{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:SXUGEYWVF527PXA5QMF7MPROWI","short_pith_number":"pith:SXUGEYWV","canonical_record":{"source":{"id":"1303.5315","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2013-03-21T17:12:09Z","cross_cats_sorted":["cond-mat.stat-mech","cs.SI","q-bio.PE"],"title_canon_sha256":"6d58ebff39447cb6e26d963c52153385ca33d14390a867500e9cd4c41af600be","abstract_canon_sha256":"728d263e5cecbaea29fb0fd4293946cc9e2e44079f889682b006e321a3f822b2"},"schema_version":"1.0"},"canonical_sha256":"95e86262d52f75f7dc1d830bf63e2eb232caeff7f5e5c467cbd312bc390095d9","source":{"kind":"arxiv","id":"1303.5315","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1303.5315","created_at":"2026-05-18T02:34:45Z"},{"alias_kind":"arxiv_version","alias_value":"1303.5315v3","created_at":"2026-05-18T02:34:45Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1303.5315","created_at":"2026-05-18T02:34:45Z"},{"alias_kind":"pith_short_12","alias_value":"SXUGEYWVF527","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_16","alias_value":"SXUGEYWVF527PXA5","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_8","alias_value":"SXUGEYWV","created_at":"2026-05-18T12:27:59Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:SXUGEYWVF527PXA5QMF7MPROWI","target":"record","payload":{"canonical_record":{"source":{"id":"1303.5315","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2013-03-21T17:12:09Z","cross_cats_sorted":["cond-mat.stat-mech","cs.SI","q-bio.PE"],"title_canon_sha256":"6d58ebff39447cb6e26d963c52153385ca33d14390a867500e9cd4c41af600be","abstract_canon_sha256":"728d263e5cecbaea29fb0fd4293946cc9e2e44079f889682b006e321a3f822b2"},"schema_version":"1.0"},"canonical_sha256":"95e86262d52f75f7dc1d830bf63e2eb232caeff7f5e5c467cbd312bc390095d9","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:34:45.194008Z","signature_b64":"8tb20gxXzRhCmGcglOqyhA+dowzh8u083Jcl2cMzShuzpDeBAMIxDmcZjKmCVt32iUg0gvy6pkwhY+dMza5lDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"95e86262d52f75f7dc1d830bf63e2eb232caeff7f5e5c467cbd312bc390095d9","last_reissued_at":"2026-05-18T02:34:45.193484Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:34:45.193484Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1303.5315","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:34:45Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"dRn3bXso566GUnF9Kd5Eho5x+/x+U/XQOlOuOR2VlUx6FnSXL0fMA1lvHwn0o2+oE493Tc0bqsvD4fuQnxUbBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T19:01:00.190419Z"},"content_sha256":"ef6671d3447e2145f8be97b9680a12008acc37093e0e3795ed22e84273852fe5","schema_version":"1.0","event_id":"sha256:ef6671d3447e2145f8be97b9680a12008acc37093e0e3795ed22e84273852fe5"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:SXUGEYWVF527PXA5QMF7MPROWI","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Inferring the origin of an epidemic with a dynamic message-passing algorithm","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cond-mat.stat-mech","cs.SI","q-bio.PE"],"primary_cat":"physics.soc-ph","authors_text":"Andrey Y. Lokhov, Hiroki Ohta, Lenka Zdeborov\\'a, Marc M\\'ezard","submitted_at":"2013-03-21T17:12:09Z","abstract_excerpt":"We study the problem of estimating the origin of an epidemic outbreak -- given a contact network and a snapshot of epidemic spread at a certain time, determine the infection source. Finding the source is important in different contexts of computer or social networks. We assume that the epidemic spread follows the most commonly used susceptible-infected-recovered model. We introduce an inference algorithm based on dynamic message-passing equations, and we show that it leads to significant improvement of performance compared to existing approaches. Importantly, this algorithm remains efficient i"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1303.5315","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:34:45Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"fDf0HIR2YFrOwfTtAHTttkSdmhJ403dYr94QssSY7uwR8f7CMWV36gDYsfOxsYduSLMYz5NGCtrgK4iXZi5XAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T19:01:00.190775Z"},"content_sha256":"8da6c0e9f42d63520b9abb5812bd52edb15ca38791ec1b80aabbfdfdb79475c2","schema_version":"1.0","event_id":"sha256:8da6c0e9f42d63520b9abb5812bd52edb15ca38791ec1b80aabbfdfdb79475c2"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/SXUGEYWVF527PXA5QMF7MPROWI/bundle.json","state_url":"https://pith.science/pith/SXUGEYWVF527PXA5QMF7MPROWI/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/SXUGEYWVF527PXA5QMF7MPROWI/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T19:01:00Z","links":{"resolver":"https://pith.science/pith/SXUGEYWVF527PXA5QMF7MPROWI","bundle":"https://pith.science/pith/SXUGEYWVF527PXA5QMF7MPROWI/bundle.json","state":"https://pith.science/pith/SXUGEYWVF527PXA5QMF7MPROWI/state.json","well_known_bundle":"https://pith.science/.well-known/pith/SXUGEYWVF527PXA5QMF7MPROWI/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:SXUGEYWVF527PXA5QMF7MPROWI","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"728d263e5cecbaea29fb0fd4293946cc9e2e44079f889682b006e321a3f822b2","cross_cats_sorted":["cond-mat.stat-mech","cs.SI","q-bio.PE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2013-03-21T17:12:09Z","title_canon_sha256":"6d58ebff39447cb6e26d963c52153385ca33d14390a867500e9cd4c41af600be"},"schema_version":"1.0","source":{"id":"1303.5315","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1303.5315","created_at":"2026-05-18T02:34:45Z"},{"alias_kind":"arxiv_version","alias_value":"1303.5315v3","created_at":"2026-05-18T02:34:45Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1303.5315","created_at":"2026-05-18T02:34:45Z"},{"alias_kind":"pith_short_12","alias_value":"SXUGEYWVF527","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_16","alias_value":"SXUGEYWVF527PXA5","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_8","alias_value":"SXUGEYWV","created_at":"2026-05-18T12:27:59Z"}],"graph_snapshots":[{"event_id":"sha256:8da6c0e9f42d63520b9abb5812bd52edb15ca38791ec1b80aabbfdfdb79475c2","target":"graph","created_at":"2026-05-18T02:34:45Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We study the problem of estimating the origin of an epidemic outbreak -- given a contact network and a snapshot of epidemic spread at a certain time, determine the infection source. Finding the source is important in different contexts of computer or social networks. We assume that the epidemic spread follows the most commonly used susceptible-infected-recovered model. We introduce an inference algorithm based on dynamic message-passing equations, and we show that it leads to significant improvement of performance compared to existing approaches. Importantly, this algorithm remains efficient i","authors_text":"Andrey Y. Lokhov, Hiroki Ohta, Lenka Zdeborov\\'a, Marc M\\'ezard","cross_cats":["cond-mat.stat-mech","cs.SI","q-bio.PE"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2013-03-21T17:12:09Z","title":"Inferring the origin of an epidemic with a dynamic message-passing algorithm"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1303.5315","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ef6671d3447e2145f8be97b9680a12008acc37093e0e3795ed22e84273852fe5","target":"record","created_at":"2026-05-18T02:34:45Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"728d263e5cecbaea29fb0fd4293946cc9e2e44079f889682b006e321a3f822b2","cross_cats_sorted":["cond-mat.stat-mech","cs.SI","q-bio.PE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"physics.soc-ph","submitted_at":"2013-03-21T17:12:09Z","title_canon_sha256":"6d58ebff39447cb6e26d963c52153385ca33d14390a867500e9cd4c41af600be"},"schema_version":"1.0","source":{"id":"1303.5315","kind":"arxiv","version":3}},"canonical_sha256":"95e86262d52f75f7dc1d830bf63e2eb232caeff7f5e5c467cbd312bc390095d9","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"95e86262d52f75f7dc1d830bf63e2eb232caeff7f5e5c467cbd312bc390095d9","first_computed_at":"2026-05-18T02:34:45.193484Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:34:45.193484Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"8tb20gxXzRhCmGcglOqyhA+dowzh8u083Jcl2cMzShuzpDeBAMIxDmcZjKmCVt32iUg0gvy6pkwhY+dMza5lDw==","signature_status":"signed_v1","signed_at":"2026-05-18T02:34:45.194008Z","signed_message":"canonical_sha256_bytes"},"source_id":"1303.5315","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ef6671d3447e2145f8be97b9680a12008acc37093e0e3795ed22e84273852fe5","sha256:8da6c0e9f42d63520b9abb5812bd52edb15ca38791ec1b80aabbfdfdb79475c2"],"state_sha256":"19fb78b449c27849966febf19cf94cc6488aa3405cf904bf63f24ed26ac94b74"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"v4WC/jJP7iydlrPFJWFJx0Zw1RsM8uzUpsDoMoRC3R9S7sxBAeg8Cz4k2nu0n8lwkrbFGmHh65MACe31WuAZDg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T19:01:00.192834Z","bundle_sha256":"0e311711998203c730d93ee0c1e16cea4e0f2cca30be53ff24562360c4199436"}}