{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:ZIILDTLGUEWGAJEARESMF4AQMS","short_pith_number":"pith:ZIILDTLG","canonical_record":{"source":{"id":"1307.6066","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2013-07-23T13:28:56Z","cross_cats_sorted":["cs.GT"],"title_canon_sha256":"63853ea10ac24502e53db268d20c5e1e6de6d69f04c042ee1615d4896b870329","abstract_canon_sha256":"2e0970d3b56b39ab7083b42b690d4ef4b0cea4a004d6e1539571354043b03a23"},"schema_version":"1.0"},"canonical_sha256":"ca10b1cd66a12c6024808924c2f01064bcbd9cb6aaed092bd9b9a0d5019aa3e1","source":{"kind":"arxiv","id":"1307.6066","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1307.6066","created_at":"2026-05-18T03:17:45Z"},{"alias_kind":"arxiv_version","alias_value":"1307.6066v1","created_at":"2026-05-18T03:17:45Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1307.6066","created_at":"2026-05-18T03:17:45Z"},{"alias_kind":"pith_short_12","alias_value":"ZIILDTLGUEWG","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_16","alias_value":"ZIILDTLGUEWGAJEA","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_8","alias_value":"ZIILDTLG","created_at":"2026-05-18T12:28:09Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:ZIILDTLGUEWGAJEARESMF4AQMS","target":"record","payload":{"canonical_record":{"source":{"id":"1307.6066","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2013-07-23T13:28:56Z","cross_cats_sorted":["cs.GT"],"title_canon_sha256":"63853ea10ac24502e53db268d20c5e1e6de6d69f04c042ee1615d4896b870329","abstract_canon_sha256":"2e0970d3b56b39ab7083b42b690d4ef4b0cea4a004d6e1539571354043b03a23"},"schema_version":"1.0"},"canonical_sha256":"ca10b1cd66a12c6024808924c2f01064bcbd9cb6aaed092bd9b9a0d5019aa3e1","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:17:45.425724Z","signature_b64":"ncEhK8UKEdgUTaS0bAlV60nXxk6jp7hejzQqB5thCjGlDc8GeFVV9hSIADVVi76HvsRcbaww9bGMZTLAGRXqCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ca10b1cd66a12c6024808924c2f01064bcbd9cb6aaed092bd9b9a0d5019aa3e1","last_reissued_at":"2026-05-18T03:17:45.425051Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:17:45.425051Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1307.6066","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:17:45Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XBUENPThnSgeb5P+1aKCOndUNWalO14lRoDeW0MZA1XKCummhHUT+Uz4iLpGInrcx4j29GDVPz22mEjH9p0tBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T04:22:33.494545Z"},"content_sha256":"e9cc5002b39bf95469235b02e922bfb0656c9f099a2751d1e853e723f2bade40","schema_version":"1.0","event_id":"sha256:e9cc5002b39bf95469235b02e922bfb0656c9f099a2751d1e853e723f2bade40"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:ZIILDTLGUEWGAJEARESMF4AQMS","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.GT"],"primary_cat":"cs.DC","authors_text":"Jiangchuan Liu, Ke Xu, Xuelin Shi, Yong Wang","submitted_at":"2013-07-23T13:28:56Z","abstract_excerpt":"Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most e"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1307.6066","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:17:45Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"RpfqyKaFjRaL1dpzK1ISIwJxhILjTamoPUFH6L1XfG4dCavSPqadetoG2JSfqad5IZytKzHdj79cQST0WhRPBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T04:22:33.495469Z"},"content_sha256":"77680ecf0ed27b19b1b9e56a4075a19e238575181146d1ea7ef019285fc75068","schema_version":"1.0","event_id":"sha256:77680ecf0ed27b19b1b9e56a4075a19e238575181146d1ea7ef019285fc75068"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ZIILDTLGUEWGAJEARESMF4AQMS/bundle.json","state_url":"https://pith.science/pith/ZIILDTLGUEWGAJEARESMF4AQMS/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ZIILDTLGUEWGAJEARESMF4AQMS/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T04:22:33Z","links":{"resolver":"https://pith.science/pith/ZIILDTLGUEWGAJEARESMF4AQMS","bundle":"https://pith.science/pith/ZIILDTLGUEWGAJEARESMF4AQMS/bundle.json","state":"https://pith.science/pith/ZIILDTLGUEWGAJEARESMF4AQMS/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ZIILDTLGUEWGAJEARESMF4AQMS/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:ZIILDTLGUEWGAJEARESMF4AQMS","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"2e0970d3b56b39ab7083b42b690d4ef4b0cea4a004d6e1539571354043b03a23","cross_cats_sorted":["cs.GT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2013-07-23T13:28:56Z","title_canon_sha256":"63853ea10ac24502e53db268d20c5e1e6de6d69f04c042ee1615d4896b870329"},"schema_version":"1.0","source":{"id":"1307.6066","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1307.6066","created_at":"2026-05-18T03:17:45Z"},{"alias_kind":"arxiv_version","alias_value":"1307.6066v1","created_at":"2026-05-18T03:17:45Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1307.6066","created_at":"2026-05-18T03:17:45Z"},{"alias_kind":"pith_short_12","alias_value":"ZIILDTLGUEWG","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_16","alias_value":"ZIILDTLGUEWGAJEA","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_8","alias_value":"ZIILDTLG","created_at":"2026-05-18T12:28:09Z"}],"graph_snapshots":[{"event_id":"sha256:77680ecf0ed27b19b1b9e56a4075a19e238575181146d1ea7ef019285fc75068","target":"graph","created_at":"2026-05-18T03:17:45Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such competitive cloud computing markets, pricing policies are critical to market efficiency. While CSPs often publish their prices and charge users according to the amount of resources they consume, auction mechanism is rarely applied. In fact a feasible auction mechanism is the most e","authors_text":"Jiangchuan Liu, Ke Xu, Xuelin Shi, Yong Wang","cross_cats":["cs.GT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2013-07-23T13:28:56Z","title":"Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1307.6066","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:e9cc5002b39bf95469235b02e922bfb0656c9f099a2751d1e853e723f2bade40","target":"record","created_at":"2026-05-18T03:17:45Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"2e0970d3b56b39ab7083b42b690d4ef4b0cea4a004d6e1539571354043b03a23","cross_cats_sorted":["cs.GT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2013-07-23T13:28:56Z","title_canon_sha256":"63853ea10ac24502e53db268d20c5e1e6de6d69f04c042ee1615d4896b870329"},"schema_version":"1.0","source":{"id":"1307.6066","kind":"arxiv","version":1}},"canonical_sha256":"ca10b1cd66a12c6024808924c2f01064bcbd9cb6aaed092bd9b9a0d5019aa3e1","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"ca10b1cd66a12c6024808924c2f01064bcbd9cb6aaed092bd9b9a0d5019aa3e1","first_computed_at":"2026-05-18T03:17:45.425051Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:17:45.425051Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ncEhK8UKEdgUTaS0bAlV60nXxk6jp7hejzQqB5thCjGlDc8GeFVV9hSIADVVi76HvsRcbaww9bGMZTLAGRXqCQ==","signature_status":"signed_v1","signed_at":"2026-05-18T03:17:45.425724Z","signed_message":"canonical_sha256_bytes"},"source_id":"1307.6066","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:e9cc5002b39bf95469235b02e922bfb0656c9f099a2751d1e853e723f2bade40","sha256:77680ecf0ed27b19b1b9e56a4075a19e238575181146d1ea7ef019285fc75068"],"state_sha256":"6fbac556721ad29d824706e6708f6971e9041da416ae8717aff554f7ffe64308"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"K94q36pBND0NZCwx2IY6/cAP1KxiZjwPVhwR6t6YvZmuThdStA3cRgyYUIp018J9akfWsBGBa5clmlhz1tbvBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T04:22:33.499195Z","bundle_sha256":"047d399cdd054673c31dad8f98a6a09b30e71aee4451a543813709fd782581f4"}}