{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.07373","arxiv_id":"2605.07373","integrity":{"available":true,"endpoint":"/pith/2605.07373/integrity.json","summary":{"critical":1,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":1,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T11:02:03.237660Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T05:46:21.457880Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T16:31:19.388671Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T11:53:05.291165Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1145/343369.3433785' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1145/343369.3433785","detected_arxiv_id":null,"ref_index":79,"audited_at":"2026-05-19T11:53:05.291165Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/s0019-9958(81)90044-5doi:10.1016/S0019-9958(81)90044-5) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/s0019-9958(81)90044-5doi:10.1016/S0019-9958(81)90044-5","detected_arxiv_id":null,"ref_index":127,"audited_at":"2026-05-19T11:53:05.291165Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/0890-5401(90)90013-7doi:10.1016/0890-5401(90)90013-7) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/0890-5401(90)90013-7doi:10.1016/0890-5401(90)90013-7","detected_arxiv_id":null,"ref_index":128,"audited_at":"2026-05-19T11:53:05.291165Z"}],"snapshot_sha256":"da98ffeb0df8a08f5f94289ffaa475694dd85f42aa559513a1f045aa86767977"},"events":[{"event_id":1164,"event_type":"pith.integrity.v1","payload_sha256":"9d968eec55bfd21d687f3aa99bf0885cbcf91a64af42b212bfdc6662b3183c0b","signature_b64":"qX3/OpCOpYtIFsDFKq7tGo3ZpLhxFI2XjSUok9G0yKNz0hMRaa7NkVSjEcO39MyB9Padut8QhuZHE4KLbv/jDw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:57:02.668252+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/0890-5401(90)90013-7doi:10.1016/0890-5401(90)90013-7) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"D. Walker, Bisimulation and divergence, Information and Computation 85 (2) (1990) 202--241. https://doi.org/10.1016/0890-5401(90)90013-7 doi:10.1016/0890-5401(90)90013-7","arxiv_id":"2605.07373","detector":"doi_compliance","evidence":{"ref_index":128,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"D. Walker, Bisimulation and divergence, Information and Computation 85 (2) (1990) 202--241. https://doi.org/10.1016/0890-5401(90)90013-7 doi:10.1016/0890-5401(90)90013-7","reconstructed_doi":"10.1016/0890-5401(90)90013-7doi:10.1016/0890-5401(90)90013-7"},"severity":"advisory","ref_index":128,"audited_at":"2026-05-19T11:53:05.291165Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/0890-5401(90)90013-7doi:10.1016/0890-5401(90)90013-7","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"e63c65c18c46c2b4021145827c321db45b4469024b490cbe4b92bdde44f59bc8","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1163,"event_type":"pith.integrity.v1","payload_sha256":"dfeb3a9487d5bf8a68f0d7cf50f53ea3922233b3c5549dcf916187d346463c05","signature_b64":"z+QwRnc2ZU7EenSjlyrQ0V9B4WKOT9TGhjAVtuiCQYGC/On061wlpj38yhhTNWliUWByQRCXMza8d90p9LJwCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:57:02.665325+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/s0019-9958(81)90044-5doi:10.1016/S0019-9958(81)90044-5) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"M. Hennessy, A term model for synchronous processes, Inf. Control. 51 (1) (1981) 58--75. https://doi.org/10.1016/S0019-9958(81)90044-5 doi:10.1016/S0019-9958(81)90044-5","arxiv_id":"2605.07373","detector":"doi_compliance","evidence":{"ref_index":127,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"M. Hennessy, A term model for synchronous processes, Inf. Control. 51 (1) (1981) 58--75. https://doi.org/10.1016/S0019-9958(81)90044-5 doi:10.1016/S0019-9958(81)90044-5","reconstructed_doi":"10.1016/s0019-9958(81)90044-5doi:10.1016/S0019-9958(81)90044-5"},"severity":"advisory","ref_index":127,"audited_at":"2026-05-19T11:53:05.291165Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/s0019-9958(81)90044-5doi:10.1016/S0019-9958(81)90044-5","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"e8cd4947d52a2253e5f97af626a81f03670f734acbc8c71f6949a062f3bb4279","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1162,"event_type":"pith.integrity.v1","payload_sha256":"e953dac01bbf46311afe4869102ea9d156918bfd1e62ce51d20a5c4138ab272d","signature_b64":"q5ix+/HZKyEFgZ2Ze/aRJqqCyvy4iAht+PODHV5NCfVm/ImHt3/zKymRHhVe4M8oIuekffGTTYu1stTSPFDpBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:57:02.661338+00:00","payload":{"note":"Identifier '10.1145/343369.3433785' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"D. Kozen. On Hoare logic and Kleene algebra with tests. ACM Trans. Comput. Log. 2000. doi:10.1145/343369.3433785","arxiv_id":"2605.07373","detector":"doi_compliance","evidence":{"doi":"10.1145/343369.3433785","arxiv_id":null,"ref_index":79,"raw_excerpt":"D. Kozen. On Hoare logic and Kleene algebra with tests. ACM Trans. Comput. Log. 2000. doi:10.1145/343369.3433785","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":79,"audited_at":"2026-05-19T11:53:05.291165Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/343369.3433785","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"a54f087253befdccc967398953a05d7a41ee77092cf2077694547fb6019ae146","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.07373/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}