{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2014:UIYK2KLSNZXIKMZJF5MPICIDQQ","short_pith_number":"pith:UIYK2KLS","canonical_record":{"source":{"id":"1401.5200","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2014-01-21T07:17:47Z","cross_cats_sorted":[],"title_canon_sha256":"a9aeedbcdbd2480da3bf5ee2becd17bba3ed2ba43fb6c4daa17d3ec5a1c7cf3d","abstract_canon_sha256":"1ae63ef74bcfab39ac39bb2e6d90149db964142fd354725346dd23bb8f2fa20a"},"schema_version":"1.0"},"canonical_sha256":"a230ad29726e6e8533292f58f40903842e5972c986c8e37a71920468ae16554c","source":{"kind":"arxiv","id":"1401.5200","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1401.5200","created_at":"2026-05-18T02:50:42Z"},{"alias_kind":"arxiv_version","alias_value":"1401.5200v2","created_at":"2026-05-18T02:50:42Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1401.5200","created_at":"2026-05-18T02:50:42Z"},{"alias_kind":"pith_short_12","alias_value":"UIYK2KLSNZXI","created_at":"2026-05-18T12:28:52Z"},{"alias_kind":"pith_short_16","alias_value":"UIYK2KLSNZXIKMZJ","created_at":"2026-05-18T12:28:52Z"},{"alias_kind":"pith_short_8","alias_value":"UIYK2KLS","created_at":"2026-05-18T12:28:52Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2014:UIYK2KLSNZXIKMZJF5MPICIDQQ","target":"record","payload":{"canonical_record":{"source":{"id":"1401.5200","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2014-01-21T07:17:47Z","cross_cats_sorted":[],"title_canon_sha256":"a9aeedbcdbd2480da3bf5ee2becd17bba3ed2ba43fb6c4daa17d3ec5a1c7cf3d","abstract_canon_sha256":"1ae63ef74bcfab39ac39bb2e6d90149db964142fd354725346dd23bb8f2fa20a"},"schema_version":"1.0"},"canonical_sha256":"a230ad29726e6e8533292f58f40903842e5972c986c8e37a71920468ae16554c","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:50:42.559247Z","signature_b64":"2ZRzGM6NaLAGEZ6o+sWCWHA79T+UWcIKxpJs678Ds9ymAihyv0dYjeegDGfNVOF9GZZspobFbgGDfPJvlGulDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a230ad29726e6e8533292f58f40903842e5972c986c8e37a71920468ae16554c","last_reissued_at":"2026-05-18T02:50:42.558640Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:50:42.558640Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1401.5200","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:50:42Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"HourXcwGAMN4NanoIusdDsupCatNf26dpzf2Rcq12JQQtcHd/YCopTDxZjSe4wyl1IPSKlIaM1BOEuHhWHraCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T23:26:05.353335Z"},"content_sha256":"36e7aaf60ba049ade51dc1781fa60f39d1076893a1b2b0cf4f60864778db6b63","schema_version":"1.0","event_id":"sha256:36e7aaf60ba049ade51dc1781fa60f39d1076893a1b2b0cf4f60864778db6b63"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2014:UIYK2KLSNZXIKMZJF5MPICIDQQ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Conformance Testing as Falsification for Cyber-Physical Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SY","authors_text":"Bardh Hoxha, Georgios Fainekos, Houssam Abbas, James Kapinski, Jyotirmoy V. Deshmukh, Koichi Ueda","submitted_at":"2014-01-21T07:17:47Z","abstract_excerpt":"In Model-Based Design of Cyber-Physical Systems (CPS), it is often desirable to develop several models of varying fidelity. Models of different fidelity levels can enable mathematical analysis of the model, control synthesis, faster simulation etc. Furthermore, when (automatically or manually) transitioning from a model to its implementation on an actual computational platform, then again two different versions of the same system are being developed. In all previous cases, it is necessary to define a rigorous notion of conformance between different models and between models and their implement"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1401.5200","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:50:42Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"9FWT6wvjvDJJ7BKUuyCs/A1mk84cFV4sJNePNbpzJNxaeDKFVHK8Dgk02wn+f+FinU94Dll6Xy1Uqd3+i1VvDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T23:26:05.353979Z"},"content_sha256":"5e0ae9f86dde3439f2d304497726214db08fd54dc6e95a8b74dfeeaf9d0e6574","schema_version":"1.0","event_id":"sha256:5e0ae9f86dde3439f2d304497726214db08fd54dc6e95a8b74dfeeaf9d0e6574"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/UIYK2KLSNZXIKMZJF5MPICIDQQ/bundle.json","state_url":"https://pith.science/pith/UIYK2KLSNZXIKMZJF5MPICIDQQ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/UIYK2KLSNZXIKMZJF5MPICIDQQ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T23:26:05Z","links":{"resolver":"https://pith.science/pith/UIYK2KLSNZXIKMZJF5MPICIDQQ","bundle":"https://pith.science/pith/UIYK2KLSNZXIKMZJF5MPICIDQQ/bundle.json","state":"https://pith.science/pith/UIYK2KLSNZXIKMZJF5MPICIDQQ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/UIYK2KLSNZXIKMZJF5MPICIDQQ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2014:UIYK2KLSNZXIKMZJF5MPICIDQQ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"1ae63ef74bcfab39ac39bb2e6d90149db964142fd354725346dd23bb8f2fa20a","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2014-01-21T07:17:47Z","title_canon_sha256":"a9aeedbcdbd2480da3bf5ee2becd17bba3ed2ba43fb6c4daa17d3ec5a1c7cf3d"},"schema_version":"1.0","source":{"id":"1401.5200","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1401.5200","created_at":"2026-05-18T02:50:42Z"},{"alias_kind":"arxiv_version","alias_value":"1401.5200v2","created_at":"2026-05-18T02:50:42Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1401.5200","created_at":"2026-05-18T02:50:42Z"},{"alias_kind":"pith_short_12","alias_value":"UIYK2KLSNZXI","created_at":"2026-05-18T12:28:52Z"},{"alias_kind":"pith_short_16","alias_value":"UIYK2KLSNZXIKMZJ","created_at":"2026-05-18T12:28:52Z"},{"alias_kind":"pith_short_8","alias_value":"UIYK2KLS","created_at":"2026-05-18T12:28:52Z"}],"graph_snapshots":[{"event_id":"sha256:5e0ae9f86dde3439f2d304497726214db08fd54dc6e95a8b74dfeeaf9d0e6574","target":"graph","created_at":"2026-05-18T02:50:42Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In Model-Based Design of Cyber-Physical Systems (CPS), it is often desirable to develop several models of varying fidelity. Models of different fidelity levels can enable mathematical analysis of the model, control synthesis, faster simulation etc. Furthermore, when (automatically or manually) transitioning from a model to its implementation on an actual computational platform, then again two different versions of the same system are being developed. In all previous cases, it is necessary to define a rigorous notion of conformance between different models and between models and their implement","authors_text":"Bardh Hoxha, Georgios Fainekos, Houssam Abbas, James Kapinski, Jyotirmoy V. Deshmukh, Koichi Ueda","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2014-01-21T07:17:47Z","title":"Conformance Testing as Falsification for Cyber-Physical Systems"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1401.5200","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:36e7aaf60ba049ade51dc1781fa60f39d1076893a1b2b0cf4f60864778db6b63","target":"record","created_at":"2026-05-18T02:50:42Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"1ae63ef74bcfab39ac39bb2e6d90149db964142fd354725346dd23bb8f2fa20a","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2014-01-21T07:17:47Z","title_canon_sha256":"a9aeedbcdbd2480da3bf5ee2becd17bba3ed2ba43fb6c4daa17d3ec5a1c7cf3d"},"schema_version":"1.0","source":{"id":"1401.5200","kind":"arxiv","version":2}},"canonical_sha256":"a230ad29726e6e8533292f58f40903842e5972c986c8e37a71920468ae16554c","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"a230ad29726e6e8533292f58f40903842e5972c986c8e37a71920468ae16554c","first_computed_at":"2026-05-18T02:50:42.558640Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:50:42.558640Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"2ZRzGM6NaLAGEZ6o+sWCWHA79T+UWcIKxpJs678Ds9ymAihyv0dYjeegDGfNVOF9GZZspobFbgGDfPJvlGulDw==","signature_status":"signed_v1","signed_at":"2026-05-18T02:50:42.559247Z","signed_message":"canonical_sha256_bytes"},"source_id":"1401.5200","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:36e7aaf60ba049ade51dc1781fa60f39d1076893a1b2b0cf4f60864778db6b63","sha256:5e0ae9f86dde3439f2d304497726214db08fd54dc6e95a8b74dfeeaf9d0e6574"],"state_sha256":"33e11b2b8d1677a1cee7ca62eba1404f20df6babe0b472121ddb133685f956ae"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"R3WkOwE/yEYMlPfWbYMk/Ye8Tqpc3cmdjizBa7nxmq1sDFHLHkD9RddfzPNezxJaP/ScAfKsb6B+BOaVGAeFBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T23:26:05.357995Z","bundle_sha256":"a91dbc42f8a18c79acd8705d12f391a2f2f627d19aef964f2bff673208ba9c60"}}