pith. sign in

Integrity report for When can a neural operator replace a coarse solve? Architectural principles for two-level preconditioning

A machine-verified record of the checks Pith has run against this paper: detector runs, findings, signed bundle events, and canonical identifiers.

arXiv:2605.19867 · pith:2026:667CMDK5PMCT7O5DFSVGNPTUCF

2Critical
5Advisory
7Detectors run
2026-05-21Last checked

Paper page arXiv integrity.json bundle.json

Detector runs

claim_evidence completed v1.0.0 · findings 0 · 2026-05-21 03:42:20.343792+00:00
doi_compliance completed v1.0.0 · findings 7 · 2026-05-21 02:13:51.833311+00:00
doi_title_agreement completed v1.0.0 · findings 0 · 2026-05-21 02:01:32.343377+00:00
cited_work_retraction completed v1.0.0 · findings 0 · 2026-05-20 01:51:58.618766+00:00
shingle_duplication skipped v0.1.0 · findings 0 · 2026-05-20 01:49:56.311416+00:00
citation_quote_validity skipped v0.1.0 · findings 0 · 2026-05-20 01:49:55.537586+00:00
ai_meta_artifact skipped v1.0.0 · findings 0 · 2026-05-20 01:33:25.274302+00:00

Findings

No public integrity findings for this paper.

Signed record

The machine-readable record for this paper lives at /pith/667CMDK5PMCT7O5DFSVGNPTUCF/integrity.json. Pith Number bundles also include signed pith.integrity.v1 events where a Pith Number exists.