{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2014:AWPSDGP3DNJWNFI3LLYEN7PU3A","short_pith_number":"pith:AWPSDGP3","canonical_record":{"source":{"id":"1408.6966","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-08-29T09:48:12Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"7e8627c2ce4d53600379e926257d65cfdf3b747cf34da9f8327217d38eb42d96","abstract_canon_sha256":"cdd3911276b91e34023e390473e4eed025f163da177512e17e5f728b12a56725"},"schema_version":"1.0"},"canonical_sha256":"059f2199fb1b5366951b5af046fdf4d8372d5236e0161ae106009b25a8cace3b","source":{"kind":"arxiv","id":"1408.6966","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1408.6966","created_at":"2026-05-18T00:59:02Z"},{"alias_kind":"arxiv_version","alias_value":"1408.6966v1","created_at":"2026-05-18T00:59:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1408.6966","created_at":"2026-05-18T00:59:02Z"},{"alias_kind":"pith_short_12","alias_value":"AWPSDGP3DNJW","created_at":"2026-05-18T12:28:19Z"},{"alias_kind":"pith_short_16","alias_value":"AWPSDGP3DNJWNFI3","created_at":"2026-05-18T12:28:19Z"},{"alias_kind":"pith_short_8","alias_value":"AWPSDGP3","created_at":"2026-05-18T12:28:19Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2014:AWPSDGP3DNJWNFI3LLYEN7PU3A","target":"record","payload":{"canonical_record":{"source":{"id":"1408.6966","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-08-29T09:48:12Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"7e8627c2ce4d53600379e926257d65cfdf3b747cf34da9f8327217d38eb42d96","abstract_canon_sha256":"cdd3911276b91e34023e390473e4eed025f163da177512e17e5f728b12a56725"},"schema_version":"1.0"},"canonical_sha256":"059f2199fb1b5366951b5af046fdf4d8372d5236e0161ae106009b25a8cace3b","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:59:02.735253Z","signature_b64":"zArdhxo2d6VkO2HB5Ydha1oHr73KCcMpAzPBKeE3xjZtmtgo7aN09FSoXiAzbslYYg/+rVbvvM2txYj6OfZZAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"059f2199fb1b5366951b5af046fdf4d8372d5236e0161ae106009b25a8cace3b","last_reissued_at":"2026-05-18T00:59:02.734599Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:59:02.734599Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1408.6966","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:59:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8DP5J57ZJ3uAM8r29mCklDQ75SY6Zj/3Yd0FQxu4s0oOLp9G6H2fTsLVW3Us9IbbHmi85XdhNyfyNDpBW8T6AA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:31:16.258612Z"},"content_sha256":"8ec2aa14e5c5dd58b5a99ae2df28836e041b04b14681b47fd02fae7e401d611e","schema_version":"1.0","event_id":"sha256:8ec2aa14e5c5dd58b5a99ae2df28836e041b04b14681b47fd02fae7e401d611e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2014:AWPSDGP3DNJWNFI3LLYEN7PU3A","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Rethinking the Role of Interference in Wireless Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Christos Masouros, Dimitris-Alexandros Toumpakaris, Gan Zheng, Ioannis Krikidis, Stelios Timotheou, Zhiguo Ding","submitted_at":"2014-08-29T09:48:12Z","abstract_excerpt":"This article re-examines the fundamental notion of interference in wireless networks by contrasting traditional approaches to new concepts that handle interference in a creative way. Specifically, we discuss the fundamental limits of the interference channel and present the interference alignment technique and its extension of signal alignment techniques. Contrary to this traditional view, which treats interference as a detrimental phenomenon, we introduce three concepts that handle interference as a useful resource. The first concept exploits interference at the modulation level and leads to "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1408.6966","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:59:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3hjgAIy8u5YuNblXIL6mNKwPbvXrqL9KIiAwRMyq6WDAGopVCq7qi7EPUQxxEqz6474Z2PJD2dalQV/UZnR6Cg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:31:16.258995Z"},"content_sha256":"79d60d8a3b6d1d4d61737a4b32200d5ba34353ca7464a0d1b9a06007974802c5","schema_version":"1.0","event_id":"sha256:79d60d8a3b6d1d4d61737a4b32200d5ba34353ca7464a0d1b9a06007974802c5"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/AWPSDGP3DNJWNFI3LLYEN7PU3A/bundle.json","state_url":"https://pith.science/pith/AWPSDGP3DNJWNFI3LLYEN7PU3A/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/AWPSDGP3DNJWNFI3LLYEN7PU3A/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T20:31:16Z","links":{"resolver":"https://pith.science/pith/AWPSDGP3DNJWNFI3LLYEN7PU3A","bundle":"https://pith.science/pith/AWPSDGP3DNJWNFI3LLYEN7PU3A/bundle.json","state":"https://pith.science/pith/AWPSDGP3DNJWNFI3LLYEN7PU3A/state.json","well_known_bundle":"https://pith.science/.well-known/pith/AWPSDGP3DNJWNFI3LLYEN7PU3A/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2014:AWPSDGP3DNJWNFI3LLYEN7PU3A","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"cdd3911276b91e34023e390473e4eed025f163da177512e17e5f728b12a56725","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-08-29T09:48:12Z","title_canon_sha256":"7e8627c2ce4d53600379e926257d65cfdf3b747cf34da9f8327217d38eb42d96"},"schema_version":"1.0","source":{"id":"1408.6966","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1408.6966","created_at":"2026-05-18T00:59:02Z"},{"alias_kind":"arxiv_version","alias_value":"1408.6966v1","created_at":"2026-05-18T00:59:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1408.6966","created_at":"2026-05-18T00:59:02Z"},{"alias_kind":"pith_short_12","alias_value":"AWPSDGP3DNJW","created_at":"2026-05-18T12:28:19Z"},{"alias_kind":"pith_short_16","alias_value":"AWPSDGP3DNJWNFI3","created_at":"2026-05-18T12:28:19Z"},{"alias_kind":"pith_short_8","alias_value":"AWPSDGP3","created_at":"2026-05-18T12:28:19Z"}],"graph_snapshots":[{"event_id":"sha256:79d60d8a3b6d1d4d61737a4b32200d5ba34353ca7464a0d1b9a06007974802c5","target":"graph","created_at":"2026-05-18T00:59:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This article re-examines the fundamental notion of interference in wireless networks by contrasting traditional approaches to new concepts that handle interference in a creative way. Specifically, we discuss the fundamental limits of the interference channel and present the interference alignment technique and its extension of signal alignment techniques. Contrary to this traditional view, which treats interference as a detrimental phenomenon, we introduce three concepts that handle interference as a useful resource. The first concept exploits interference at the modulation level and leads to ","authors_text":"Christos Masouros, Dimitris-Alexandros Toumpakaris, Gan Zheng, Ioannis Krikidis, Stelios Timotheou, Zhiguo Ding","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-08-29T09:48:12Z","title":"Rethinking the Role of Interference in Wireless Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1408.6966","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:8ec2aa14e5c5dd58b5a99ae2df28836e041b04b14681b47fd02fae7e401d611e","target":"record","created_at":"2026-05-18T00:59:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"cdd3911276b91e34023e390473e4eed025f163da177512e17e5f728b12a56725","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2014-08-29T09:48:12Z","title_canon_sha256":"7e8627c2ce4d53600379e926257d65cfdf3b747cf34da9f8327217d38eb42d96"},"schema_version":"1.0","source":{"id":"1408.6966","kind":"arxiv","version":1}},"canonical_sha256":"059f2199fb1b5366951b5af046fdf4d8372d5236e0161ae106009b25a8cace3b","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"059f2199fb1b5366951b5af046fdf4d8372d5236e0161ae106009b25a8cace3b","first_computed_at":"2026-05-18T00:59:02.734599Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:59:02.734599Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"zArdhxo2d6VkO2HB5Ydha1oHr73KCcMpAzPBKeE3xjZtmtgo7aN09FSoXiAzbslYYg/+rVbvvM2txYj6OfZZAQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:59:02.735253Z","signed_message":"canonical_sha256_bytes"},"source_id":"1408.6966","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:8ec2aa14e5c5dd58b5a99ae2df28836e041b04b14681b47fd02fae7e401d611e","sha256:79d60d8a3b6d1d4d61737a4b32200d5ba34353ca7464a0d1b9a06007974802c5"],"state_sha256":"32337c22eefff416710bf071cc99e738e1b4232540631f66099e35c4faf5dee2"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"B1Q4dnzOl8bZYduVfo+DOQu/cFA393+7+hFDSI12yMQYmUGBfIra9j1787rJPdJ7TcnRmGMrB8s+Zmcx9f/VBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T20:31:16.261073Z","bundle_sha256":"04d64e9c751704379f8546ec86d8a1b81ae3bf03688bbd0cb426f0e3302ff249"}}