{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.24464","arxiv_id":"2604.24464","integrity":{"available":true,"endpoint":"/pith/2604.24464/integrity.json","summary":{"critical":3,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":4,"critical":3,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-21T06:39:54.395090Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T22:04:03.172893Z","findings_count":4}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-1-84996-241-413) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-1-84996-241-413","detected_arxiv_id":null,"ref_index":29,"audited_at":"2026-05-19T22:04:03.172893Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/2930611.2930635' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/2930611.2930635","detected_arxiv_id":null,"ref_index":7,"audited_at":"2026-05-19T22:04:03.172893Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/3154630.3154669' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/3154630.3154669","detected_arxiv_id":null,"ref_index":9,"audited_at":"2026-05-19T22:04:03.172893Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/1953048.2078187' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/1953048.2078187","detected_arxiv_id":null,"ref_index":47,"audited_at":"2026-05-19T22:04:03.172893Z"}],"snapshot_sha256":"0cabb2dd89949c405b8f926cd01827caacb77da42d95a769058f82a94e378207"},"events":[{"event_id":3293,"event_type":"pith.integrity.v1","payload_sha256":"bfc8686d143c6d6bcceb3ccd1372a40e562dae6c480c439f2d316922a49b62a9","signature_b64":"mf3/nwC/zj0CzMOBuckAGEHTOvoe+ENHnoeTMJjvckhidsinW2ENltW46a7j1qDzqs1XiUljQvUOSSbla/PGDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:07:24.548184+00:00","payload":{"note":"Identifier '10.5555/1953048.2078187' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"N. Shervashidze, P. Schweitzer, E. J. Van Leeuwen, K. Mehlhorn, and K. M. Borgwardt, “Weisfeiler-lehman graph kernels,”Journal of Machine Learning Research, vol. 12, no. 77, pp. 2539–2561, 2011, https://dl.acm.org/doi/10.5555/1953048.207818","arxiv_id":"2604.24464","detector":"doi_compliance","evidence":{"doi":"10.5555/1953048.2078187","arxiv_id":null,"ref_index":47,"raw_excerpt":"N. Shervashidze, P. Schweitzer, E. J. Van Leeuwen, K. Mehlhorn, and K. M. Borgwardt, “Weisfeiler-lehman graph kernels,”Journal of Machine Learning Research, vol. 12, no. 77, pp. 2539–2561, 2011, https://dl.acm.org/doi/10.5555/1953048.2078187","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":47,"audited_at":"2026-05-19T22:04:03.172893Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/1953048.2078187","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"a92c6ff21e7c44f47ad8cea3c8171e70a20bad3f185385b3339969297e970880","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3292,"event_type":"pith.integrity.v1","payload_sha256":"83ed70ed848c4aee1901d0ecf13cd3a4c93fa118c9f18bd6b190e7fbb1d86a5a","signature_b64":"Gk57oNL+svgj63QjDXV026v7w9CspuJ4iJ35VUpHJnAvlQBXOeNOqtnJDbWPA3FtnyPe1GUpDz21q6F/7RnACQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:07:24.546928+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-1-84996-241-413) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"B. Bethwaite, D. Abramson, F. Bohnert, S. Garic, C. Enticott, and T. Peachey, “Mixing grids and clouds: high-throughput science using the nimrod tool family,” inCloud computing: principles, systems and applications. Springer, 2010, pp. 219–","arxiv_id":"2604.24464","detector":"doi_compliance","evidence":{"ref_index":29,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"B. Bethwaite, D. Abramson, F. Bohnert, S. Garic, C. Enticott, and T. Peachey, “Mixing grids and clouds: high-throughput science using the nimrod tool family,” inCloud computing: principles, systems and applications. Springer, 2010, pp. 219–","reconstructed_doi":"10.1007/978-1-84996-241-413"},"severity":"advisory","ref_index":29,"audited_at":"2026-05-19T22:04:03.172893Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-1-84996-241-413","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"a246a83cc6dccf12ccc152e126d5f23203efd6b279add5a7580bd19e210192f9","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3291,"event_type":"pith.integrity.v1","payload_sha256":"28c21ff64fd2f64329bcc4889fb01c2953955896ae3f2fc5ab5ceea1d0990c25","signature_b64":"yxTVl1yaak3pc1iVGtJSZYM6aziE8zLiqEO1xT9sflGc+atBa7pGPfXmJgEWokTy8zOyvI5mCDzmUxsgpjiCBA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:07:24.545619+00:00","payload":{"note":"Identifier '10.5555/3154630.3154669' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"O. Alipourfard, H. H. Liu, J. Chen, S. Venkataraman, M. Yu, and M. Zhang, “CherryPick: Adaptively unearthing the best cloud configura- tions for big data analytics,” in14th USENIX Symposium on Networked Systems Design and Implementation (NS","arxiv_id":"2604.24464","detector":"doi_compliance","evidence":{"doi":"10.5555/3154630.3154669","arxiv_id":null,"ref_index":9,"raw_excerpt":"O. Alipourfard, H. H. Liu, J. Chen, S. Venkataraman, M. Yu, and M. Zhang, “CherryPick: Adaptively unearthing the best cloud configura- tions for big data analytics,” in14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, 2017, pp. 469–482, https://dl.acm.org/doi/10.5555/3154630.3154669","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":9,"audited_at":"2026-05-19T22:04:03.172893Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/3154630.3154669","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"690ba0b5ad577e676817b6fb15e1a0fcdd30a2147485d2b25c140de6e27be535","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3290,"event_type":"pith.integrity.v1","payload_sha256":"15e0e655e29d1de979d2f0494a682950627b90506e78dd0a6402935a762f34f2","signature_b64":"BVXW7mbAhrSKI34p525yhmXQkMnB8Q0bRAHIPuaxw5kuF5IBQK4amPWr30EKLuANuVXqhD4KXxISZabGPSeFAA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:07:24.544425+00:00","payload":{"note":"Identifier '10.5555/2930611.2930635' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"S. Venkataraman, Z. Yang, M. Franklin, B. Recht, and I. Stoica, “Ernest: Efficient performance prediction for Large-Scale advanced analytics,” in13th USENIX Symposium on Networked Systems Design and Im- plementation (NSDI 16). USENIX Associ","arxiv_id":"2604.24464","detector":"doi_compliance","evidence":{"doi":"10.5555/2930611.2930635","arxiv_id":null,"ref_index":7,"raw_excerpt":"S. Venkataraman, Z. Yang, M. Franklin, B. Recht, and I. Stoica, “Ernest: Efficient performance prediction for Large-Scale advanced analytics,” in13th USENIX Symposium on Networked Systems Design and Im- plementation (NSDI 16). USENIX Association, 2016, pp. 363–378, https://dl.acm.org/doi/10.5555/2930611.2930635","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":7,"audited_at":"2026-05-19T22:04:03.172893Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/2930611.2930635","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"72c0fcf4a312a060059eaae68f9dea5dbcf3fa7f8874ffaaf5e30969b878ccde","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.24464/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}