{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.14540","arxiv_id":"2605.14540","integrity":{"available":true,"endpoint":"/pith/2605.14540/integrity.json","summary":{"critical":0,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":0,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T16:02:06.363184Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T06:01:22.629709Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T05:40:24.981601Z","findings_count":2},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-19T06:34:42.247369Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ACCESS.2019.2927895.44) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/ACCESS.2019.2927895.44","detected_arxiv_id":null,"ref_index":56,"audited_at":"2026-05-19T05:29:39.230542Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ISWC.2002.1167224.41) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/ISWC.2002.1167224.41","detected_arxiv_id":null,"ref_index":37,"audited_at":"2026-05-19T05:29:39.230542Z"}],"snapshot_sha256":"2cd70938b68cf9a9839305a366e4a7e161c09d503d586e5e46ad296b1c67afb2"},"events":[{"event_id":22,"event_type":"pith.integrity.v1","payload_sha256":"60f20c905cb8f86feb8c0df899de54e3ee31732013789f9ca3a2160879c6d476","signature_b64":"aGeETrrVym+mkMS+p5691bkpwSGEDugrD0GH00rjiklHLSSmdncLHqq5OhpfMlZAHk4CDRcJ2H+FD5deJFteAA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T05:31:20.284577+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ACCESS.2019.2927895.44) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"I. Lera, C. Guerrero, C. Juiz, Yafs: A simulator for iot scenarios in fog computing, IEEE Access 7 (2019) 91745–91758.doi:10.1109/ACCESS. 2019.2927895. 44","arxiv_id":"2605.14540","detector":"doi_compliance","evidence":{"ref_index":56,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"I. Lera, C. Guerrero, C. Juiz, Yafs: A simulator for iot scenarios in fog computing, IEEE Access 7 (2019) 91745–91758.doi:10.1109/ACCESS. 2019.2927895. 44","reconstructed_doi":"10.1109/ACCESS.2019.2927895.44"},"severity":"advisory","ref_index":56,"audited_at":"2026-05-19T05:29:39.230542Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/ACCESS.2019.2927895.44","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"fde9ffda14949a109fe9f4e8b2a1de94a90bf6b25ddc1806c1ed33f7fcb40abe","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":21,"event_type":"pith.integrity.v1","payload_sha256":"cf2e32f824f9169d050f3db9fec3097e3551fedab257a187bf92c503e4c10beb","signature_b64":"ZrEmJj8RrJIsL4Hw0ug+/KybBi6QzGjYTE/L0cjkZJicKUUpCd6Z7vOCIYBFtO3KtxJ0chX7yCYkdH1mCBsIDw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T05:31:20.282612+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ISWC.2002.1167224.41) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"D. Ashbrook, T. Starner, Learning significant locations and predicting user movement with gps, in: Proceedings. Sixth International Sympo- sium on Wearable Computers„ 2002, pp. 101–108.doi:10.1109/ISWC. 2002.1167224. 41","arxiv_id":"2605.14540","detector":"doi_compliance","evidence":{"ref_index":37,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"D. Ashbrook, T. Starner, Learning significant locations and predicting user movement with gps, in: Proceedings. Sixth International Sympo- sium on Wearable Computers„ 2002, pp. 101–108.doi:10.1109/ISWC. 2002.1167224. 41","reconstructed_doi":"10.1109/ISWC.2002.1167224.41"},"severity":"advisory","ref_index":37,"audited_at":"2026-05-19T05:29:39.230542Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/ISWC.2002.1167224.41","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"9fc8dd164871c067cb325f99aed6465727f253693349f92a4e04622e32c761ec","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.14540/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}