{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2010:ZQFRIIJUDCZGW3AVBTDP653G5K","short_pith_number":"pith:ZQFRIIJU","canonical_record":{"source":{"id":"1008.2005","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DM","submitted_at":"2010-08-11T20:35:56Z","cross_cats_sorted":["cs.CC","cs.SI"],"title_canon_sha256":"53d0da99c2ce6a1e01629eaf5e49073ee071d5823e7184cc0ec798f3a0c2c374","abstract_canon_sha256":"f00bb6a473c3c1c615a9d7ecba758bac2e251540a32e52e16862b4c16f3c3dc4"},"schema_version":"1.0"},"canonical_sha256":"cc0b14213418b26b6c150cc6ff7766ea983e67948403409b7f3b280822c4d464","source":{"kind":"arxiv","id":"1008.2005","version":4},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.2005","created_at":"2026-05-18T04:09:35Z"},{"alias_kind":"arxiv_version","alias_value":"1008.2005v4","created_at":"2026-05-18T04:09:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.2005","created_at":"2026-05-18T04:09:35Z"},{"alias_kind":"pith_short_12","alias_value":"ZQFRIIJUDCZG","created_at":"2026-05-18T12:26:18Z"},{"alias_kind":"pith_short_16","alias_value":"ZQFRIIJUDCZGW3AV","created_at":"2026-05-18T12:26:18Z"},{"alias_kind":"pith_short_8","alias_value":"ZQFRIIJU","created_at":"2026-05-18T12:26:18Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2010:ZQFRIIJUDCZGW3AVBTDP653G5K","target":"record","payload":{"canonical_record":{"source":{"id":"1008.2005","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DM","submitted_at":"2010-08-11T20:35:56Z","cross_cats_sorted":["cs.CC","cs.SI"],"title_canon_sha256":"53d0da99c2ce6a1e01629eaf5e49073ee071d5823e7184cc0ec798f3a0c2c374","abstract_canon_sha256":"f00bb6a473c3c1c615a9d7ecba758bac2e251540a32e52e16862b4c16f3c3dc4"},"schema_version":"1.0"},"canonical_sha256":"cc0b14213418b26b6c150cc6ff7766ea983e67948403409b7f3b280822c4d464","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:09:35.075980Z","signature_b64":"rOekvfO39hTMC2bThrJuekm8q6Yk/qRnKjm7yE9vIwvNcHR85/sVxA2td9tPKQ36UPYyzYeMusEA/1aFmvvaDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"cc0b14213418b26b6c150cc6ff7766ea983e67948403409b7f3b280822c4d464","last_reissued_at":"2026-05-18T04:09:35.075543Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:09:35.075543Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1008.2005","source_version":4,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:09:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"C/G2ouPR2yreNOKjnxFUZtckXCEMamiTSaBzSsq+P7Rrz5fVESjFCaEmQ8aq3d73J3yzW7IqAsqDkRd0BacBAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T09:53:41.676075Z"},"content_sha256":"4e939089aad61445ca5c54e3717133755c5c2b75ba204433ed081d4abc130e70","schema_version":"1.0","event_id":"sha256:4e939089aad61445ca5c54e3717133755c5c2b75ba204433ed081d4abc130e70"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2010:ZQFRIIJUDCZGW3AVBTDP653G5K","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Approximation Analysis of Influence Spread in Social Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CC","cs.SI"],"primary_cat":"cs.DM","authors_text":"Amit Goyal, Francesco Bonchi, Laks V. S. Lakshmanan, Suresh Venkatasubramanian","submitted_at":"2010-08-11T20:35:56Z","abstract_excerpt":"In the context of influence propagation in a social graph, we can identify three orthogonal dimensions - the number of seed nodes activated at the beginning (known as budget), the expected number of activated nodes at the end of the propagation (known as expected spread or coverage), and the time taken for the propagation. We can constrain one or two of these and try to optimize the third. In their seminal paper, Kempe et al. constrained the budget, left time unconstrained, and maximized the coverage: this problem is known as Influence Maximization.\n  In this paper, we study alternative optimi"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.2005","kind":"arxiv","version":4},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:09:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"KlUQ4M+D3Sgk05/c5dSmUivGgUMXU37CrGIr+NSf10/5mihczB4vnaiYLb2ku/vqtLeLFT3fTk7Mw/t2z/EVCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T09:53:41.676806Z"},"content_sha256":"1361ab04ec1912e6d32927d3cf9f883cd0644cf5de4014b1a88af179fe4af1a0","schema_version":"1.0","event_id":"sha256:1361ab04ec1912e6d32927d3cf9f883cd0644cf5de4014b1a88af179fe4af1a0"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ZQFRIIJUDCZGW3AVBTDP653G5K/bundle.json","state_url":"https://pith.science/pith/ZQFRIIJUDCZGW3AVBTDP653G5K/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ZQFRIIJUDCZGW3AVBTDP653G5K/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T09:53:41Z","links":{"resolver":"https://pith.science/pith/ZQFRIIJUDCZGW3AVBTDP653G5K","bundle":"https://pith.science/pith/ZQFRIIJUDCZGW3AVBTDP653G5K/bundle.json","state":"https://pith.science/pith/ZQFRIIJUDCZGW3AVBTDP653G5K/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ZQFRIIJUDCZGW3AVBTDP653G5K/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2010:ZQFRIIJUDCZGW3AVBTDP653G5K","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"f00bb6a473c3c1c615a9d7ecba758bac2e251540a32e52e16862b4c16f3c3dc4","cross_cats_sorted":["cs.CC","cs.SI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DM","submitted_at":"2010-08-11T20:35:56Z","title_canon_sha256":"53d0da99c2ce6a1e01629eaf5e49073ee071d5823e7184cc0ec798f3a0c2c374"},"schema_version":"1.0","source":{"id":"1008.2005","kind":"arxiv","version":4}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.2005","created_at":"2026-05-18T04:09:35Z"},{"alias_kind":"arxiv_version","alias_value":"1008.2005v4","created_at":"2026-05-18T04:09:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.2005","created_at":"2026-05-18T04:09:35Z"},{"alias_kind":"pith_short_12","alias_value":"ZQFRIIJUDCZG","created_at":"2026-05-18T12:26:18Z"},{"alias_kind":"pith_short_16","alias_value":"ZQFRIIJUDCZGW3AV","created_at":"2026-05-18T12:26:18Z"},{"alias_kind":"pith_short_8","alias_value":"ZQFRIIJU","created_at":"2026-05-18T12:26:18Z"}],"graph_snapshots":[{"event_id":"sha256:1361ab04ec1912e6d32927d3cf9f883cd0644cf5de4014b1a88af179fe4af1a0","target":"graph","created_at":"2026-05-18T04:09:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In the context of influence propagation in a social graph, we can identify three orthogonal dimensions - the number of seed nodes activated at the beginning (known as budget), the expected number of activated nodes at the end of the propagation (known as expected spread or coverage), and the time taken for the propagation. We can constrain one or two of these and try to optimize the third. In their seminal paper, Kempe et al. constrained the budget, left time unconstrained, and maximized the coverage: this problem is known as Influence Maximization.\n  In this paper, we study alternative optimi","authors_text":"Amit Goyal, Francesco Bonchi, Laks V. S. Lakshmanan, Suresh Venkatasubramanian","cross_cats":["cs.CC","cs.SI"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DM","submitted_at":"2010-08-11T20:35:56Z","title":"Approximation Analysis of Influence Spread in Social Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.2005","kind":"arxiv","version":4},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4e939089aad61445ca5c54e3717133755c5c2b75ba204433ed081d4abc130e70","target":"record","created_at":"2026-05-18T04:09:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"f00bb6a473c3c1c615a9d7ecba758bac2e251540a32e52e16862b4c16f3c3dc4","cross_cats_sorted":["cs.CC","cs.SI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DM","submitted_at":"2010-08-11T20:35:56Z","title_canon_sha256":"53d0da99c2ce6a1e01629eaf5e49073ee071d5823e7184cc0ec798f3a0c2c374"},"schema_version":"1.0","source":{"id":"1008.2005","kind":"arxiv","version":4}},"canonical_sha256":"cc0b14213418b26b6c150cc6ff7766ea983e67948403409b7f3b280822c4d464","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"cc0b14213418b26b6c150cc6ff7766ea983e67948403409b7f3b280822c4d464","first_computed_at":"2026-05-18T04:09:35.075543Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T04:09:35.075543Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"rOekvfO39hTMC2bThrJuekm8q6Yk/qRnKjm7yE9vIwvNcHR85/sVxA2td9tPKQ36UPYyzYeMusEA/1aFmvvaDA==","signature_status":"signed_v1","signed_at":"2026-05-18T04:09:35.075980Z","signed_message":"canonical_sha256_bytes"},"source_id":"1008.2005","source_kind":"arxiv","source_version":4}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4e939089aad61445ca5c54e3717133755c5c2b75ba204433ed081d4abc130e70","sha256:1361ab04ec1912e6d32927d3cf9f883cd0644cf5de4014b1a88af179fe4af1a0"],"state_sha256":"fb8ec943f2158a58d8813e68b969fd130632ba9fc1ff0e25a6a128dc4247b681"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"nUHgsY5nRKi+6TjWW/d2XUl5879u7j/nv5mm1K1o9T9W0EPdTYHkAJKguN5AHkmtnEQoeOCLyaNnnHgcDJ7vAw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T09:53:41.680585Z","bundle_sha256":"d44d6f0b91c912ff2f04aae15661fec099356b1398236f92f16959ec7a79e021"}}