{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2011:RXAO2XD2CCR2TLJADMY7ITMQEH","short_pith_number":"pith:RXAO2XD2","canonical_record":{"source":{"id":"1102.2516","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2011-02-12T14:44:12Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"cfa7a489c3da50ca7a9bd9ad23914a8545f98499c56aa5dd4acc499c4cde06d8","abstract_canon_sha256":"8ca2a01064c188712066899de8627211ff4e79388d48faaff1f05a4141503af4"},"schema_version":"1.0"},"canonical_sha256":"8dc0ed5c7a10a3a9ad201b31f44d9021c2c3e6376ff2cc30aeb13ca25d9d6d8e","source":{"kind":"arxiv","id":"1102.2516","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1102.2516","created_at":"2026-05-18T00:57:57Z"},{"alias_kind":"arxiv_version","alias_value":"1102.2516v1","created_at":"2026-05-18T00:57:57Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1102.2516","created_at":"2026-05-18T00:57:57Z"},{"alias_kind":"pith_short_12","alias_value":"RXAO2XD2CCR2","created_at":"2026-05-18T12:26:41Z"},{"alias_kind":"pith_short_16","alias_value":"RXAO2XD2CCR2TLJA","created_at":"2026-05-18T12:26:41Z"},{"alias_kind":"pith_short_8","alias_value":"RXAO2XD2","created_at":"2026-05-18T12:26:41Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2011:RXAO2XD2CCR2TLJADMY7ITMQEH","target":"record","payload":{"canonical_record":{"source":{"id":"1102.2516","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2011-02-12T14:44:12Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"cfa7a489c3da50ca7a9bd9ad23914a8545f98499c56aa5dd4acc499c4cde06d8","abstract_canon_sha256":"8ca2a01064c188712066899de8627211ff4e79388d48faaff1f05a4141503af4"},"schema_version":"1.0"},"canonical_sha256":"8dc0ed5c7a10a3a9ad201b31f44d9021c2c3e6376ff2cc30aeb13ca25d9d6d8e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:57:57.466905Z","signature_b64":"/6czpsq52XNi8TwCCHp6CxMcFQ5sWTOxrkICbLvSEcJU9OqrerqSD5IoGkeWiPXQFCijf4zws7U/47pwATooDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8dc0ed5c7a10a3a9ad201b31f44d9021c2c3e6376ff2cc30aeb13ca25d9d6d8e","last_reissued_at":"2026-05-18T00:57:57.466451Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:57:57.466451Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1102.2516","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:57:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"DnbdYbP+aa11yX2sdGHqUDfEpQdFfQvO64FRxODjIszSY2LYHmXyP9FVCHzyjlk0VI0eHOafkubq8H2C99ZSBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T18:30:28.171898Z"},"content_sha256":"4f82129c508be2ec68286b9cb679903722caa830c5f1dcf826834947225909b7","schema_version":"1.0","event_id":"sha256:4f82129c508be2ec68286b9cb679903722caa830c5f1dcf826834947225909b7"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2011:RXAO2XD2CCR2TLJADMY7ITMQEH","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"High Throughput Random Access via Codes on Graphs: Coded Slotted ALOHA","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Enrico Paolini, Gianluigi Liva, Marco Chiani","submitted_at":"2011-02-12T14:44:12Z","abstract_excerpt":"In this paper, coded slotted ALOHA (CSA) is introduced as a powerful random access scheme to the MAC frame. In CSA, the burst a generic user wishes to transmit in the MAC frame is first split into segments, and these segments are then encoded through a local a packet-oriented code prior to transmission. On the receiver side, iterative interference cancellation combined with decoding of the local code is performed to recover from collisions. The new scheme generalizes the previously proposed irregular repetition slotted ALOHA (IRSA) technique, based on a simple repetition of the users' bursts. "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1102.2516","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:57:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pUq3cWA9pkoh3Lm3L6BV83er8lta3MPyQjqWx5c/6Od6YZMVfnvvDoix5dx2b8N3YpKphVc6+lABD9b5EFWuAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T18:30:28.172482Z"},"content_sha256":"d04510bd5d1bb557b4dbd805878444e5dd4b23a14ecd1e84dac900627d164993","schema_version":"1.0","event_id":"sha256:d04510bd5d1bb557b4dbd805878444e5dd4b23a14ecd1e84dac900627d164993"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/RXAO2XD2CCR2TLJADMY7ITMQEH/bundle.json","state_url":"https://pith.science/pith/RXAO2XD2CCR2TLJADMY7ITMQEH/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/RXAO2XD2CCR2TLJADMY7ITMQEH/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-18T18:30:28Z","links":{"resolver":"https://pith.science/pith/RXAO2XD2CCR2TLJADMY7ITMQEH","bundle":"https://pith.science/pith/RXAO2XD2CCR2TLJADMY7ITMQEH/bundle.json","state":"https://pith.science/pith/RXAO2XD2CCR2TLJADMY7ITMQEH/state.json","well_known_bundle":"https://pith.science/.well-known/pith/RXAO2XD2CCR2TLJADMY7ITMQEH/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2011:RXAO2XD2CCR2TLJADMY7ITMQEH","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"8ca2a01064c188712066899de8627211ff4e79388d48faaff1f05a4141503af4","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2011-02-12T14:44:12Z","title_canon_sha256":"cfa7a489c3da50ca7a9bd9ad23914a8545f98499c56aa5dd4acc499c4cde06d8"},"schema_version":"1.0","source":{"id":"1102.2516","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1102.2516","created_at":"2026-05-18T00:57:57Z"},{"alias_kind":"arxiv_version","alias_value":"1102.2516v1","created_at":"2026-05-18T00:57:57Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1102.2516","created_at":"2026-05-18T00:57:57Z"},{"alias_kind":"pith_short_12","alias_value":"RXAO2XD2CCR2","created_at":"2026-05-18T12:26:41Z"},{"alias_kind":"pith_short_16","alias_value":"RXAO2XD2CCR2TLJA","created_at":"2026-05-18T12:26:41Z"},{"alias_kind":"pith_short_8","alias_value":"RXAO2XD2","created_at":"2026-05-18T12:26:41Z"}],"graph_snapshots":[{"event_id":"sha256:d04510bd5d1bb557b4dbd805878444e5dd4b23a14ecd1e84dac900627d164993","target":"graph","created_at":"2026-05-18T00:57:57Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this paper, coded slotted ALOHA (CSA) is introduced as a powerful random access scheme to the MAC frame. In CSA, the burst a generic user wishes to transmit in the MAC frame is first split into segments, and these segments are then encoded through a local a packet-oriented code prior to transmission. On the receiver side, iterative interference cancellation combined with decoding of the local code is performed to recover from collisions. The new scheme generalizes the previously proposed irregular repetition slotted ALOHA (IRSA) technique, based on a simple repetition of the users' bursts. ","authors_text":"Enrico Paolini, Gianluigi Liva, Marco Chiani","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2011-02-12T14:44:12Z","title":"High Throughput Random Access via Codes on Graphs: Coded Slotted ALOHA"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1102.2516","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4f82129c508be2ec68286b9cb679903722caa830c5f1dcf826834947225909b7","target":"record","created_at":"2026-05-18T00:57:57Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"8ca2a01064c188712066899de8627211ff4e79388d48faaff1f05a4141503af4","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2011-02-12T14:44:12Z","title_canon_sha256":"cfa7a489c3da50ca7a9bd9ad23914a8545f98499c56aa5dd4acc499c4cde06d8"},"schema_version":"1.0","source":{"id":"1102.2516","kind":"arxiv","version":1}},"canonical_sha256":"8dc0ed5c7a10a3a9ad201b31f44d9021c2c3e6376ff2cc30aeb13ca25d9d6d8e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"8dc0ed5c7a10a3a9ad201b31f44d9021c2c3e6376ff2cc30aeb13ca25d9d6d8e","first_computed_at":"2026-05-18T00:57:57.466451Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:57:57.466451Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"/6czpsq52XNi8TwCCHp6CxMcFQ5sWTOxrkICbLvSEcJU9OqrerqSD5IoGkeWiPXQFCijf4zws7U/47pwATooDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:57:57.466905Z","signed_message":"canonical_sha256_bytes"},"source_id":"1102.2516","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4f82129c508be2ec68286b9cb679903722caa830c5f1dcf826834947225909b7","sha256:d04510bd5d1bb557b4dbd805878444e5dd4b23a14ecd1e84dac900627d164993"],"state_sha256":"8977c67b2af7cbead08152825fdcfb1f5f8e9d1e1bc0bf4f103eac92538606b0"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"L7xPv27YbrlDRR+nk0P59zBTr0h2B0D91xVKKaYHp6xbgdC2Lk/pw0OWvaOBKbrhyfudijsAFOAjAFgBl5OeAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-18T18:30:28.174379Z","bundle_sha256":"cb4b5005b6dea2e5a3fccd289eb90368900380a4909c4f323da515ea3495b7e4"}}