{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.26534","arxiv_id":"2604.26534","integrity":{"available":true,"endpoint":"/pith/2604.26534/integrity.json","summary":{"critical":1,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":1,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T20:03:01.014611Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.1901.07636(2019) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arXiv.1901.07636(2019","detected_arxiv_id":null,"ref_index":83,"audited_at":"2026-05-19T20:03:01.014611Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TPDS.2018.2872064(2018) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/TPDS.2018.2872064(2018","detected_arxiv_id":null,"ref_index":109,"audited_at":"2026-05-19T20:03:01.014611Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.3389/fphy.2024.1473378(2024' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.3389/fphy.2024.1473378(2024","detected_arxiv_id":null,"ref_index":115,"audited_at":"2026-05-19T20:03:01.014611Z"}],"snapshot_sha256":"9866fe09b88cdebfbbe21d41d84dc05c7b5c54150b5ad5ec609eacac374d7676"},"events":[{"event_id":2813,"event_type":"pith.integrity.v1","payload_sha256":"fe18185a7bd8a1ed974b5c4a46f7c35b497354c02d15f0f15c927f2c58e7bce2","signature_b64":"Ib9qdV4u4udfOBDb6U8ohEA8z9WygaN/3g1+uHkjQdsbmLcRAoapU1eGuKu20NFR7Ni8Q/CRpSnU3CLyLdgxBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T20:07:20.897065+00:00","payload":{"note":"Identifier '10.3389/fphy.2024.1473378(2024' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"C. M. Newman and D. L. Stein, “Critical droplets and replica symmetry breaking,” Front. Phys.Volume 12,10.3389/fphy.2024.1473378(2024)","arxiv_id":"2604.26534","detector":"doi_compliance","evidence":{"doi":"10.3389/fphy.2024.1473378(2024","arxiv_id":null,"ref_index":115,"raw_excerpt":"C. M. Newman and D. L. Stein, “Critical droplets and replica symmetry breaking,” Front. Phys.Volume 12,10.3389/fphy.2024.1473378(2024)","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":115,"audited_at":"2026-05-19T20:03:01.014611Z","event_type":"pith.integrity.v1","detected_doi":"10.3389/fphy.2024.1473378(2024","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"ea08bc79338956d8e9b75189b49f605f23b0c6eca81b29fd87a8f9f01a9e13b4","paper_version":2,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2812,"event_type":"pith.integrity.v1","payload_sha256":"33cc8995a52dffc02a50ef422bf401c7d8e08408c6cbb5bc0bc6e930a91e81a3","signature_b64":"BXwXIU1RDo8NViUb5lOQ8fKCJGKlQIpg2whMuiewa2jUHtiKKebc+QD+FFSbYqhQBiwAbk2aCVxPgBnPZfxmCA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T20:07:20.895513+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TPDS.2018.2872064(2018) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"T. Besard, C. Foket, and B. De Sutter, “Effective extensible programming: unleashing Julia on GPUs,” IEEE Trans. Parallel Distrib. Syst.10.1109/TPDS. 2018.2872064(2018)","arxiv_id":"2604.26534","detector":"doi_compliance","evidence":{"ref_index":109,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"T. Besard, C. Foket, and B. De Sutter, “Effective extensible programming: unleashing Julia on GPUs,” IEEE Trans. Parallel Distrib. Syst.10.1109/TPDS. 2018.2872064(2018)","reconstructed_doi":"10.1109/TPDS.2018.2872064(2018"},"severity":"advisory","ref_index":109,"audited_at":"2026-05-19T20:03:01.014611Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/TPDS.2018.2872064(2018","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"d28ffaf34c234f66f3c64e910d92b2f72a3446bee9fcd48bea4016cd35afc814","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2811,"event_type":"pith.integrity.v1","payload_sha256":"472549e29b4238e15a5fb201f0cb0466bf2049f055e2e8b56c72cee5ceebda8f","signature_b64":"nEV8n9ErxHo7ZjHRcTB6qQ3U4LMBIeNTQ1XXG1inO6RTpK+pxXmbB/4EgxtDKwpwz53sAgejxx20YdnvOJyqBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T20:07:20.891063+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.1901.07636(2019) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"N. Dattani, S. Szalay, and N. Chancellor, “Pegasus: the second connectivity graph for large-scale quantum annealing hardware,”10.48550/arXiv.1901. 07636(2019)","arxiv_id":"2604.26534","detector":"doi_compliance","evidence":{"ref_index":83,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"N. Dattani, S. Szalay, and N. Chancellor, “Pegasus: the second connectivity graph for large-scale quantum annealing hardware,”10.48550/arXiv.1901. 07636(2019)","reconstructed_doi":"10.48550/arXiv.1901.07636(2019"},"severity":"advisory","ref_index":83,"audited_at":"2026-05-19T20:03:01.014611Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arXiv.1901.07636(2019","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"37d89aec007b9224c34fe816c7d6de9c0f8d0fefe36abcd0eb2692cdcd22cdbf","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.26534/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}