{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.18532","arxiv_id":"2604.18532","integrity":{"available":true,"endpoint":"/pith/2604.18532/integrity.json","summary":{"critical":0,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":0,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T03:54:22.230176Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-540-45138-9\\_26) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-540-45138-9\\_26","detected_arxiv_id":null,"ref_index":99,"audited_at":"2026-05-20T03:54:22.230176Z"}],"snapshot_sha256":"52e95ee87353d5ff6ec815e1ab3dbd55e440da2ee94a044abbeee5764995f95e"},"events":[{"event_id":4651,"event_type":"pith.integrity.v1","payload_sha256":"9abab7669ad968828648669e4311ae5db8e8c5ec8949aabf7b1888b9cb1f43b7","signature_b64":"XnSK4ibB6fdSGtmvZMFsY3HkYlsL+WDmcWEZJ8OsWt55GpCcdxvteJmtkOhdgN1GXaVl8V+yhn7GAzTbVN6xCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T03:57:41.558407+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-540-45138-9\\_26) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Relating Hierarchy of Temporal Properties to Model Checking , author =. Mathematical Foundations of Computer Science 2003, 28th International Symposium,. doi:10.1007/978-3-540-45138-9\\_26 , url =","arxiv_id":"2604.18532","detector":"doi_compliance","evidence":{"ref_index":99,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Relating Hierarchy of Temporal Properties to Model Checking , author =. Mathematical Foundations of Computer Science 2003, 28th International Symposium,. doi:10.1007/978-3-540-45138-9\\_26 , url =","reconstructed_doi":"10.1007/978-3-540-45138-9\\_26"},"severity":"advisory","ref_index":99,"audited_at":"2026-05-20T03:54:22.230176Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-540-45138-9\\_26","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"496739079797242ab41bfab2268542c7c598653a6a96c423e1a5aab83f964516","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.18532/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}