{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.19076","arxiv_id":"2604.19076","integrity":{"available":true,"endpoint":"/pith/2604.19076/integrity.json","summary":{"critical":1,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":1,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T03:22:56.253341Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/114925424) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/114925424","detected_arxiv_id":null,"ref_index":46,"audited_at":"2026-05-20T03:22:56.253341Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/645527.657464' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/645527.657464","detected_arxiv_id":null,"ref_index":32,"audited_at":"2026-05-20T03:22:56.253341Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2405.0881020) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arXiv.2405.0881020","detected_arxiv_id":null,"ref_index":40,"audited_at":"2026-05-20T03:22:56.253341Z"}],"snapshot_sha256":"0a5b0ce8cbb9c09bdf127c7d08cdee4fadb99ee9bb79a104bb11773c0eb4651a"},"events":[{"event_id":4535,"event_type":"pith.integrity.v1","payload_sha256":"ee94a3e0073b6849be4b93d3903a53e8f7fd3473e59e3e96cef81f981bad9ffa","signature_b64":"gNUAj//68YeJgleH2HBp5K7ynLnn5IBZnIs0id1Nehv8islw2W5l8ZrnMxoXz26VIBMKP+f5aMMJNrjxCWwqAw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T03:27:40.788150+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/114925424) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Mollineda, R.A., S´ anchez, J.S., Sotoca, J.M.: Data characterization for effec- tive prototype selection. In: Pattern Recognition and Image Analysis, pp. 27–34. Springer, Berlin, Heidelberg (2005). https://doi.org/10.1007/11492542 4","arxiv_id":"2604.19076","detector":"doi_compliance","evidence":{"ref_index":46,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Mollineda, R.A., S´ anchez, J.S., Sotoca, J.M.: Data characterization for effec- tive prototype selection. In: Pattern Recognition and Image Analysis, pp. 27–34. Springer, Berlin, Heidelberg (2005). https://doi.org/10.1007/11492542 4","reconstructed_doi":"10.1007/114925424"},"severity":"advisory","ref_index":46,"audited_at":"2026-05-20T03:22:56.253341Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/114925424","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"166448b43fe91757dfc23e83a463494d325c8fdb93e4e7f689cb2417f92b28a3","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4534,"event_type":"pith.integrity.v1","payload_sha256":"8960552f75fc760e7660be5429e74a181f4cbb39551c34a5881932c024887abd","signature_b64":"ulcG/aOgIU+6MuOI3LFU6u+ZrxAep4jfDWAmBMdks/AMpfZ41y5HjQrOnp4d90IISHacDa73TAv1C2KV+HpJAg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T03:27:40.781658+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2405.0881020) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Javadi-Abhari, A., Treinish, M., Krsulich, K., Wood, C.J., Lishman, J., Gacon, J., Martiel, S., Nation, P.D., Bishop, L.S., Cross, A.W., Johnson, B.R., Gambetta, J.M.: Quantum computing with Qiskit (2024). https://doi.org/10.48550/arXiv. 24","arxiv_id":"2604.19076","detector":"doi_compliance","evidence":{"ref_index":40,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Javadi-Abhari, A., Treinish, M., Krsulich, K., Wood, C.J., Lishman, J., Gacon, J., Martiel, S., Nation, P.D., Bishop, L.S., Cross, A.W., Johnson, B.R., Gambetta, J.M.: Quantum computing with Qiskit (2024). https://doi.org/10.48550/arXiv. 24","reconstructed_doi":"10.48550/arXiv.2405.0881020"},"severity":"advisory","ref_index":40,"audited_at":"2026-05-20T03:22:56.253341Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arXiv.2405.0881020","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"fd512f77ae39a78c73bb2aa75c93313a2bf078829a58790b8b1635029a9f9ef6","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4533,"event_type":"pith.integrity.v1","payload_sha256":"53494350f2df44d9c64d03d07a7506185ad5d192025e1cc5bd80fb3eb7f3845f","signature_b64":"GGbOEDoHBClyNtYnpCHLQtnRVJfPpsUtSLIm2+5lo5yIjyVWGd7b4ofUM1OQtlRKfVg2o+Jpdsxs0apwP653Cw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T03:27:40.774040+00:00","payload":{"note":"Identifier '10.5555/645527.657464' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Saunders, C., Gammerman, A., Vovk, V.: Ridge regression learning algorithm in dual variables. In: Proceedings of the Fifteenth International Conference on Machine Learning. ICML ’98, pp. 515–521. Morgan Kaufmann Publishers Inc., San Francis","arxiv_id":"2604.19076","detector":"doi_compliance","evidence":{"doi":"10.5555/645527.657464","arxiv_id":null,"ref_index":32,"raw_excerpt":"Saunders, C., Gammerman, A., Vovk, V.: Ridge regression learning algorithm in dual variables. In: Proceedings of the Fifteenth International Conference on Machine Learning. ICML ’98, pp. 515–521. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (1998). https://doi.org/10.5555/645527.657464","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":32,"audited_at":"2026-05-20T03:22:56.253341Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/645527.657464","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"fe342d03509e73bb7acc059e821c1a3c781c5920a0539e7268fa015279eb79ea","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.19076/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}