{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.03613","arxiv_id":"2605.03613","integrity":{"available":true,"endpoint":"/pith/2605.03613/integrity.json","summary":{"critical":1,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":1,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T13:37:36.404517Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T00:31:21.929367Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T15:12:13.055913Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.46298/lmcs-20(2:2) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.46298/lmcs-20(2:2","detected_arxiv_id":null,"ref_index":4,"audited_at":"2026-05-19T15:12:13.055913Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1007/s10994-013-5353-8.pdf' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1007/s10994-013-5353-8.pdf","detected_arxiv_id":null,"ref_index":45,"audited_at":"2026-05-19T15:12:13.055913Z"}],"snapshot_sha256":"5ee0d6b483d14a58bc51855b36bbb7e6c865e92d0a4fed01cd3230082baff97b"},"events":[{"event_id":1793,"event_type":"pith.integrity.v1","payload_sha256":"3317d52a427796fada35299a0af9e674ccecaa99dbf6d1f19eda5e6c26608e15","signature_b64":"7YxG1dyMD2VH2AoOTl+aVaShDme6ZxxVoK2HiR41g7j0cAjR1TVipC/T9VeUm7gW+FELjN6bSCnEXaljl5ECBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:17:09.897840+00:00","payload":{"note":"Identifier '10.1007/s10994-013-5353-8.pdf' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Inoue, K., Ribeiro, T., and Sakama, C. Learning from interpretation transition. Machine Learning 94 (2014), 51–79. https: //link.springer.com/content/pdf/10.1007/s10994-013-5353-8.pdf","arxiv_id":"2605.03613","detector":"doi_compliance","evidence":{"doi":"10.1007/s10994-013-5353-8.pdf","arxiv_id":null,"ref_index":45,"raw_excerpt":"Inoue, K., Ribeiro, T., and Sakama, C. Learning from interpretation transition. Machine Learning 94 (2014), 51–79. https: //link.springer.com/content/pdf/10.1007/s10994-013-5353-8.pdf","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":45,"audited_at":"2026-05-19T15:12:13.055913Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/s10994-013-5353-8.pdf","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"0fd6f12445ca551918943be099288c9a4147a02e08c9090b7c60dcd37f82bf9c","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1792,"event_type":"pith.integrity.v1","payload_sha256":"30740582e823ca68cb90234d54d7902c0108f4d05f2edf898651f19e1ad74889","signature_b64":"mOUVTYXz6pfnlkftEHv14fSI3WLbgDVk3mhPZKpO6vyxGH6/QpsgNzmNLPBVSagcCW6L7D6wJ3Ek8xfYWi9QAA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:17:09.892755+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.46298/lmcs-20(2:2) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Antić, C. Boolean proportions. Logical Methods in Computer Science 20 , 2 (2024), 2:1 – 2:20. https://doi.org/10.46298/lmcs- 20(2:2)2024","arxiv_id":"2605.03613","detector":"doi_compliance","evidence":{"ref_index":4,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Antić, C. Boolean proportions. Logical Methods in Computer Science 20 , 2 (2024), 2:1 – 2:20. https://doi.org/10.46298/lmcs- 20(2:2)2024","reconstructed_doi":"10.46298/lmcs-20(2:2"},"severity":"advisory","ref_index":4,"audited_at":"2026-05-19T15:12:13.055913Z","event_type":"pith.integrity.v1","detected_doi":"10.46298/lmcs-20(2:2","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"f94810d91fa7e9ca5af1e1b8e39e11bd19f43bb3b63bd559e52a272521bf0d1b","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.03613/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}