{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:RRB5JRSMEMDZGTO7BEIUVV2G3E","short_pith_number":"pith:RRB5JRSM","canonical_record":{"source":{"id":"1304.1924","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2013-04-06T19:13:41Z","cross_cats_sorted":[],"title_canon_sha256":"12c23d40973893f306ca2b85bb2208860d37f180f69a676f24eb21d8cff74462","abstract_canon_sha256":"3faef9c2d2185ebf136a4b93bee7fb20d389c82a80b2d292aaadafdd7c12bd4e"},"schema_version":"1.0"},"canonical_sha256":"8c43d4c64c2307934ddf09114ad746d91dd1a47c2df623c95d058a8a8a022c77","source":{"kind":"arxiv","id":"1304.1924","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1304.1924","created_at":"2026-05-18T03:28:44Z"},{"alias_kind":"arxiv_version","alias_value":"1304.1924v1","created_at":"2026-05-18T03:28:44Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1304.1924","created_at":"2026-05-18T03:28:44Z"},{"alias_kind":"pith_short_12","alias_value":"RRB5JRSMEMDZ","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_16","alias_value":"RRB5JRSMEMDZGTO7","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_8","alias_value":"RRB5JRSM","created_at":"2026-05-18T12:27:59Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:RRB5JRSMEMDZGTO7BEIUVV2G3E","target":"record","payload":{"canonical_record":{"source":{"id":"1304.1924","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2013-04-06T19:13:41Z","cross_cats_sorted":[],"title_canon_sha256":"12c23d40973893f306ca2b85bb2208860d37f180f69a676f24eb21d8cff74462","abstract_canon_sha256":"3faef9c2d2185ebf136a4b93bee7fb20d389c82a80b2d292aaadafdd7c12bd4e"},"schema_version":"1.0"},"canonical_sha256":"8c43d4c64c2307934ddf09114ad746d91dd1a47c2df623c95d058a8a8a022c77","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:28:44.698112Z","signature_b64":"cDZ4d9J3EbW0WMXy9CMe9eOcDSZ6SZf8eo5r2LpqBHCMBIsbQGr5GQhbLhvzeeQGjSK9cyDlkz9xEMCnURgLAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8c43d4c64c2307934ddf09114ad746d91dd1a47c2df623c95d058a8a8a022c77","last_reissued_at":"2026-05-18T03:28:44.697285Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:28:44.697285Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1304.1924","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:28:44Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"lLdgoqacVwZ6JPBQiexPrdXXkrLtFcg5V7vwJ3Bv+Q750Otghq2884s+ObzM+Zs+DLSnvb6q8k/ON/NetqKZBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T12:27:40.280645Z"},"content_sha256":"cc53712dfc6aab4281f630c4f2c3f9f39cf9ba6aa41a2fba36653ae040ea1871","schema_version":"1.0","event_id":"sha256:cc53712dfc6aab4281f630c4f2c3f9f39cf9ba6aa41a2fba36653ae040ea1871"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:RRB5JRSMEMDZGTO7BEIUVV2G3E","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Automatic Detection of Search Tactic in Individual Information Seeking: A Hidden Markov Model Approach","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.IR","authors_text":"Daqing He, Shuguang Han, Zhen Yue","submitted_at":"2013-04-06T19:13:41Z","abstract_excerpt":"Information seeking process is an important topic in information seeking behavior research. Both qualitative and empirical methods have been adopted in analyzing information seeking processes, with major focus on uncovering the latent search tactics behind user behaviors. Most of the existing works require defining search tactics in advance and coding data manually. Among the few works that can recognize search tactics automatically, they missed making sense of those tactics. In this paper, we proposed using an automatic technique, i.e. the Hidden Markov Model (HMM), to explicitly model the se"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1304.1924","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:28:44Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"wqQYLRAL6PsVr9gkIQzLUBxOn4I5lBpjz3oYIHBkFeebT1oBMxu96/i0INSkPA3yf0xRxhx3T+hVbSNR4mNgAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T12:27:40.281257Z"},"content_sha256":"847b2ef73cd59ed83b1057d84309ef854cbbf354e5da7f6493714b35ef2f9601","schema_version":"1.0","event_id":"sha256:847b2ef73cd59ed83b1057d84309ef854cbbf354e5da7f6493714b35ef2f9601"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/RRB5JRSMEMDZGTO7BEIUVV2G3E/bundle.json","state_url":"https://pith.science/pith/RRB5JRSMEMDZGTO7BEIUVV2G3E/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/RRB5JRSMEMDZGTO7BEIUVV2G3E/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T12:27:40Z","links":{"resolver":"https://pith.science/pith/RRB5JRSMEMDZGTO7BEIUVV2G3E","bundle":"https://pith.science/pith/RRB5JRSMEMDZGTO7BEIUVV2G3E/bundle.json","state":"https://pith.science/pith/RRB5JRSMEMDZGTO7BEIUVV2G3E/state.json","well_known_bundle":"https://pith.science/.well-known/pith/RRB5JRSMEMDZGTO7BEIUVV2G3E/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:RRB5JRSMEMDZGTO7BEIUVV2G3E","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"3faef9c2d2185ebf136a4b93bee7fb20d389c82a80b2d292aaadafdd7c12bd4e","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2013-04-06T19:13:41Z","title_canon_sha256":"12c23d40973893f306ca2b85bb2208860d37f180f69a676f24eb21d8cff74462"},"schema_version":"1.0","source":{"id":"1304.1924","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1304.1924","created_at":"2026-05-18T03:28:44Z"},{"alias_kind":"arxiv_version","alias_value":"1304.1924v1","created_at":"2026-05-18T03:28:44Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1304.1924","created_at":"2026-05-18T03:28:44Z"},{"alias_kind":"pith_short_12","alias_value":"RRB5JRSMEMDZ","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_16","alias_value":"RRB5JRSMEMDZGTO7","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_8","alias_value":"RRB5JRSM","created_at":"2026-05-18T12:27:59Z"}],"graph_snapshots":[{"event_id":"sha256:847b2ef73cd59ed83b1057d84309ef854cbbf354e5da7f6493714b35ef2f9601","target":"graph","created_at":"2026-05-18T03:28:44Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Information seeking process is an important topic in information seeking behavior research. Both qualitative and empirical methods have been adopted in analyzing information seeking processes, with major focus on uncovering the latent search tactics behind user behaviors. Most of the existing works require defining search tactics in advance and coding data manually. Among the few works that can recognize search tactics automatically, they missed making sense of those tactics. In this paper, we proposed using an automatic technique, i.e. the Hidden Markov Model (HMM), to explicitly model the se","authors_text":"Daqing He, Shuguang Han, Zhen Yue","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2013-04-06T19:13:41Z","title":"Automatic Detection of Search Tactic in Individual Information Seeking: A Hidden Markov Model Approach"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1304.1924","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:cc53712dfc6aab4281f630c4f2c3f9f39cf9ba6aa41a2fba36653ae040ea1871","target":"record","created_at":"2026-05-18T03:28:44Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"3faef9c2d2185ebf136a4b93bee7fb20d389c82a80b2d292aaadafdd7c12bd4e","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2013-04-06T19:13:41Z","title_canon_sha256":"12c23d40973893f306ca2b85bb2208860d37f180f69a676f24eb21d8cff74462"},"schema_version":"1.0","source":{"id":"1304.1924","kind":"arxiv","version":1}},"canonical_sha256":"8c43d4c64c2307934ddf09114ad746d91dd1a47c2df623c95d058a8a8a022c77","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"8c43d4c64c2307934ddf09114ad746d91dd1a47c2df623c95d058a8a8a022c77","first_computed_at":"2026-05-18T03:28:44.697285Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:28:44.697285Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"cDZ4d9J3EbW0WMXy9CMe9eOcDSZ6SZf8eo5r2LpqBHCMBIsbQGr5GQhbLhvzeeQGjSK9cyDlkz9xEMCnURgLAA==","signature_status":"signed_v1","signed_at":"2026-05-18T03:28:44.698112Z","signed_message":"canonical_sha256_bytes"},"source_id":"1304.1924","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:cc53712dfc6aab4281f630c4f2c3f9f39cf9ba6aa41a2fba36653ae040ea1871","sha256:847b2ef73cd59ed83b1057d84309ef854cbbf354e5da7f6493714b35ef2f9601"],"state_sha256":"7e780c195f82211a48ec3803300945891980401ceb56bea9687436d36acba45d"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"GFPFnEkYNIHlrJddtURY9hT1Yj6iHATfvX9J4qmUZMQqPfhf9NepXj0G+Y2BKGXW4Dfr2RVF2ZsyvFN3sibIDA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T12:27:40.287023Z","bundle_sha256":"828dc310dbd344e90acc5f5b1f11ca88c3495131e21fdefa03560b5d3245449e"}}