d2112904b236f4582d24b3e5aad","schema_version":"1.0","event_id":"sha256:ef1357a990b85dc74255e2f777d8932e45ef6d2112904b236f4582d24b3e5aad"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/RIWMVQ52PCASGYSLOOYWWXUIHY/bundle.json","state_url":"https://pith.science/pith/RIWMVQ52PCASGYSLOOYWWXUIHY/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/RIWMVQ52PCASGYSLOOYWWXUIHY/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T17:47:49Z","links":{"resolver":"https://pith.science/pith/RIWMVQ52PCASGYSLOOYWWXUIHY","bundle":"https://pith.science/pith/RIWMVQ52PCASGYSLOOYWWXUIHY/bundle.json","state":"https://pith.science/pith/RIWMVQ52PCASGYSLOOYWWXUIHY/state.json","well_known_bundle":"https://pith.science/.well-known/pith/RIWMVQ52PCASGYSLOOYWWXUIHY/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2010:RIWMVQ52PCASGYSLOOYWWXUIHY","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"357167ef054a02dbe8f710386776337d264a499494faf922ec0a1ca40311ad99","cross_cats_sorted":["cs.MA"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-08-01T04:33:27Z","title_canon_sha256":"972a777bf5add1011ac2c10fe42effb4ba193a27d7ceba4ee75814bfe28c6f64"},"schema_version":"1.0","source":{"id":"1008.0147","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.0147","created_at":"2026-05-18T04:42:43Z"},{"alias_kind":"arxiv_version","alias_value":"1008.0147v1","created_at":"2026-05-18T04:42:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.0147","created_at":"2026-05-18T04:42:43Z"},{"alias_kind":"pith_short_12","alias_value":"RIWMVQ52PCAS","created_at":"2026-05-18T12:26:13Z"},{"alias_kind":"pith_short_16","alias_value":"RIWMVQ52PCASGYSL","created_at":"2026-05-18T12:26:13Z"},{"alias_kind":"pith_short_8","alias_value":"RIWMVQ52","created_at":"2026-05-18T12:26:13Z"}],"graph_snapshots":[{"event_id":"sha256:ef1357a990b85dc74255e2f777d8932e45ef6d2112904b236f4582d24b3e5aad","target":"graph","created_at":"2026-05-18T04:42:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We consider a multi-user network where a network manager and selfish users interact. The network manager monitors the behavior of users and intervenes in the interaction among users if necessary, while users make decisions independently to optimize their individual objectives. In this paper, we develop a framework of intervention mechanism design, which is aimed to optimize the objective of the manager, or the network performance, taking the incentives of selfish users into account. Our framework is general enough to cover a wide range of application scenarios, and it has advantages over exist","authors_text":"Jaeok Park, Mihaela van der Schaar","cross_cats":["cs.MA"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-08-01T04:33:27Z","title":"Intervention Mechanism Design for Networks With Selfish Users"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.0147","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:adc8139814fda1ed6f36df1da9777cc3b5d5a7ebeb5086ce7d4e17cd887ec68d","target":"record","created_at":"2026-05-18T04:42:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"357167ef054a02dbe8f710386776337d264a499494faf922ec0a1ca40311ad99","cross_cats_sorted":["cs.MA"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2010-08-01T04:33:27Z","title_canon_sha256":"972a777bf5add1011ac2c10fe42effb4ba193a27d7ceba4ee75814bfe28c6f64"},"schema_version":"1.0","source":{"id":"1008.0147","kind":"arxiv","version":1}},"canonical_sha256":"8a2ccac3ba788123624b73b16b5e883e0e7a20507392a320d3e10305d2efa20e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"8a2ccac3ba788123624b73b16b5e883e0e7a20507392a320d3e10305d2efa20e","first_computed_at":"2026-05-18T04:42:43.961758Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T04:42:43.961758Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"bK9AFjnfd+V7ldrjkKHhCXBkUrisKrlMUbKO9EOqKgKlJKOUT6NFfatC93N3txQBvU4clDMbgUvGtxQysNWPDw==","signature_status":"signed_v1","signed_at":"2026-05-18T04:42:43.962454Z","signed_message":"canonical_sha256_bytes"},"source_id":"1008.0147","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:adc8139814fda1ed6f36df1da9777cc3b5d5a7ebeb5086ce7d4e17cd887ec68d","sha256:ef1357a990b85dc74255e2f777d8932e45ef6d2112904b236f4582d24b3e5aad"],"state_sha256":"22ffe468b0351caab97d15b206edf507ac284753c3600aa798153302af92f3f6"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"lmoLoiNOYOZZZfXApYQEn6OKnYg0cy2mkk8EEzUrDgc3USLTtGX+wQMDxnXWaxpmY8ucFDTptvIVeIBCTbWSDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T17:47:49.760410Z","bundle_sha256":"f91d5a39f7f443517287f0f05643aae3d11d436145afda634059cbf80b168bb8"}}