{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:YRL573PMT7IFG33ZS33GQZABE5","short_pith_number":"pith:YRL573PM","canonical_record":{"source":{"id":"1711.05780","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2017-11-15T19:56:24Z","cross_cats_sorted":[],"title_canon_sha256":"4b07c7958420fa12c18d43709315a63dad4332cefb59bfd8f88dc067f100da54","abstract_canon_sha256":"c9068c1761cca53a9a3b354fa5444159795fdd89816d92fe221691c95d597ffd"},"schema_version":"1.0"},"canonical_sha256":"c457dfedec9fd0536f7996f6686401276d212eb7d30a91d059f7d870bc73ec85","source":{"kind":"arxiv","id":"1711.05780","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1711.05780","created_at":"2026-05-18T00:18:31Z"},{"alias_kind":"arxiv_version","alias_value":"1711.05780v2","created_at":"2026-05-18T00:18:31Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1711.05780","created_at":"2026-05-18T00:18:31Z"},{"alias_kind":"pith_short_12","alias_value":"YRL573PMT7IF","created_at":"2026-05-18T12:31:56Z"},{"alias_kind":"pith_short_16","alias_value":"YRL573PMT7IFG33Z","created_at":"2026-05-18T12:31:56Z"},{"alias_kind":"pith_short_8","alias_value":"YRL573PM","created_at":"2026-05-18T12:31:56Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:YRL573PMT7IFG33ZS33GQZABE5","target":"record","payload":{"canonical_record":{"source":{"id":"1711.05780","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2017-11-15T19:56:24Z","cross_cats_sorted":[],"title_canon_sha256":"4b07c7958420fa12c18d43709315a63dad4332cefb59bfd8f88dc067f100da54","abstract_canon_sha256":"c9068c1761cca53a9a3b354fa5444159795fdd89816d92fe221691c95d597ffd"},"schema_version":"1.0"},"canonical_sha256":"c457dfedec9fd0536f7996f6686401276d212eb7d30a91d059f7d870bc73ec85","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:18:31.327452Z","signature_b64":"bz2uWUNX77cfM8b+BfL0lmfpu9d1w2PH588PIgGS1Zs90O9q3ahWXYkP0cZu/i2GULKVjguFyU/zhThfvf2XCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c457dfedec9fd0536f7996f6686401276d212eb7d30a91d059f7d870bc73ec85","last_reissued_at":"2026-05-18T00:18:31.327062Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:18:31.327062Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1711.05780","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:18:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"kEna6Wkwh57BLYlFqHVw0eCwgUrW/BEjW4YI3J/MmG9AO581ds6BqLn2FSbmo8ZtO0tQP7Kqyc+CSt1es3/8BA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T13:52:33.741360Z"},"content_sha256":"05bef9e8330d263068db88181102b1a2d3f809587fa127cb91eaf9a9caefd3a2","schema_version":"1.0","event_id":"sha256:05bef9e8330d263068db88181102b1a2d3f809587fa127cb91eaf9a9caefd3a2"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:YRL573PMT7IFG33ZS33GQZABE5","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Detecting Egregious Conversations between Customers and Virtual Agents","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CL","authors_text":"David Konopnicki, David Piorkowski, John Richards, Jonathan Herzig, Michal Shmueli-Scheuer, Tommy Sandbank","submitted_at":"2017-11-15T19:56:24Z","abstract_excerpt":"Virtual agents are becoming a prominent channel of interaction in customer service. Not all customer interactions are smooth, however, and some can become almost comically bad. In such instances, a human agent might need to step in and salvage the conversation. Detecting bad conversations is important since disappointing customer service may threaten customer loyalty and impact revenue. In this paper, we outline an approach to detecting such egregious conversations, using behavioral cues from the user, patterns in agent responses, and user-agent interaction. Using logs of two commercial system"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1711.05780","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:18:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"n3r5AZTb5e/VhhQHto5ZhVCy0Jy5lnYYusILaW15x3nCribmgjmGSbbRq0E5/CJ9rmv0Q/jX3wAxgD5ycEaqAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T13:52:33.741744Z"},"content_sha256":"c8fe31a3b4f3cd9aa497c4e3837f87759ba61aedd413c38757a06955e58ae670","schema_version":"1.0","event_id":"sha256:c8fe31a3b4f3cd9aa497c4e3837f87759ba61aedd413c38757a06955e58ae670"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/YRL573PMT7IFG33ZS33GQZABE5/bundle.json","state_url":"https://pith.science/pith/YRL573PMT7IFG33ZS33GQZABE5/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/YRL573PMT7IFG33ZS33GQZABE5/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T13:52:33Z","links":{"resolver":"https://pith.science/pith/YRL573PMT7IFG33ZS33GQZABE5","bundle":"https://pith.science/pith/YRL573PMT7IFG33ZS33GQZABE5/bundle.json","state":"https://pith.science/pith/YRL573PMT7IFG33ZS33GQZABE5/state.json","well_known_bundle":"https://pith.science/.well-known/pith/YRL573PMT7IFG33ZS33GQZABE5/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:YRL573PMT7IFG33ZS33GQZABE5","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"c9068c1761cca53a9a3b354fa5444159795fdd89816d92fe221691c95d597ffd","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2017-11-15T19:56:24Z","title_canon_sha256":"4b07c7958420fa12c18d43709315a63dad4332cefb59bfd8f88dc067f100da54"},"schema_version":"1.0","source":{"id":"1711.05780","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1711.05780","created_at":"2026-05-18T00:18:31Z"},{"alias_kind":"arxiv_version","alias_value":"1711.05780v2","created_at":"2026-05-18T00:18:31Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1711.05780","created_at":"2026-05-18T00:18:31Z"},{"alias_kind":"pith_short_12","alias_value":"YRL573PMT7IF","created_at":"2026-05-18T12:31:56Z"},{"alias_kind":"pith_short_16","alias_value":"YRL573PMT7IFG33Z","created_at":"2026-05-18T12:31:56Z"},{"alias_kind":"pith_short_8","alias_value":"YRL573PM","created_at":"2026-05-18T12:31:56Z"}],"graph_snapshots":[{"event_id":"sha256:c8fe31a3b4f3cd9aa497c4e3837f87759ba61aedd413c38757a06955e58ae670","target":"graph","created_at":"2026-05-18T00:18:31Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Virtual agents are becoming a prominent channel of interaction in customer service. Not all customer interactions are smooth, however, and some can become almost comically bad. In such instances, a human agent might need to step in and salvage the conversation. Detecting bad conversations is important since disappointing customer service may threaten customer loyalty and impact revenue. In this paper, we outline an approach to detecting such egregious conversations, using behavioral cues from the user, patterns in agent responses, and user-agent interaction. Using logs of two commercial system","authors_text":"David Konopnicki, David Piorkowski, John Richards, Jonathan Herzig, Michal Shmueli-Scheuer, Tommy Sandbank","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2017-11-15T19:56:24Z","title":"Detecting Egregious Conversations between Customers and Virtual Agents"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1711.05780","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:05bef9e8330d263068db88181102b1a2d3f809587fa127cb91eaf9a9caefd3a2","target":"record","created_at":"2026-05-18T00:18:31Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"c9068c1761cca53a9a3b354fa5444159795fdd89816d92fe221691c95d597ffd","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2017-11-15T19:56:24Z","title_canon_sha256":"4b07c7958420fa12c18d43709315a63dad4332cefb59bfd8f88dc067f100da54"},"schema_version":"1.0","source":{"id":"1711.05780","kind":"arxiv","version":2}},"canonical_sha256":"c457dfedec9fd0536f7996f6686401276d212eb7d30a91d059f7d870bc73ec85","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c457dfedec9fd0536f7996f6686401276d212eb7d30a91d059f7d870bc73ec85","first_computed_at":"2026-05-18T00:18:31.327062Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:18:31.327062Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"bz2uWUNX77cfM8b+BfL0lmfpu9d1w2PH588PIgGS1Zs90O9q3ahWXYkP0cZu/i2GULKVjguFyU/zhThfvf2XCw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:18:31.327452Z","signed_message":"canonical_sha256_bytes"},"source_id":"1711.05780","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:05bef9e8330d263068db88181102b1a2d3f809587fa127cb91eaf9a9caefd3a2","sha256:c8fe31a3b4f3cd9aa497c4e3837f87759ba61aedd413c38757a06955e58ae670"],"state_sha256":"e05422504fb69e129148f765544b64eba73bb7e9f87eb973371792ded356636c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"og5vxhOYynifBHtXvQXyYmoCVEYjhqRfP8L32Ku7PzU+6KxG7AV8XLMm88FyoE3rfr6NJV335J72Cp5iKfGVAw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T13:52:33.747515Z","bundle_sha256":"a16fc6f7da1c9d894d59e14012c3a10a0c6bbc35474f96e709d5b1394436485d"}}