{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.15827","arxiv_id":"2605.15827","integrity":{"available":true,"endpoint":"/pith/2605.15827/integrity.json","summary":{"critical":0,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":0,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T18:31:26.770470Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T18:25:12.484805Z","findings_count":2},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T17:22:08.110283Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-19T17:33:48.721071Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18154/RWTH-2025-07050.https://publications.rwth-aachen.de/record/1016969) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.18154/RWTH-2025-07050.https://publications.rwth-aachen.de/record/1016969","detected_arxiv_id":null,"ref_index":22,"audited_at":"2026-05-19T18:21:41.980183Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-319-68167-2_2616) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-319-68167-2_2616","detected_arxiv_id":null,"ref_index":31,"audited_at":"2026-05-19T18:21:41.980183Z"}],"snapshot_sha256":"9d662d157d209003c738f05af444eef4c5fe3a3a0cf5fcd7cb86c7eb467d08e7"},"events":[{"event_id":2437,"event_type":"pith.integrity.v1","payload_sha256":"c75ee7411cfd0024592d058f587f3a8fb539c3dfcc6e593790ee38f90bbfe217","signature_b64":"HIGrNz6BA2UXbdHs73BKfCN1tI04OR/wrz+wxH4nqSytS7sJ7YzhuLxh3Vh1dHHjsNy/wvn1TJ4rqAUNxutcDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T18:22:19.381255+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-319-68167-2_2616) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Feng, Y., Zhang, L., Jansen, D.N., Zhan, N., Xia, B.: Finding Polynomial Loop Invariants for Probabilistic Programs. In: D’Souza, D., Kumar, K.N. (eds.) Au- tomated Technology for Verification and Analysis - 15th International Sympo- sium, ","arxiv_id":"2605.15827","detector":"doi_compliance","evidence":{"ref_index":31,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Feng, Y., Zhang, L., Jansen, D.N., Zhan, N., Xia, B.: Finding Polynomial Loop Invariants for Probabilistic Programs. In: D’Souza, D., Kumar, K.N. (eds.) Au- tomated Technology for Verification and Analysis - 15th International Sympo- sium, ","reconstructed_doi":"10.1007/978-3-319-68167-2_2616"},"severity":"advisory","ref_index":31,"audited_at":"2026-05-19T18:21:41.980183Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-319-68167-2_2616","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"dd771cf178c5d9230646b1b93d0403b73305f062007195ae2aa573805a9f28ad","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2436,"event_type":"pith.integrity.v1","payload_sha256":"8509609f39250dca6f9970658cbeae3eed14305385d4874accd210a5840080c7","signature_b64":"Y9QfoyUjU97Cs6X7GRU8cQPjBprEkJ9dlBeipblcxi0/3YdeG6ZBm3PPSA9XOZqHvGNvsr9LMMjTvCXXocEvBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T18:22:19.379394+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18154/RWTH-2025-07050.https://publications.rwth-aachen.de/record/1016969) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Beothy-Elo, E.: Effective quantifier-based reasoning for quantitative deductive ver- ification. MA thesis, RWTH Aachen University, Aachen (2025).https://doi.org/ 10.18154/RWTH-2025-07050.https://publications.rwth-aachen.de/record/ 1016969","arxiv_id":"2605.15827","detector":"doi_compliance","evidence":{"ref_index":22,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Beothy-Elo, E.: Effective quantifier-based reasoning for quantitative deductive ver- ification. MA thesis, RWTH Aachen University, Aachen (2025).https://doi.org/ 10.18154/RWTH-2025-07050.https://publications.rwth-aachen.de/record/ 1016969","reconstructed_doi":"10.18154/RWTH-2025-07050.https://publications.rwth-aachen.de/record/1016969"},"severity":"advisory","ref_index":22,"audited_at":"2026-05-19T18:21:41.980183Z","event_type":"pith.integrity.v1","detected_doi":"10.18154/RWTH-2025-07050.https://publications.rwth-aachen.de/record/1016969","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"76e02b41dc1f51b4602acb89f4aded46161148eb9586ff5ac342509f03caf474","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.15827/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}