{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.15406","arxiv_id":"2605.15406","integrity":{"available":true,"endpoint":"/pith/2605.15406/integrity.json","summary":{"critical":1,"advisory":3,"informational":0,"by_detector":{"doi_compliance":{"total":4,"critical":1,"advisory":3,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T15:04:10.566113Z","findings_count":4},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T15:01:25.466876Z","findings_count":0},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T14:22:04.746426Z","findings_count":0},{"name":"cited_work_retraction","version":"1.0.0","status":"completed","ran_at":"2026-05-19T16:23:47.846090Z","findings_count":0},{"name":"citation_quote_validity","version":"0.1.0","status":"completed","ran_at":"2026-05-19T15:50:49.296362Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-19T13:33:22.713361Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3586050.url:https://doi.org/10.1145/3586050) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/3586050.url:https://doi.org/10.1145/3586050","detected_arxiv_id":null,"ref_index":7,"audited_at":"2026-05-19T15:01:48.854956Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1145/3720506.url:https://doi.org/10.1145/3720506' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1145/3720506.url:https://doi.org/10.1145/3720506","detected_arxiv_id":null,"ref_index":14,"audited_at":"2026-05-19T15:01:48.854956Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/1265530.1265535.url:https://doi.org/10.1145/1265530.1265535) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/1265530.1265535.url:https://doi.org/10.1145/1265530.1265535","detected_arxiv_id":null,"ref_index":15,"audited_at":"2026-05-19T15:01:48.854956Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/237814.237866.url:https://doi.org/10.1145/237814.237866) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/237814.237866.url:https://doi.org/10.1145/237814.237866","detected_arxiv_id":null,"ref_index":16,"audited_at":"2026-05-19T15:01:48.854956Z"}],"snapshot_sha256":"ee958b9ae89adad613979ee3992108c9c38ff9c685123f3d0f56f6eb399d0623"},"events":[{"event_id":1762,"event_type":"pith.integrity.v1","payload_sha256":"946c964480b1d95aa2190b00e9d6ad2591b9e4398c79dd46c9624d615996246b","signature_b64":"dRn2rJAbG9dbbZiWNcTJN+P25TjE4KXnuvw2JxLzDwuxjiXjsN3Rga4fMV3ZkcSyZmLfbYHbkyOKKq6qUFQDBA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:02:08.711910+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/237814.237866.url:https://doi.org/10.1145/237814.237866) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Lov K. Grover. “A fast quantum mechanical algorithm for database search”. In:Proceedings of the Twenty-Eighth Annual ACM Symposium on The- ory of Computing. STOC ’96. Philadelphia, Pennsylvania, USA: Associ- ation for Computing Machinery, 1","arxiv_id":"2605.15406","detector":"doi_compliance","evidence":{"ref_index":16,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Lov K. Grover. “A fast quantum mechanical algorithm for database search”. In:Proceedings of the Twenty-Eighth Annual ACM Symposium on The- ory of Computing. STOC ’96. Philadelphia, Pennsylvania, USA: Associ- ation for Computing Machinery, 1","reconstructed_doi":"10.1145/237814.237866.url:https://doi.org/10.1145/237814.237866"},"severity":"advisory","ref_index":16,"audited_at":"2026-05-19T15:01:48.854956Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/237814.237866.url:https://doi.org/10.1145/237814.237866","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"bfd5181f23e85403a2fd20523cc47e536f0c1e82b23e03efcf1049bf2d5000ed","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1761,"event_type":"pith.integrity.v1","payload_sha256":"9b6dd5ff919b0ac3573d9ef3b88a1d4ea35916e425401436407d489368e3c1df","signature_b64":"2JKYXw+kZ2mbHpEvPATJe4N8bgTvfd0DJnx/O0TRItIaxKMKz6k9yj6Rdm4lgKBigT/4qI3CAanpnJTJBtCvCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:02:08.710800+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/1265530.1265535.url:https://doi.org/10.1145/1265530.1265535) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Todd J. Green, Grigoris Karvounarakis, and Val Tannen. “Provenance semirings”. In:Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT- SIGART Symposium on Principles of Database Systems. PODS ’07. Bei- jing, China: Association for Computing M","arxiv_id":"2605.15406","detector":"doi_compliance","evidence":{"ref_index":15,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Todd J. Green, Grigoris Karvounarakis, and Val Tannen. “Provenance semirings”. In:Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT- SIGART Symposium on Principles of Database Systems. PODS ’07. Bei- jing, China: Association for Computing M","reconstructed_doi":"10.1145/1265530.1265535.url:https://doi.org/10.1145/1265530.1265535"},"severity":"advisory","ref_index":15,"audited_at":"2026-05-19T15:01:48.854956Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/1265530.1265535.url:https://doi.org/10.1145/1265530.1265535","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"add0598978c3169949058afa770807df28784243323d009afa5d85479bfc9403","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1760,"event_type":"pith.integrity.v1","payload_sha256":"2959b3a0d92a9c66772bb308c5416ce3e3f88012f5018dd640929b58af8dad33","signature_b64":"DwSi/OvBlSrMOXI59l3+0EHb9fMDRiEoxG+zvgK/gjta8+VZpd0fy3w5D5DXHHfoxMMH4zFL0h7SouCHl2KcAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:02:08.709740+00:00","payload":{"note":"Identifier '10.1145/3720506.url:https://doi.org/10.1145/3720506' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Mahdi Ghorbani et al. “Compressed and Parallelized Structured Tensor Algebra”. In:Proc. ACM Program. Lang.9.OOPSLA1 (Apr. 2025).doi: 10.1145/3720506.url:https://doi.org/10.1145/3720506","arxiv_id":"2605.15406","detector":"doi_compliance","evidence":{"doi":"10.1145/3720506.url:https://doi.org/10.1145/3720506","arxiv_id":null,"ref_index":14,"raw_excerpt":"Mahdi Ghorbani et al. “Compressed and Parallelized Structured Tensor Algebra”. In:Proc. ACM Program. Lang.9.OOPSLA1 (Apr. 2025).doi: 10.1145/3720506.url:https://doi.org/10.1145/3720506","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":14,"audited_at":"2026-05-19T15:01:48.854956Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3720506.url:https://doi.org/10.1145/3720506","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"0b673729dbc910b09dbcb5fe06415293eae74f60882f9dbbab55cde1fecec6ba","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1759,"event_type":"pith.integrity.v1","payload_sha256":"11b00276190966cb9238b5fd573073d1853956ac4ae7bf8667ff15d623191452","signature_b64":"X3ufIXwcsdDf8vA39FWT7rPWWIFfF3pySjAWftNUK7//z5RBuEyycNpCcJeNcmJ2wiLzzA54SVTqQjUAhGS+Cw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:02:08.708617+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3586050.url:https://doi.org/10.1145/3586050) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"David Chiang, Colin McDonald, and Chung-chieh Shan. “Exact Recursive Probabilistic Programming”. In:Proc. ACM Program. Lang.7.OOPSLA1 (Apr. 2023).doi:10.1145/3586050.url:https://doi.org/10.1145/ 3586050","arxiv_id":"2605.15406","detector":"doi_compliance","evidence":{"ref_index":7,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"David Chiang, Colin McDonald, and Chung-chieh Shan. “Exact Recursive Probabilistic Programming”. In:Proc. ACM Program. Lang.7.OOPSLA1 (Apr. 2023).doi:10.1145/3586050.url:https://doi.org/10.1145/ 3586050","reconstructed_doi":"10.1145/3586050.url:https://doi.org/10.1145/3586050"},"severity":"advisory","ref_index":7,"audited_at":"2026-05-19T15:01:48.854956Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3586050.url:https://doi.org/10.1145/3586050","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"f19f2301b254f23ac59eb7fc4c2c05a28a982ee1813a812d57f0d679020e2c5a","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.15406/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}