{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.16820","arxiv_id":"2605.16820","integrity":{"available":true,"endpoint":"/pith/2605.16820/integrity.json","summary":{"critical":1,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":1,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-21T07:36:51.317073Z","findings_count":2},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-21T07:31:39.117891Z","findings_count":0},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-21T07:22:23.097236Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T20:01:19.023621Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T20:00:51.596833Z","findings_count":1},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-19T19:01:56.269430Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-19T18:33:26.410238Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/165446.165450' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/165446.165450","detected_arxiv_id":null,"ref_index":22,"audited_at":"2026-05-20T20:02:42.851599Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.34727/2025/ISBN.978-3-85448-084-66) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.34727/2025/ISBN.978-3-85448-084-66","detected_arxiv_id":null,"ref_index":11,"audited_at":"2026-05-19T20:00:51.596833Z"}],"snapshot_sha256":"49c9640e4c09ae3372737d52d648774130c7abd5711dfe5387a3ff206940de06"},"events":[{"event_id":5440,"event_type":"pith.integrity.v1","payload_sha256":"962208dfdc30f271c857c39b782cc7216f644fc95d7fd4d7af9222b053038dd9","signature_b64":"EOKAOXEH+XD0wLzqFehNi6915AsBxNifyTkmkkopzNyrTlpmtGlctHgha6Vvamp9I27pFMJaoml8nliq4013Bg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T20:03:28.729309+00:00","payload":{"note":"Identifier '10.5555/165446.165450' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Manzano, M.: Introduction to many-sorted logic. In: Many-sorted logic and its applications, pp. 3–86. John Wiley & Sons, Inc., New York, NY, USA (1993), https://dl.acm.org/doi/10.5555/165446.165450, ISBN 0-471-93485-2","arxiv_id":"2605.16820","detector":"doi_compliance","evidence":{"doi":"10.5555/165446.165450","arxiv_id":null,"ref_index":22,"raw_excerpt":"Manzano, M.: Introduction to many-sorted logic. In: Many-sorted logic and its applications, pp. 3–86. John Wiley & Sons, Inc., New York, NY, USA (1993), https://dl.acm.org/doi/10.5555/165446.165450, ISBN 0-471-93485-2","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":22,"audited_at":"2026-05-20T20:02:42.851599Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/165446.165450","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"8fd7de8e57afc8a7d522f6e81a8cba5175425027b8d3462e75153ac9a718f0b8","paper_version":2,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2804,"event_type":"pith.integrity.v1","payload_sha256":"6b53844e457a69842651a3ac22c86942a48f687a9e84ed56c53aea742aec2331","signature_b64":"KY/DobYn2Pii6OE7ggvzoVWOmQY3NYKFLK5sWeZzBLne6mJ+f1NfChG29r0nKaZT0MIfk6k3yJc6DtrAhHMnAg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T20:02:20.691936+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.34727/2025/ISBN.978-3-85448-084-66) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Biere, A., Froleyks, N., Preiner, M.: Hardware model checking competition 2025. In: Irfan, A., Kaufmann, D. (eds.) Proceedings of the 25th Conference on Formal Methods in Computer-Aided Design, FMCAD 2025, Menlo Park, CA, USA, Octo- ber 6-1","arxiv_id":"2605.16820","detector":"doi_compliance","evidence":{"ref_index":11,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Biere, A., Froleyks, N., Preiner, M.: Hardware model checking competition 2025. In: Irfan, A., Kaufmann, D. (eds.) Proceedings of the 25th Conference on Formal Methods in Computer-Aided Design, FMCAD 2025, Menlo Park, CA, USA, Octo- ber 6-1","reconstructed_doi":"10.34727/2025/ISBN.978-3-85448-084-66"},"severity":"advisory","ref_index":11,"audited_at":"2026-05-19T20:00:51.596833Z","event_type":"pith.integrity.v1","detected_doi":"10.34727/2025/ISBN.978-3-85448-084-66","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"ab324f788fb96642c11c837d3378acf19f11833f28bd1b746804aed031be465f","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.16820/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}