{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2012:V5NBZBGTBSQGO5DX7LVPDZ5DIO","short_pith_number":"pith:V5NBZBGT","schema_version":"1.0","canonical_sha256":"af5a1c84d30ca0677477faeaf1e7a343b154f7d7ed1ecfc0305cfc09ffee067c","source":{"kind":"arxiv","id":"1207.4044","version":1},"attestation_state":"computed","paper":{"title":"Designing Information Revelation and Intervention with an Application to Flow Control","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.IT","cs.MA","cs.NI","math.IT"],"primary_cat":"cs.GT","authors_text":"Luca Canzian, Michele Zorzi, Mihaela van der Schaar, William Zame, Yuanzhang Xiao","submitted_at":"2012-07-17T16:12:04Z","abstract_excerpt":"There are many familiar situations in which a manager seeks to design a system in which users share a resource, but outcomes depend on the information held and actions taken by users. If communication is possible, the manager can ask users to report their private information and then, using this information, instruct them on what actions they should take. If the users are compliant, this reduces the manager's optimization problem to a well-studied problem of optimal control. However, if the users are self-interested and not compliant, the problem is much more complicated: when asked to report "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1207.4044","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-07-17T16:12:04Z","cross_cats_sorted":["cs.IT","cs.MA","cs.NI","math.IT"],"title_canon_sha256":"ccdbf1a8679ef01e6eaeae1b551c2c9d3e5c2e877ffd6a31bae1124c45045b71","abstract_canon_sha256":"3cf0d4a01e3f1f7a26b6978a9730026afd8ba1c8f532491c81a8a76248603dbe"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:50:49.173088Z","signature_b64":"unNAjO/8uHVAiKNK9tcaVf35YPWtt70XOTzb6UprsjaNoTPwAwuTX/WfoOe6npZaVEI/jDvy9YsMR5AxTyy8Bg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"af5a1c84d30ca0677477faeaf1e7a343b154f7d7ed1ecfc0305cfc09ffee067c","last_reissued_at":"2026-05-18T03:50:49.172471Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:50:49.172471Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Designing Information Revelation and Intervention with an Application to Flow Control","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.IT","cs.MA","cs.NI","math.IT"],"primary_cat":"cs.GT","authors_text":"Luca Canzian, Michele Zorzi, Mihaela van der Schaar, William Zame, Yuanzhang Xiao","submitted_at":"2012-07-17T16:12:04Z","abstract_excerpt":"There are many familiar situations in which a manager seeks to design a system in which users share a resource, but outcomes depend on the information held and actions taken by users. If communication is possible, the manager can ask users to report their private information and then, using this information, instruct them on what actions they should take. If the users are compliant, this reduces the manager's optimization problem to a well-studied problem of optimal control. However, if the users are self-interested and not compliant, the problem is much more complicated: when asked to report "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1207.4044","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1207.4044","created_at":"2026-05-18T03:50:49.172584+00:00"},{"alias_kind":"arxiv_version","alias_value":"1207.4044v1","created_at":"2026-05-18T03:50:49.172584+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1207.4044","created_at":"2026-05-18T03:50:49.172584+00:00"},{"alias_kind":"pith_short_12","alias_value":"V5NBZBGTBSQG","created_at":"2026-05-18T12:27:25.539911+00:00"},{"alias_kind":"pith_short_16","alias_value":"V5NBZBGTBSQGO5DX","created_at":"2026-05-18T12:27:25.539911+00:00"},{"alias_kind":"pith_short_8","alias_value":"V5NBZBGT","created_at":"2026-05-18T12:27:25.539911+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/V5NBZBGTBSQGO5DX7LVPDZ5DIO","json":"https://pith.science/pith/V5NBZBGTBSQGO5DX7LVPDZ5DIO.json","graph_json":"https://pith.science/api/pith-number/V5NBZBGTBSQGO5DX7LVPDZ5DIO/graph.json","events_json":"https://pith.science/api/pith-number/V5NBZBGTBSQGO5DX7LVPDZ5DIO/events.json","paper":"https://pith.science/paper/V5NBZBGT"},"agent_actions":{"view_html":"https://pith.science/pith/V5NBZBGTBSQGO5DX7LVPDZ5DIO","download_json":"https://pith.science/pith/V5NBZBGTBSQGO5DX7LVPDZ5DIO.json","view_paper":"https://pith.science/paper/V5NBZBGT","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1207.4044&json=true","fetch_graph":"https://pith.science/api/pith-number/V5NBZBGTBSQGO5DX7LVPDZ5DIO/graph.json","fetch_events":"https://pith.science/api/pith-number/V5NBZBGTBSQGO5DX7LVPDZ5DIO/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/V5NBZBGTBSQGO5DX7LVPDZ5DIO/action/timestamp_anchor","attest_storage":"https://pith.science/pith/V5NBZBGTBSQGO5DX7LVPDZ5DIO/action/storage_attestation","attest_author":"https://pith.science/pith/V5NBZBGTBSQGO5DX7LVPDZ5DIO/action/author_attestation","sign_citation":"https://pith.science/pith/V5NBZBGTBSQGO5DX7LVPDZ5DIO/action/citation_signature","submit_replication":"https://pith.science/pith/V5NBZBGTBSQGO5DX7LVPDZ5DIO/action/replication_record"}},"created_at":"2026-05-18T03:50:49.172584+00:00","updated_at":"2026-05-18T03:50:49.172584+00:00"}