{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:ZOJC5HGU2XTQFTRDH3HUAZKV2P","short_pith_number":"pith:ZOJC5HGU","canonical_record":{"source":{"id":"1312.2949","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PF","submitted_at":"2013-12-10T05:15:32Z","cross_cats_sorted":[],"title_canon_sha256":"051164f4fe3178d689937edcf425b3833b5ef16e7fc7111567f929056bc34c66","abstract_canon_sha256":"c12a8d08530e8662f831afe632bf06e8857e59071d10dd21a2dc63803437f7c0"},"schema_version":"1.0"},"canonical_sha256":"cb922e9cd4d5e702ce233ecf406555d3d589f79b53a804e591be4ef5ac1074ac","source":{"kind":"arxiv","id":"1312.2949","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1312.2949","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"arxiv_version","alias_value":"1312.2949v1","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1312.2949","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"pith_short_12","alias_value":"ZOJC5HGU2XTQ","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_16","alias_value":"ZOJC5HGU2XTQFTRD","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_8","alias_value":"ZOJC5HGU","created_at":"2026-05-18T12:28:09Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:ZOJC5HGU2XTQFTRDH3HUAZKV2P","target":"record","payload":{"canonical_record":{"source":{"id":"1312.2949","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PF","submitted_at":"2013-12-10T05:15:32Z","cross_cats_sorted":[],"title_canon_sha256":"051164f4fe3178d689937edcf425b3833b5ef16e7fc7111567f929056bc34c66","abstract_canon_sha256":"c12a8d08530e8662f831afe632bf06e8857e59071d10dd21a2dc63803437f7c0"},"schema_version":"1.0"},"canonical_sha256":"cb922e9cd4d5e702ce233ecf406555d3d589f79b53a804e591be4ef5ac1074ac","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:05:00.920957Z","signature_b64":"VMVhu0HRW/9OXdm615vR2r1ELpwKBiVzFFJXjaYlPb8iISNYsB4xUeRznx4MX630902f08Noq1cxxxTnsxrYBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"cb922e9cd4d5e702ce233ecf406555d3d589f79b53a804e591be4ef5ac1074ac","last_reissued_at":"2026-05-18T03:05:00.920360Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:05:00.920360Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1312.2949","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:05:00Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"sYblZIVYcpQ5tG4GO8rOrq18SRQvYavwQzD2+Y4OzYRARhbO2/rVYquUFaC+XxAgC9/xrexRjZN7SufSi9faAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:40:51.628768Z"},"content_sha256":"2d6f71309345f809e54caeff36b1b5e7d72bd4ba940753b7e2f78bef0cc5532a","schema_version":"1.0","event_id":"sha256:2d6f71309345f809e54caeff36b1b5e7d72bd4ba940753b7e2f78bef0cc5532a"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:ZOJC5HGU2XTQFTRDH3HUAZKV2P","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"A Survey of Embedded Software Profiling Methodologies","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.PF","authors_text":"Arvind Rajwat, Rajendra Patel","submitted_at":"2013-12-10T05:15:32Z","abstract_excerpt":"Embedded Systems combine one or more processor cores with dedicated logic running on an ASIC or FPGA to meet design goals at reasonable cost. It is achieved by profiling the application with variety of aspects like performance, memory usage, cache hit versus cache miss, energy consumption, etc. Out of these, performance estimation is more important than others. With ever increasing system complexities, it becomes quite necessary to carry out performance estimation of embedded software implemented in a particular processor for fast design space exploration. Such profiled data also guides the de"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1312.2949","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:05:00Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"lm1dBaiANWgKRT2o2/t4dijNQeoE4XiihItGgAFRd1MjRq1Lk110swTCggyKoEqfdAZopPssCACZyNbIzPxUCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:40:51.629426Z"},"content_sha256":"692756d8e1ca4019c3ebf7083a52241c76ed09879321bfe2ed1bf614605f7dde","schema_version":"1.0","event_id":"sha256:692756d8e1ca4019c3ebf7083a52241c76ed09879321bfe2ed1bf614605f7dde"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ZOJC5HGU2XTQFTRDH3HUAZKV2P/bundle.json","state_url":"https://pith.science/pith/ZOJC5HGU2XTQFTRDH3HUAZKV2P/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ZOJC5HGU2XTQFTRDH3HUAZKV2P/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T13:40:51Z","links":{"resolver":"https://pith.science/pith/ZOJC5HGU2XTQFTRDH3HUAZKV2P","bundle":"https://pith.science/pith/ZOJC5HGU2XTQFTRDH3HUAZKV2P/bundle.json","state":"https://pith.science/pith/ZOJC5HGU2XTQFTRDH3HUAZKV2P/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ZOJC5HGU2XTQFTRDH3HUAZKV2P/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:ZOJC5HGU2XTQFTRDH3HUAZKV2P","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"c12a8d08530e8662f831afe632bf06e8857e59071d10dd21a2dc63803437f7c0","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PF","submitted_at":"2013-12-10T05:15:32Z","title_canon_sha256":"051164f4fe3178d689937edcf425b3833b5ef16e7fc7111567f929056bc34c66"},"schema_version":"1.0","source":{"id":"1312.2949","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1312.2949","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"arxiv_version","alias_value":"1312.2949v1","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1312.2949","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"pith_short_12","alias_value":"ZOJC5HGU2XTQ","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_16","alias_value":"ZOJC5HGU2XTQFTRD","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_8","alias_value":"ZOJC5HGU","created_at":"2026-05-18T12:28:09Z"}],"graph_snapshots":[{"event_id":"sha256:692756d8e1ca4019c3ebf7083a52241c76ed09879321bfe2ed1bf614605f7dde","target":"graph","created_at":"2026-05-18T03:05:00Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Embedded Systems combine one or more processor cores with dedicated logic running on an ASIC or FPGA to meet design goals at reasonable cost. It is achieved by profiling the application with variety of aspects like performance, memory usage, cache hit versus cache miss, energy consumption, etc. Out of these, performance estimation is more important than others. With ever increasing system complexities, it becomes quite necessary to carry out performance estimation of embedded software implemented in a particular processor for fast design space exploration. Such profiled data also guides the de","authors_text":"Arvind Rajwat, Rajendra Patel","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PF","submitted_at":"2013-12-10T05:15:32Z","title":"A Survey of Embedded Software Profiling Methodologies"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1312.2949","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:2d6f71309345f809e54caeff36b1b5e7d72bd4ba940753b7e2f78bef0cc5532a","target":"record","created_at":"2026-05-18T03:05:00Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"c12a8d08530e8662f831afe632bf06e8857e59071d10dd21a2dc63803437f7c0","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PF","submitted_at":"2013-12-10T05:15:32Z","title_canon_sha256":"051164f4fe3178d689937edcf425b3833b5ef16e7fc7111567f929056bc34c66"},"schema_version":"1.0","source":{"id":"1312.2949","kind":"arxiv","version":1}},"canonical_sha256":"cb922e9cd4d5e702ce233ecf406555d3d589f79b53a804e591be4ef5ac1074ac","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"cb922e9cd4d5e702ce233ecf406555d3d589f79b53a804e591be4ef5ac1074ac","first_computed_at":"2026-05-18T03:05:00.920360Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:05:00.920360Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"VMVhu0HRW/9OXdm615vR2r1ELpwKBiVzFFJXjaYlPb8iISNYsB4xUeRznx4MX630902f08Noq1cxxxTnsxrYBw==","signature_status":"signed_v1","signed_at":"2026-05-18T03:05:00.920957Z","signed_message":"canonical_sha256_bytes"},"source_id":"1312.2949","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:2d6f71309345f809e54caeff36b1b5e7d72bd4ba940753b7e2f78bef0cc5532a","sha256:692756d8e1ca4019c3ebf7083a52241c76ed09879321bfe2ed1bf614605f7dde"],"state_sha256":"2b19c540657fe86262e976e9b2e9308fd3537c82bd7c5d570a072965fb89e5fa"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/TJTK9nVGTmwC/3bfeyfH/XW+N/aSc19MMOrZOy73Ow1pMrG2gDti3s+weK2zyIhRNnd771Bhu4CCtiKM8ZUDw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T13:40:51.631897Z","bundle_sha256":"2d7088d0bff73d8f79c3ac31ebd6c2df6e56fbf7fcc8f2551591d39500ce1472"}}