{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.20462","arxiv_id":"2604.20462","integrity":{"available":true,"endpoint":"/pith/2604.20462/integrity.json","summary":{"critical":0,"advisory":4,"informational":0,"by_detector":{"doi_compliance":{"total":4,"critical":0,"advisory":4,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-21T14:40:40.380461Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T01:53:38.671915Z","findings_count":4}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3793302.3793308.released) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/3793302.3793308.released","detected_arxiv_id":null,"ref_index":1,"audited_at":"2026-05-20T01:53:38.671915Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICSME.2015.7332455.Munaiah) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/ICSME.2015.7332455.Munaiah","detected_arxiv_id":null,"ref_index":19,"audited_at":"2026-05-20T01:53:38.671915Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICPC.2011.26.Cucumber) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/ICPC.2011.26.Cucumber","detected_arxiv_id":null,"ref_index":8,"audited_at":"2026-05-20T01:53:38.671915Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/MSR.2012.6224294.Grigorik) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/MSR.2012.6224294.Grigorik","detected_arxiv_id":null,"ref_index":11,"audited_at":"2026-05-20T01:53:38.671915Z"}],"snapshot_sha256":"92e0f65a885d5db5ff1a60bde09e4c05a63597a4723e5b10c3be851a61c1a954"},"events":[{"event_id":4163,"event_type":"pith.integrity.v1","payload_sha256":"997e7efdd8f80c6e52963ced32a09fc5fa4f347df6f160b01bc5be1a066ba88f","signature_b64":"Ui4vARemq5HohuSar0CmHKny0wPaVcVvxMCKA3oVXLkFAYYo3Bj/ubaFqfe+QfVnMNjNCBQhLIMRplfh7R1OBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:57:39.133381+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICSME.2015.7332455.Munaiah) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"A comparative study on the bug-proneness of different types of code clones. IEEE International Conference on Software Maintenance and Evolution (ICSME) , 91–100doi:10.1109/ICSME.2015.7332455. Munaiah, N., Kroh, S., Cabrey, C., Nagappan, M.,","arxiv_id":"2604.20462","detector":"doi_compliance","evidence":{"ref_index":19,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"A comparative study on the bug-proneness of different types of code clones. IEEE International Conference on Software Maintenance and Evolution (ICSME) , 91–100doi:10.1109/ICSME.2015.7332455. Munaiah, N., Kroh, S., Cabrey, C., Nagappan, M.,","reconstructed_doi":"10.1109/ICSME.2015.7332455.Munaiah"},"severity":"advisory","ref_index":19,"audited_at":"2026-05-20T01:53:38.671915Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/ICSME.2015.7332455.Munaiah","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"2ef4e4130c0a2b58229a70bee9ff2b2cc2f726197bfafebefbb36ca948198cd1","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4162,"event_type":"pith.integrity.v1","payload_sha256":"e11f1c42dd8285f1ddde9b64fc1f50afd9a34a0f859160a1ed843144ec9f96d4","signature_b64":"aW4c3mxrO5dhA8hyRsRGf6Mv5tOcipXnWxdEHSVMLOl2Sd8yuSjL8WYgOeWjS6wllAn2GMJWQ0PNu8xFOmICCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:57:39.131417+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/MSR.2012.6224294.Grigorik) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"GHTorrent: GitHub’s data from a firehose. doi:10.1109/MSR. 2012.6224294. Grigorik, I.,","arxiv_id":"2604.20462","detector":"doi_compliance","evidence":{"ref_index":11,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"GHTorrent: GitHub’s data from a firehose. doi:10.1109/MSR. 2012.6224294. Grigorik, I.,","reconstructed_doi":"10.1109/MSR.2012.6224294.Grigorik"},"severity":"advisory","ref_index":11,"audited_at":"2026-05-20T01:53:38.671915Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/MSR.2012.6224294.Grigorik","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"21d3ed86c76d0b97c33dfa9acfce5f6fedf9438d771d35eb342265836454e045","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4161,"event_type":"pith.integrity.v1","payload_sha256":"b09a8f1dc73ed34af276a5c7606bd4297b2899594cd6b2efb55a7bb7cb3ae58b","signature_b64":"2NmaY7WnTcHiAeEqp4UbdRYqOvvWWHYC/KfT1aD7zfFEstbbye+qO/1IIu4ZMSh2gaJxO9fdl7aNDWJuQaRQBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:57:39.129100+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICPC.2011.26.Cucumber) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"The NiCad clone detector, in: Proceedings of the 19th International Conference on Program Comprehension (ICPC), IEEE. pp. 219–220. doi: 10.1109/ICPC. 2011.26. Cucumber Ltd.,","arxiv_id":"2604.20462","detector":"doi_compliance","evidence":{"ref_index":8,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"The NiCad clone detector, in: Proceedings of the 19th International Conference on Program Comprehension (ICPC), IEEE. pp. 219–220. doi: 10.1109/ICPC. 2011.26. Cucumber Ltd.,","reconstructed_doi":"10.1109/ICPC.2011.26.Cucumber"},"severity":"advisory","ref_index":8,"audited_at":"2026-05-20T01:53:38.671915Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/ICPC.2011.26.Cucumber","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"62d187998a95195d9e894ed7d629128decc5901fe0ea9d9769a07c628e460a86","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4160,"event_type":"pith.integrity.v1","payload_sha256":"f2a573c87a19b0b16992305f4dd41907fb4360ec1ae404c0c0a0abeb2f2b89d5","signature_b64":"B7xfxEGrumEd6d01XD6aijS8XTZuB+8zlH7bRN8pdHXCh9bIw+uQBJFSB3musExrg2U34AO8T5LeN8fjnnJVBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:57:39.126604+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3793302.3793308.released) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"GivenWhenThen: A dataset of BDD test scenarios mined from open source projects, in: Proceedings of the 23rd International Conference on Mining Software Repositories (MSR), Data and Tool Showcase Track, ACM. doi:10.1145/3793302. 3793308. rel","arxiv_id":"2604.20462","detector":"doi_compliance","evidence":{"ref_index":1,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"GivenWhenThen: A dataset of BDD test scenarios mined from open source projects, in: Proceedings of the 23rd International Conference on Mining Software Repositories (MSR), Data and Tool Showcase Track, ACM. doi:10.1145/3793302. 3793308. rel","reconstructed_doi":"10.1145/3793302.3793308.released"},"severity":"advisory","ref_index":1,"audited_at":"2026-05-20T01:53:38.671915Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3793302.3793308.released","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"e4dc93f985bb9542da0ff1b08ac766e9afc369c7bbcbd295fd41d75519040cd1","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.20462/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}