pith. sign in

Integrity report for When can a neural operator replace a coarse solve? Architectural principles for two-level preconditioning

A machine-verified record of the checks Pith has run against this paper: detector runs, findings, signed bundle events, and canonical identifiers.

arXiv:2605.19867 · pith:2026:667CMDK5PMCT7O5DFSVGNPTUCF

2Critical
5Advisory
7Detectors run
2026-05-22Last checked

Paper page arXiv integrity.json bundle.json

Detector runs

claim_evidence completed v1.0.0 · findings 0 · 2026-05-22 06:02:43.213669+00:00
doi_compliance completed v1.0.0 · findings 7 · 2026-05-22 02:23:08.945226+00:00
doi_title_agreement completed v1.0.0 · findings 0 · 2026-05-22 02:01:48.340361+00:00
cited_work_retraction completed v1.0.0 · findings 0 · 2026-05-20 01:51:58.618766+00:00
shingle_duplication skipped v0.1.0 · findings 0 · 2026-05-20 01:49:56.311416+00:00
citation_quote_validity skipped v0.1.0 · findings 0 · 2026-05-20 01:49:55.537586+00:00
ai_meta_artifact skipped v1.0.0 · findings 0 · 2026-05-20 01:33:25.274302+00:00

Findings

No public integrity findings for this paper.

Signed record

The machine-readable record for this paper lives at /pith/667CMDK5/integrity.json. Pith Number bundles also include signed pith.integrity.v1 events where a Pith Number exists.