{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:VL2626LWTWMBBI3SOOZ6AU4DFJ","short_pith_number":"pith:VL2626LW","canonical_record":{"source":{"id":"1709.05801","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-18T07:55:44Z","cross_cats_sorted":["math.CO","math.IT"],"title_canon_sha256":"e65c45239b4c50ba85db45e1f9667a29e658ddb870d4f195c9c9981e9ea9e3db","abstract_canon_sha256":"3e8890f7f03ae4a02f885e3811ac7455d8851de75dc9918cd7c2cb56dba6e9a7"},"schema_version":"1.0"},"canonical_sha256":"aaf5ed79769d9810a37273b3e053832a6f2bd2b6e97a930a10d6b6d082299603","source":{"kind":"arxiv","id":"1709.05801","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1709.05801","created_at":"2026-05-18T00:23:08Z"},{"alias_kind":"arxiv_version","alias_value":"1709.05801v2","created_at":"2026-05-18T00:23:08Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1709.05801","created_at":"2026-05-18T00:23:08Z"},{"alias_kind":"pith_short_12","alias_value":"VL2626LWTWMB","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_16","alias_value":"VL2626LWTWMBBI3S","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_8","alias_value":"VL2626LW","created_at":"2026-05-18T12:31:49Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:VL2626LWTWMBBI3SOOZ6AU4DFJ","target":"record","payload":{"canonical_record":{"source":{"id":"1709.05801","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-18T07:55:44Z","cross_cats_sorted":["math.CO","math.IT"],"title_canon_sha256":"e65c45239b4c50ba85db45e1f9667a29e658ddb870d4f195c9c9981e9ea9e3db","abstract_canon_sha256":"3e8890f7f03ae4a02f885e3811ac7455d8851de75dc9918cd7c2cb56dba6e9a7"},"schema_version":"1.0"},"canonical_sha256":"aaf5ed79769d9810a37273b3e053832a6f2bd2b6e97a930a10d6b6d082299603","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:23:08.404541Z","signature_b64":"Apawbkj7CiCckOZo7zk+py+j3kboQuUXkuR+FQ0+Jop7xxjqrXlcoJQJnat7Rz59nkfL0yIytlRHk+r12PQyCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"aaf5ed79769d9810a37273b3e053832a6f2bd2b6e97a930a10d6b6d082299603","last_reissued_at":"2026-05-18T00:23:08.403783Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:23:08.403783Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1709.05801","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:23:08Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ZSxYYvf+s0aL5IQAyWwzFtalpg4zfJmpfykX/onT3LAC52v6OFx9tgPUM0vcKz15p92g7Iz+K394/6ohcHL2Aw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T14:22:27.579041Z"},"content_sha256":"ef9cc4f2fc6bd3ae1ab5d453d12826d292f86d7b1664bff00a7e89ac21765062","schema_version":"1.0","event_id":"sha256:ef9cc4f2fc6bd3ae1ab5d453d12826d292f86d7b1664bff00a7e89ac21765062"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:VL2626LWTWMBBI3SOOZ6AU4DFJ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Bounds on Binary Locally Repairable Codes Tolerating Multiple Erasures","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.CO","math.IT"],"primary_cat":"cs.IT","authors_text":"Camilla Hollanti, Matthias Grezet, Oktay Olmez, Ragnar Freij-Hollanti, Thomas Westerb\\\"ack","submitted_at":"2017-09-18T07:55:44Z","abstract_excerpt":"Recently, locally repairable codes has gained significant interest for their potential applications in distributed storage systems. However, most constructions in existence are over fields with size that grows with the number of servers, which makes the systems computationally expensive and difficult to maintain. Here, we study linear locally repairable codes over the binary field, tolerating multiple local erasures. We derive bounds on the minimum distance on such codes, and give examples of LRCs achieving these bounds. Our main technical tools come from matroid theory, and as a byproduct of "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1709.05801","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:23:08Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"bM9Wux4o3Kv5alBcRQ7QBegqm+XTzrUFJxAiupF3z8/rS9Ai4RNhKcPaS97wEK3VGwvBaZ3YvaBgGGzTsThSAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T14:22:27.579686Z"},"content_sha256":"e06d9fb2c5f22c86d8016f6db22c377c282991004101ba9607d37595c8d19393","schema_version":"1.0","event_id":"sha256:e06d9fb2c5f22c86d8016f6db22c377c282991004101ba9607d37595c8d19393"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/VL2626LWTWMBBI3SOOZ6AU4DFJ/bundle.json","state_url":"https://pith.science/pith/VL2626LWTWMBBI3SOOZ6AU4DFJ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/VL2626LWTWMBBI3SOOZ6AU4DFJ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T14:22:27Z","links":{"resolver":"https://pith.science/pith/VL2626LWTWMBBI3SOOZ6AU4DFJ","bundle":"https://pith.science/pith/VL2626LWTWMBBI3SOOZ6AU4DFJ/bundle.json","state":"https://pith.science/pith/VL2626LWTWMBBI3SOOZ6AU4DFJ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/VL2626LWTWMBBI3SOOZ6AU4DFJ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:VL2626LWTWMBBI3SOOZ6AU4DFJ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"3e8890f7f03ae4a02f885e3811ac7455d8851de75dc9918cd7c2cb56dba6e9a7","cross_cats_sorted":["math.CO","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-18T07:55:44Z","title_canon_sha256":"e65c45239b4c50ba85db45e1f9667a29e658ddb870d4f195c9c9981e9ea9e3db"},"schema_version":"1.0","source":{"id":"1709.05801","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1709.05801","created_at":"2026-05-18T00:23:08Z"},{"alias_kind":"arxiv_version","alias_value":"1709.05801v2","created_at":"2026-05-18T00:23:08Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1709.05801","created_at":"2026-05-18T00:23:08Z"},{"alias_kind":"pith_short_12","alias_value":"VL2626LWTWMB","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_16","alias_value":"VL2626LWTWMBBI3S","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_8","alias_value":"VL2626LW","created_at":"2026-05-18T12:31:49Z"}],"graph_snapshots":[{"event_id":"sha256:e06d9fb2c5f22c86d8016f6db22c377c282991004101ba9607d37595c8d19393","target":"graph","created_at":"2026-05-18T00:23:08Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Recently, locally repairable codes has gained significant interest for their potential applications in distributed storage systems. However, most constructions in existence are over fields with size that grows with the number of servers, which makes the systems computationally expensive and difficult to maintain. Here, we study linear locally repairable codes over the binary field, tolerating multiple local erasures. We derive bounds on the minimum distance on such codes, and give examples of LRCs achieving these bounds. Our main technical tools come from matroid theory, and as a byproduct of ","authors_text":"Camilla Hollanti, Matthias Grezet, Oktay Olmez, Ragnar Freij-Hollanti, Thomas Westerb\\\"ack","cross_cats":["math.CO","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-18T07:55:44Z","title":"Bounds on Binary Locally Repairable Codes Tolerating Multiple Erasures"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1709.05801","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ef9cc4f2fc6bd3ae1ab5d453d12826d292f86d7b1664bff00a7e89ac21765062","target":"record","created_at":"2026-05-18T00:23:08Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"3e8890f7f03ae4a02f885e3811ac7455d8851de75dc9918cd7c2cb56dba6e9a7","cross_cats_sorted":["math.CO","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-18T07:55:44Z","title_canon_sha256":"e65c45239b4c50ba85db45e1f9667a29e658ddb870d4f195c9c9981e9ea9e3db"},"schema_version":"1.0","source":{"id":"1709.05801","kind":"arxiv","version":2}},"canonical_sha256":"aaf5ed79769d9810a37273b3e053832a6f2bd2b6e97a930a10d6b6d082299603","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"aaf5ed79769d9810a37273b3e053832a6f2bd2b6e97a930a10d6b6d082299603","first_computed_at":"2026-05-18T00:23:08.403783Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:23:08.403783Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Apawbkj7CiCckOZo7zk+py+j3kboQuUXkuR+FQ0+Jop7xxjqrXlcoJQJnat7Rz59nkfL0yIytlRHk+r12PQyCA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:23:08.404541Z","signed_message":"canonical_sha256_bytes"},"source_id":"1709.05801","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ef9cc4f2fc6bd3ae1ab5d453d12826d292f86d7b1664bff00a7e89ac21765062","sha256:e06d9fb2c5f22c86d8016f6db22c377c282991004101ba9607d37595c8d19393"],"state_sha256":"229f27bfe308019d33782de7e53a7f8989fb1dc478d90e0d219b2a695a1d0093"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"RprDJ9eW+F3yJFD2Tq7sbHpgXCgKeyiMZJoQidYRMex4N9IlJbxlLtjERgRJhIOEkPOfGZA3xLiemo3u7zonDw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T14:22:27.582057Z","bundle_sha256":"235856c37310d7fb23288d265e190f330bee16365cc06c59ec3d327fa44b2a9d"}}