{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:VDFTY2KHP3NUVTUQLLWX2V4WEK","short_pith_number":"pith:VDFTY2KH","canonical_record":{"source":{"id":"1505.00903","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-05-05T07:30:29Z","cross_cats_sorted":[],"title_canon_sha256":"bb9a26d900663bea6c934e3f1d039cf90c1b51de07a78c353a940a0d32549dfb","abstract_canon_sha256":"cfa0702a2bbac3a10ef84ba6b4b71b4d89cb0b54e40bce5545d0fa74828ff5fe"},"schema_version":"1.0"},"canonical_sha256":"a8cb3c69477edb4ace905aed7d5796229cdc619448f8823369757a264ba2f5fe","source":{"kind":"arxiv","id":"1505.00903","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1505.00903","created_at":"2026-05-18T02:16:59Z"},{"alias_kind":"arxiv_version","alias_value":"1505.00903v1","created_at":"2026-05-18T02:16:59Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1505.00903","created_at":"2026-05-18T02:16:59Z"},{"alias_kind":"pith_short_12","alias_value":"VDFTY2KHP3NU","created_at":"2026-05-18T12:29:44Z"},{"alias_kind":"pith_short_16","alias_value":"VDFTY2KHP3NUVTUQ","created_at":"2026-05-18T12:29:44Z"},{"alias_kind":"pith_short_8","alias_value":"VDFTY2KH","created_at":"2026-05-18T12:29:44Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:VDFTY2KHP3NUVTUQLLWX2V4WEK","target":"record","payload":{"canonical_record":{"source":{"id":"1505.00903","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-05-05T07:30:29Z","cross_cats_sorted":[],"title_canon_sha256":"bb9a26d900663bea6c934e3f1d039cf90c1b51de07a78c353a940a0d32549dfb","abstract_canon_sha256":"cfa0702a2bbac3a10ef84ba6b4b71b4d89cb0b54e40bce5545d0fa74828ff5fe"},"schema_version":"1.0"},"canonical_sha256":"a8cb3c69477edb4ace905aed7d5796229cdc619448f8823369757a264ba2f5fe","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:16:59.660457Z","signature_b64":"rCr4GaTKzFTr/gJx/wFZZlKxk/DBPvDutIye4Ie+ctwaTRtkiIe//R9rFDwSjyy1dLTXJF7Ukad2nbjyrUH+Ag==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a8cb3c69477edb4ace905aed7d5796229cdc619448f8823369757a264ba2f5fe","last_reissued_at":"2026-05-18T02:16:59.659714Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:16:59.659714Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1505.00903","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:16:59Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"UM3+G0jq4AIRUAbDC84DQNq2Sy2bfUr7Wfp71pXBbjflQoLlEMkXXfRDz7OqZxmlI34N2EWmZhDUZtU48z6qCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T05:36:46.399737Z"},"content_sha256":"15401e7d1abc80e2dd06cfbc4981066c7c3e01747030d29fc72f2c9d9cb68148","schema_version":"1.0","event_id":"sha256:15401e7d1abc80e2dd06cfbc4981066c7c3e01747030d29fc72f2c9d9cb68148"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:VDFTY2KHP3NUVTUQLLWX2V4WEK","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Using Models at Runtime to Address Assurance for Self-Adaptive Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SE","authors_text":"Anna Perini, Bernhard Rumpe, Betty Cheng, Daniel Schneider, Frank Trollmann, Hausi M\\\"uller, Kerstin Eder, Lars Grunske, Marin Litoiu, Martin Gogolla, Nauman Qureshi, Norha Villegas, Patrizio Pelliccione","submitted_at":"2015-05-05T07:30:29Z","abstract_excerpt":"A self-adaptive software system modifies its behavior at runtime in response to changes within the system or in its execution environment. The fulfillment of the system requirements needs to be guaranteed even in the presence of adverse conditions and adaptations. Thus, a key challenge for self-adaptive software systems is assurance. Traditionally, confidence in the correctness of a system is gained through a variety of activities and processes performed at development time, such as design analysis and testing. In the presence of selfadaptation, however, some of the assurance tasks may need to"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1505.00903","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:16:59Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"vRV1X6wd0toOkQ/AEylzeH2pz0MHzFoxNo/U7FF1QlYzU4QoEDmQH3ON8GcDrhynCsNc2rOhylefTAo0nMqtAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T05:36:46.400412Z"},"content_sha256":"f73050e531d1fe0e1bf884726c94a0966ff24f0cfb728bc9afc528bf7abfd36c","schema_version":"1.0","event_id":"sha256:f73050e531d1fe0e1bf884726c94a0966ff24f0cfb728bc9afc528bf7abfd36c"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/VDFTY2KHP3NUVTUQLLWX2V4WEK/bundle.json","state_url":"https://pith.science/pith/VDFTY2KHP3NUVTUQLLWX2V4WEK/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/VDFTY2KHP3NUVTUQLLWX2V4WEK/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T05:36:46Z","links":{"resolver":"https://pith.science/pith/VDFTY2KHP3NUVTUQLLWX2V4WEK","bundle":"https://pith.science/pith/VDFTY2KHP3NUVTUQLLWX2V4WEK/bundle.json","state":"https://pith.science/pith/VDFTY2KHP3NUVTUQLLWX2V4WEK/state.json","well_known_bundle":"https://pith.science/.well-known/pith/VDFTY2KHP3NUVTUQLLWX2V4WEK/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:VDFTY2KHP3NUVTUQLLWX2V4WEK","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"cfa0702a2bbac3a10ef84ba6b4b71b4d89cb0b54e40bce5545d0fa74828ff5fe","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-05-05T07:30:29Z","title_canon_sha256":"bb9a26d900663bea6c934e3f1d039cf90c1b51de07a78c353a940a0d32549dfb"},"schema_version":"1.0","source":{"id":"1505.00903","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1505.00903","created_at":"2026-05-18T02:16:59Z"},{"alias_kind":"arxiv_version","alias_value":"1505.00903v1","created_at":"2026-05-18T02:16:59Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1505.00903","created_at":"2026-05-18T02:16:59Z"},{"alias_kind":"pith_short_12","alias_value":"VDFTY2KHP3NU","created_at":"2026-05-18T12:29:44Z"},{"alias_kind":"pith_short_16","alias_value":"VDFTY2KHP3NUVTUQ","created_at":"2026-05-18T12:29:44Z"},{"alias_kind":"pith_short_8","alias_value":"VDFTY2KH","created_at":"2026-05-18T12:29:44Z"}],"graph_snapshots":[{"event_id":"sha256:f73050e531d1fe0e1bf884726c94a0966ff24f0cfb728bc9afc528bf7abfd36c","target":"graph","created_at":"2026-05-18T02:16:59Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"A self-adaptive software system modifies its behavior at runtime in response to changes within the system or in its execution environment. The fulfillment of the system requirements needs to be guaranteed even in the presence of adverse conditions and adaptations. Thus, a key challenge for self-adaptive software systems is assurance. Traditionally, confidence in the correctness of a system is gained through a variety of activities and processes performed at development time, such as design analysis and testing. In the presence of selfadaptation, however, some of the assurance tasks may need to","authors_text":"Anna Perini, Bernhard Rumpe, Betty Cheng, Daniel Schneider, Frank Trollmann, Hausi M\\\"uller, Kerstin Eder, Lars Grunske, Marin Litoiu, Martin Gogolla, Nauman Qureshi, Norha Villegas, Patrizio Pelliccione","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-05-05T07:30:29Z","title":"Using Models at Runtime to Address Assurance for Self-Adaptive Systems"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1505.00903","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:15401e7d1abc80e2dd06cfbc4981066c7c3e01747030d29fc72f2c9d9cb68148","target":"record","created_at":"2026-05-18T02:16:59Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"cfa0702a2bbac3a10ef84ba6b4b71b4d89cb0b54e40bce5545d0fa74828ff5fe","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-05-05T07:30:29Z","title_canon_sha256":"bb9a26d900663bea6c934e3f1d039cf90c1b51de07a78c353a940a0d32549dfb"},"schema_version":"1.0","source":{"id":"1505.00903","kind":"arxiv","version":1}},"canonical_sha256":"a8cb3c69477edb4ace905aed7d5796229cdc619448f8823369757a264ba2f5fe","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"a8cb3c69477edb4ace905aed7d5796229cdc619448f8823369757a264ba2f5fe","first_computed_at":"2026-05-18T02:16:59.659714Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:16:59.659714Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"rCr4GaTKzFTr/gJx/wFZZlKxk/DBPvDutIye4Ie+ctwaTRtkiIe//R9rFDwSjyy1dLTXJF7Ukad2nbjyrUH+Ag==","signature_status":"signed_v1","signed_at":"2026-05-18T02:16:59.660457Z","signed_message":"canonical_sha256_bytes"},"source_id":"1505.00903","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:15401e7d1abc80e2dd06cfbc4981066c7c3e01747030d29fc72f2c9d9cb68148","sha256:f73050e531d1fe0e1bf884726c94a0966ff24f0cfb728bc9afc528bf7abfd36c"],"state_sha256":"c55ace079d4ad9a11b1d56edffa887523d2246dc8d1f21b16515414e29d672df"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Jp+fYqekt8m+CIlf1OdhY7OH8wrbbTeLN0bEyGc6EBdo0gNQfDAY4706H5P0eacz3Vwjd3zXLv+bCH6zkRHBAQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T05:36:46.402577Z","bundle_sha256":"ae9810a709ecc83fd95737bb251c5fe5a534574d4330f796b477395f4e4f57f7"}}