{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:XBCKWLI5257FAJ64P72TB745AT","short_pith_number":"pith:XBCKWLI5","canonical_record":{"source":{"id":"1304.6489","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-04-24T06:49:04Z","cross_cats_sorted":[],"title_canon_sha256":"e61d59a1d4743f1fc9b5f0b98adbd7e80d4853fedfd51ebd7fbdc6fc3e79bdf3","abstract_canon_sha256":"9f4589d8121fd3a6328d40a293924c22f348886c8d10fd31e547c469c683e102"},"schema_version":"1.0"},"canonical_sha256":"b844ab2d1dd77e5027dc7ff530ff9d04f79123c4ddecbb83fb07d27a8b749310","source":{"kind":"arxiv","id":"1304.6489","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1304.6489","created_at":"2026-05-18T03:27:12Z"},{"alias_kind":"arxiv_version","alias_value":"1304.6489v1","created_at":"2026-05-18T03:27:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1304.6489","created_at":"2026-05-18T03:27:12Z"},{"alias_kind":"pith_short_12","alias_value":"XBCKWLI5257F","created_at":"2026-05-18T12:28:06Z"},{"alias_kind":"pith_short_16","alias_value":"XBCKWLI5257FAJ64","created_at":"2026-05-18T12:28:06Z"},{"alias_kind":"pith_short_8","alias_value":"XBCKWLI5","created_at":"2026-05-18T12:28:06Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:XBCKWLI5257FAJ64P72TB745AT","target":"record","payload":{"canonical_record":{"source":{"id":"1304.6489","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-04-24T06:49:04Z","cross_cats_sorted":[],"title_canon_sha256":"e61d59a1d4743f1fc9b5f0b98adbd7e80d4853fedfd51ebd7fbdc6fc3e79bdf3","abstract_canon_sha256":"9f4589d8121fd3a6328d40a293924c22f348886c8d10fd31e547c469c683e102"},"schema_version":"1.0"},"canonical_sha256":"b844ab2d1dd77e5027dc7ff530ff9d04f79123c4ddecbb83fb07d27a8b749310","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:27:12.959802Z","signature_b64":"yyKLehp5iFMSbYx712Uz8CvG3iAF3FG//p01iH89IsryyZ3PROZUJfwTpkFfUZ7kXyMrJiolBqwtoMAxSxvSAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b844ab2d1dd77e5027dc7ff530ff9d04f79123c4ddecbb83fb07d27a8b749310","last_reissued_at":"2026-05-18T03:27:12.959233Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:27:12.959233Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1304.6489","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:27:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"VT0+1MkySC112EwAtdwZsVnpwWUs5w3cl6zWzpsqEJHQ5R22IuTk2eWqBWKiw56t0ss0o6SntSG//oNHUW42Cw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T12:59:37.255642Z"},"content_sha256":"69d08f53dcc85c711a2097a825b8c2d2f9c05671c8a520b10163664a775fb716","schema_version":"1.0","event_id":"sha256:69d08f53dcc85c711a2097a825b8c2d2f9c05671c8a520b10163664a775fb716"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:XBCKWLI5257FAJ64P72TB745AT","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Can P2P Networks be Super-Scalable?","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Fabien Mathieu (LINCS, Fran\\c{c}ois Baccelli (LINCS, Ilkka Norros, INRIA Rocquencourt), R\\'emi Varloot (INRIA Rocquencourt)","submitted_at":"2013-04-24T06:49:04Z","abstract_excerpt":"We propose a new model for peer-to-peer networking which takes the network bottlenecks into account beyond the access. This model can cope with key features of P2P networking like degree or locality constraints together with the fact that distant peers often have a smaller rate than nearby peers. Using a network model based on rate functions, we give a closed form expression of peers download performance in the system's fluid limit, as well as approximations for the other cases. Our results show the existence of realistic settings for which the average download time is a decreasing function of"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1304.6489","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:27:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Qw1F9vTE8N2id2LOMKQ6iB5Q8tbaDeWskjYYoRGmb/MTQLlh4JKPITphlAT75eSP+GK6vZtmiWvIKpjHwJvcAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T12:59:37.256310Z"},"content_sha256":"fa104abcadec76da4dbaa944c3bf4545841b83be521744caccf36a1a0afdba14","schema_version":"1.0","event_id":"sha256:fa104abcadec76da4dbaa944c3bf4545841b83be521744caccf36a1a0afdba14"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/XBCKWLI5257FAJ64P72TB745AT/bundle.json","state_url":"https://pith.science/pith/XBCKWLI5257FAJ64P72TB745AT/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/XBCKWLI5257FAJ64P72TB745AT/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T12:59:37Z","links":{"resolver":"https://pith.science/pith/XBCKWLI5257FAJ64P72TB745AT","bundle":"https://pith.science/pith/XBCKWLI5257FAJ64P72TB745AT/bundle.json","state":"https://pith.science/pith/XBCKWLI5257FAJ64P72TB745AT/state.json","well_known_bundle":"https://pith.science/.well-known/pith/XBCKWLI5257FAJ64P72TB745AT/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:XBCKWLI5257FAJ64P72TB745AT","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"9f4589d8121fd3a6328d40a293924c22f348886c8d10fd31e547c469c683e102","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-04-24T06:49:04Z","title_canon_sha256":"e61d59a1d4743f1fc9b5f0b98adbd7e80d4853fedfd51ebd7fbdc6fc3e79bdf3"},"schema_version":"1.0","source":{"id":"1304.6489","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1304.6489","created_at":"2026-05-18T03:27:12Z"},{"alias_kind":"arxiv_version","alias_value":"1304.6489v1","created_at":"2026-05-18T03:27:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1304.6489","created_at":"2026-05-18T03:27:12Z"},{"alias_kind":"pith_short_12","alias_value":"XBCKWLI5257F","created_at":"2026-05-18T12:28:06Z"},{"alias_kind":"pith_short_16","alias_value":"XBCKWLI5257FAJ64","created_at":"2026-05-18T12:28:06Z"},{"alias_kind":"pith_short_8","alias_value":"XBCKWLI5","created_at":"2026-05-18T12:28:06Z"}],"graph_snapshots":[{"event_id":"sha256:fa104abcadec76da4dbaa944c3bf4545841b83be521744caccf36a1a0afdba14","target":"graph","created_at":"2026-05-18T03:27:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We propose a new model for peer-to-peer networking which takes the network bottlenecks into account beyond the access. This model can cope with key features of P2P networking like degree or locality constraints together with the fact that distant peers often have a smaller rate than nearby peers. Using a network model based on rate functions, we give a closed form expression of peers download performance in the system's fluid limit, as well as approximations for the other cases. Our results show the existence of realistic settings for which the average download time is a decreasing function of","authors_text":"Fabien Mathieu (LINCS, Fran\\c{c}ois Baccelli (LINCS, Ilkka Norros, INRIA Rocquencourt), R\\'emi Varloot (INRIA Rocquencourt)","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-04-24T06:49:04Z","title":"Can P2P Networks be Super-Scalable?"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1304.6489","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:69d08f53dcc85c711a2097a825b8c2d2f9c05671c8a520b10163664a775fb716","target":"record","created_at":"2026-05-18T03:27:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"9f4589d8121fd3a6328d40a293924c22f348886c8d10fd31e547c469c683e102","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-04-24T06:49:04Z","title_canon_sha256":"e61d59a1d4743f1fc9b5f0b98adbd7e80d4853fedfd51ebd7fbdc6fc3e79bdf3"},"schema_version":"1.0","source":{"id":"1304.6489","kind":"arxiv","version":1}},"canonical_sha256":"b844ab2d1dd77e5027dc7ff530ff9d04f79123c4ddecbb83fb07d27a8b749310","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"b844ab2d1dd77e5027dc7ff530ff9d04f79123c4ddecbb83fb07d27a8b749310","first_computed_at":"2026-05-18T03:27:12.959233Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:27:12.959233Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"yyKLehp5iFMSbYx712Uz8CvG3iAF3FG//p01iH89IsryyZ3PROZUJfwTpkFfUZ7kXyMrJiolBqwtoMAxSxvSAQ==","signature_status":"signed_v1","signed_at":"2026-05-18T03:27:12.959802Z","signed_message":"canonical_sha256_bytes"},"source_id":"1304.6489","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:69d08f53dcc85c711a2097a825b8c2d2f9c05671c8a520b10163664a775fb716","sha256:fa104abcadec76da4dbaa944c3bf4545841b83be521744caccf36a1a0afdba14"],"state_sha256":"c58fe50ae7f32e9d0053d96a77e053116e2b0c5f5ce297fc41b703818897b1ec"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xwO3AGHXknD14KIEVNLWIUtGSmghbe9P0nSWU1GDufCxAeo250bGqb9LhAfmXAXONLh775tpPHrIQKWynVG5DQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T12:59:37.259898Z","bundle_sha256":"2c002117881efd17af0f329526be4322a72893f07b621e69244a88dc0e742863"}}