{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.03670","arxiv_id":"2605.03670","integrity":{"available":true,"endpoint":"/pith/2605.03670/integrity.json","summary":{"critical":2,"advisory":3,"informational":0,"by_detector":{"doi_compliance":{"total":5,"critical":2,"advisory":3,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T13:36:36.126444Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T00:31:21.620309Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T15:07:14.848393Z","findings_count":5}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/0920-) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/0920-","detected_arxiv_id":null,"ref_index":127,"audited_at":"2026-05-19T15:07:14.848393Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/3-540-) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/3-540-","detected_arxiv_id":null,"ref_index":144,"audited_at":"2026-05-19T15:07:14.848393Z"},{"detector":"doi_compliance","finding_type":"broken_identifier","severity":"critical","verdict_class":"incontrovertible","note":"DOI '10.1145/reserved' as printed in the bibliography is syntactically invalid and cannot resolve.","detected_doi":"10.1145/reserved","detected_arxiv_id":null,"ref_index":13,"audited_at":"2026-05-19T15:07:14.848393Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/1316689.1316784' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/1316689.1316784","detected_arxiv_id":null,"ref_index":129,"audited_at":"2026-05-19T15:07:14.848393Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/s10664-021-) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/s10664-021-","detected_arxiv_id":null,"ref_index":37,"audited_at":"2026-05-19T15:07:14.848393Z"}],"snapshot_sha256":"b1f242917bd83b353aeb451e739642384621746ddf4d97111eabd2225df6a5b8"},"events":[{"event_id":1784,"event_type":"pith.integrity.v1","payload_sha256":"7bbc5462161a452c551b6ceae29b4b5fcbbedeb19240fae9ba0cc80067f36099","signature_b64":"Bfyuah3U0DKnlE0DQCaO13VtNhfhnUIeLrCD1f9HdAIChZ0bTjbfUcVk4tndkunMOLmbxaZwxoToUAZC5pHRDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:12:09.454510+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/3-540-) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Kelsey, J., Schneier, B., Wagner, D., & Hall, C. (1998). Cryptanalytic Attacks on Pseudorandom Number Generators. Paper presented at the Fast Software Encryption, Berlin, Heidelberg. doi:10.1007/3 -540- 69710-1_12","arxiv_id":"2605.03670","detector":"doi_compliance","evidence":{"ref_index":144,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Kelsey, J., Schneier, B., Wagner, D., & Hall, C. (1998). Cryptanalytic Attacks on Pseudorandom Number Generators. Paper presented at the Fast Software Encryption, Berlin, Heidelberg. doi:10.1007/3 -540- 69710-1_12","reconstructed_doi":"10.1007/3-540-"},"severity":"advisory","ref_index":144,"audited_at":"2026-05-19T15:07:14.848393Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/3-540-","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"e515f871b7244d81f8595e0fedd84b6677cbf175cd64a70fa373cf09d4b1e286","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1783,"event_type":"pith.integrity.v1","payload_sha256":"9f801937a5d4a7cb59293c943b70f5bd4e3dcbe00bc84b0be5c72b661d66f022","signature_b64":"HNa7qrQfCHzsXjiuyeoublcLO0v5BPTHZDnjHdyLWjQ4BhvI6aM1DdsQN+a8Ll9mKVa+DCx69sAOJNZH7D/UAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:12:09.452768+00:00","payload":{"note":"Identifier '10.5555/1316689.1316784' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Dageville, B., Das, D., Dias, K., Yagoub, K., Zait, M., & Ziauddin, M. (2004). Automatic SQL tuning in Oracle 10g. Paper presented at the Proceedings of the Thirtieth International Conference on Very Large Data Bases, Toronto, Canada. doi:1","arxiv_id":"2605.03670","detector":"doi_compliance","evidence":{"doi":"10.5555/1316689.1316784","arxiv_id":null,"ref_index":129,"raw_excerpt":"Dageville, B., Das, D., Dias, K., Yagoub, K., Zait, M., & Ziauddin, M. (2004). Automatic SQL tuning in Oracle 10g. Paper presented at the Proceedings of the Thirtieth International Conference on Very Large Data Bases, Toronto, Canada. doi:10.5555/1316689.1316784","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":129,"audited_at":"2026-05-19T15:07:14.848393Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/1316689.1316784","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"dce5f22cfc9a3246638075b45a979f9fbefb5d8124468c5584b436cb1a1e5ee4","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1782,"event_type":"pith.integrity.v1","payload_sha256":"67da0e8fb2be4972a7f916391ad4d404ce7ceea26fab6b72a5e11c50b8f99071","signature_b64":"GCXjc6zRU2U2kzUxGFbqA4K0JvtarggT3sxnglO/oEn9nB0czN9ZdB6lt1FJzURdk6AzE0+l3znYSQPfTPKWBw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:12:09.450280+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/0920-) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Yannakoudakis, E. J., & Cheng, C. P. (1989). A domain -oriented approach to improve the user - friendliness of SQL. Computer Standards & Interfaces, 9 (2), 127 -141. doi:10.1016/0920 - 5489(89)90005-6","arxiv_id":"2605.03670","detector":"doi_compliance","evidence":{"ref_index":127,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Yannakoudakis, E. J., & Cheng, C. P. (1989). A domain -oriented approach to improve the user - friendliness of SQL. Computer Standards & Interfaces, 9 (2), 127 -141. doi:10.1016/0920 - 5489(89)90005-6","reconstructed_doi":"10.1016/0920-"},"severity":"advisory","ref_index":127,"audited_at":"2026-05-19T15:07:14.848393Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/0920-","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"ef758efe843510fa02a158faae58f65b05e42e8be40fec0ad325206bb8975dbc","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1781,"event_type":"pith.integrity.v1","payload_sha256":"17d3adae680fa5f33d004efc599cb8b36f73d0d3f4f3fa08dac736fab851d26f","signature_b64":"9GWMtgaca3wxP1bJ2XkTXclQPT/PgBQmVE7jHxCH9gqZ4Ehu2DG0rWcSYsxlrNL+vMTE2Rau3RUZyer7ZyyDCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:12:09.444629+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/s10664-021-) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Rodríguez-Pérez, G., Nadri, R., & Nagappan, M. (2021). Perceived diversity in software engineering: a systematic literature review. Empirical Software Engineering, 26 (5), 102. doi:10.1007/s10664 -021- 09992-2","arxiv_id":"2605.03670","detector":"doi_compliance","evidence":{"ref_index":37,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Rodríguez-Pérez, G., Nadri, R., & Nagappan, M. (2021). Perceived diversity in software engineering: a systematic literature review. Empirical Software Engineering, 26 (5), 102. doi:10.1007/s10664 -021- 09992-2","reconstructed_doi":"10.1007/s10664-021-"},"severity":"advisory","ref_index":37,"audited_at":"2026-05-19T15:07:14.848393Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/s10664-021-","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"fa0f642e4c101884750d5a14055d9c4da8905f09d6e9fdbe8b591af769a05f20","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1780,"event_type":"pith.integrity.v1","payload_sha256":"55352641048382ed435f3c29a10227ad3a0aa554daefe2924dd61f5839d540af","signature_b64":"vOs0K1SDe0Pun/2yXVK+egjDiOr7ThhBXOMgzbzDtNaaxPLQLRYksvTPB33Ozc00+VExTxoX1/1EdJV4UiIeAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:12:09.438617+00:00","payload":{"note":"DOI '10.1145/reserved' as printed in the bibliography is syntactically invalid and cannot resolve.","snippet":"Anonymised. (2024). [Reserved for Contributions Metric work]. [Reserved for Contributions Metric work]. doi:10.1145/RESERVED","arxiv_id":"2605.03670","detector":"doi_compliance","evidence":{"ref_index":13,"raw_excerpt":"Anonymised. (2024). [Reserved for Contributions Metric work]. [Reserved for Contributions Metric work]. doi:10.1145/RESERVED","verdict_class":"incontrovertible","doi_as_printed":"10.1145/reserved"},"severity":"critical","ref_index":13,"audited_at":"2026-05-19T15:07:14.848393Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/reserved","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"broken_identifier","evidence_hash":"6788e0fc1ef3d45bb1ec724839506f4f4eeb74a33eec74c162c8fc51a048b7ec","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.03670/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}