{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:Z5QMQABMJYMYXMBF6N6XPUYCW7","short_pith_number":"pith:Z5QMQABM","canonical_record":{"source":{"id":"1602.04934","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2016-02-16T08:03:41Z","cross_cats_sorted":["cs.CC"],"title_canon_sha256":"e2112af722a1a3d742075796bbaacbd0eb9e8763d3ad49942b2c3551714cdde8","abstract_canon_sha256":"9495fa6b6267a2ea80dddd59bb6bf952b716b233b715d6e0b7aa47d34d18bfac"},"schema_version":"1.0"},"canonical_sha256":"cf60c8002c4e198bb025f37d77d302b7cbbabe83ed425e67dd7f49ad81c92d25","source":{"kind":"arxiv","id":"1602.04934","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1602.04934","created_at":"2026-05-18T01:20:37Z"},{"alias_kind":"arxiv_version","alias_value":"1602.04934v1","created_at":"2026-05-18T01:20:37Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1602.04934","created_at":"2026-05-18T01:20:37Z"},{"alias_kind":"pith_short_12","alias_value":"Z5QMQABMJYMY","created_at":"2026-05-18T12:30:53Z"},{"alias_kind":"pith_short_16","alias_value":"Z5QMQABMJYMYXMBF","created_at":"2026-05-18T12:30:53Z"},{"alias_kind":"pith_short_8","alias_value":"Z5QMQABM","created_at":"2026-05-18T12:30:53Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:Z5QMQABMJYMYXMBF6N6XPUYCW7","target":"record","payload":{"canonical_record":{"source":{"id":"1602.04934","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2016-02-16T08:03:41Z","cross_cats_sorted":["cs.CC"],"title_canon_sha256":"e2112af722a1a3d742075796bbaacbd0eb9e8763d3ad49942b2c3551714cdde8","abstract_canon_sha256":"9495fa6b6267a2ea80dddd59bb6bf952b716b233b715d6e0b7aa47d34d18bfac"},"schema_version":"1.0"},"canonical_sha256":"cf60c8002c4e198bb025f37d77d302b7cbbabe83ed425e67dd7f49ad81c92d25","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:20:37.827640Z","signature_b64":"Ug9Xg2sTH9qV6yEtxh7kJvCcK1rhMzR6kRolJA1HfOWfOrSG8yAFiPWIPD1hRBo/BROg1sEMtRNcTmfm5T3/Aw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"cf60c8002c4e198bb025f37d77d302b7cbbabe83ed425e67dd7f49ad81c92d25","last_reissued_at":"2026-05-18T01:20:37.827269Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:20:37.827269Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1602.04934","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:20:37Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"6y5Go191BAu+opUXTyAMxXTer5WcApg8dScj6aCUX3+JFwYw+x1OvaC4v4tdHcK1THwF5uia2UOrtQGxp0xNAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T14:26:52.475605Z"},"content_sha256":"54cad0ef11b1e793fbe7cc96888d0d59c88e74cb9079b054453705e2a2753f08","schema_version":"1.0","event_id":"sha256:54cad0ef11b1e793fbe7cc96888d0d59c88e74cb9079b054453705e2a2753f08"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:Z5QMQABMJYMYXMBF6N6XPUYCW7","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Strong Backdoors for Linear Temporal Logic","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CC"],"primary_cat":"cs.LO","authors_text":"Arne Meier, Irena Schindler, M. S. Ramanujan, Sebastian Ordyniak","submitted_at":"2016-02-16T08:03:41Z","abstract_excerpt":"In the present paper we introduce the notion of strong backdoors into the field of temporal logic for the CNF-fragment of linear temporal logic introduced by Fisher. We study the parameterised complexity of the satisfiability problem parameterised by the size of the backdoor. We distinguish between backdoor detection and evaluation of backdoors into the fragments of horn and krom formulas. Here we classify the operator fragments of globally-operators for past or future, and the combination of both. Detection is shown to be in FPT whereas the complexity of evaluation behaves different. We show "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1602.04934","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:20:37Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/1RNf+peHEI6Q4N8t2rSgvmsvRuD/TiFMlPKyVbUE16oeCMmRpBH5t8WmPkBDSZYRjI1RzJpLJecZmCIKwKbAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T14:26:52.476148Z"},"content_sha256":"727d8732eb2d26528dac15d82f9511f9578884730dabbcb9a1b39499bc48e01a","schema_version":"1.0","event_id":"sha256:727d8732eb2d26528dac15d82f9511f9578884730dabbcb9a1b39499bc48e01a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/Z5QMQABMJYMYXMBF6N6XPUYCW7/bundle.json","state_url":"https://pith.science/pith/Z5QMQABMJYMYXMBF6N6XPUYCW7/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/Z5QMQABMJYMYXMBF6N6XPUYCW7/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T14:26:52Z","links":{"resolver":"https://pith.science/pith/Z5QMQABMJYMYXMBF6N6XPUYCW7","bundle":"https://pith.science/pith/Z5QMQABMJYMYXMBF6N6XPUYCW7/bundle.json","state":"https://pith.science/pith/Z5QMQABMJYMYXMBF6N6XPUYCW7/state.json","well_known_bundle":"https://pith.science/.well-known/pith/Z5QMQABMJYMYXMBF6N6XPUYCW7/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:Z5QMQABMJYMYXMBF6N6XPUYCW7","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"9495fa6b6267a2ea80dddd59bb6bf952b716b233b715d6e0b7aa47d34d18bfac","cross_cats_sorted":["cs.CC"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2016-02-16T08:03:41Z","title_canon_sha256":"e2112af722a1a3d742075796bbaacbd0eb9e8763d3ad49942b2c3551714cdde8"},"schema_version":"1.0","source":{"id":"1602.04934","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1602.04934","created_at":"2026-05-18T01:20:37Z"},{"alias_kind":"arxiv_version","alias_value":"1602.04934v1","created_at":"2026-05-18T01:20:37Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1602.04934","created_at":"2026-05-18T01:20:37Z"},{"alias_kind":"pith_short_12","alias_value":"Z5QMQABMJYMY","created_at":"2026-05-18T12:30:53Z"},{"alias_kind":"pith_short_16","alias_value":"Z5QMQABMJYMYXMBF","created_at":"2026-05-18T12:30:53Z"},{"alias_kind":"pith_short_8","alias_value":"Z5QMQABM","created_at":"2026-05-18T12:30:53Z"}],"graph_snapshots":[{"event_id":"sha256:727d8732eb2d26528dac15d82f9511f9578884730dabbcb9a1b39499bc48e01a","target":"graph","created_at":"2026-05-18T01:20:37Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In the present paper we introduce the notion of strong backdoors into the field of temporal logic for the CNF-fragment of linear temporal logic introduced by Fisher. We study the parameterised complexity of the satisfiability problem parameterised by the size of the backdoor. We distinguish between backdoor detection and evaluation of backdoors into the fragments of horn and krom formulas. Here we classify the operator fragments of globally-operators for past or future, and the combination of both. Detection is shown to be in FPT whereas the complexity of evaluation behaves different. We show ","authors_text":"Arne Meier, Irena Schindler, M. S. Ramanujan, Sebastian Ordyniak","cross_cats":["cs.CC"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2016-02-16T08:03:41Z","title":"Strong Backdoors for Linear Temporal Logic"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1602.04934","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:54cad0ef11b1e793fbe7cc96888d0d59c88e74cb9079b054453705e2a2753f08","target":"record","created_at":"2026-05-18T01:20:37Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"9495fa6b6267a2ea80dddd59bb6bf952b716b233b715d6e0b7aa47d34d18bfac","cross_cats_sorted":["cs.CC"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LO","submitted_at":"2016-02-16T08:03:41Z","title_canon_sha256":"e2112af722a1a3d742075796bbaacbd0eb9e8763d3ad49942b2c3551714cdde8"},"schema_version":"1.0","source":{"id":"1602.04934","kind":"arxiv","version":1}},"canonical_sha256":"cf60c8002c4e198bb025f37d77d302b7cbbabe83ed425e67dd7f49ad81c92d25","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"cf60c8002c4e198bb025f37d77d302b7cbbabe83ed425e67dd7f49ad81c92d25","first_computed_at":"2026-05-18T01:20:37.827269Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:20:37.827269Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Ug9Xg2sTH9qV6yEtxh7kJvCcK1rhMzR6kRolJA1HfOWfOrSG8yAFiPWIPD1hRBo/BROg1sEMtRNcTmfm5T3/Aw==","signature_status":"signed_v1","signed_at":"2026-05-18T01:20:37.827640Z","signed_message":"canonical_sha256_bytes"},"source_id":"1602.04934","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:54cad0ef11b1e793fbe7cc96888d0d59c88e74cb9079b054453705e2a2753f08","sha256:727d8732eb2d26528dac15d82f9511f9578884730dabbcb9a1b39499bc48e01a"],"state_sha256":"f958be602e55be9d66ff25adf0bcbcf64e4ff48cdba6b4b25d76549caaca0e6c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"TidpFkBk+lw3Zzx2NFarkXmfv9J5d2EcVcsZddlQHEowjJctmY5BmPgAygHhRnzbsA2wGziftI1HvUoJnDnvBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T14:26:52.479119Z","bundle_sha256":"b39b5bc2f39c89d5fa5e0c572e6fa4f877fe25dcea7fda47d821e0e206db6a73"}}