{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.26913","arxiv_id":"2604.26913","integrity":{"available":true,"endpoint":"/pith/2604.26913/integrity.json","summary":{"critical":1,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":1,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T19:42:52.926770Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/3540261.3540477' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/3540261.3540477","detected_arxiv_id":null,"ref_index":1,"audited_at":"2026-05-19T19:42:52.926770Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-0-387-71107-2_7.url:https://doi.org/10.1007/978-0-387-71107-2) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-0-387-71107-2_7.url:https://doi.org/10.1007/978-0-387-71107-2","detected_arxiv_id":null,"ref_index":2,"audited_at":"2026-05-19T19:42:52.926770Z"}],"snapshot_sha256":"d45adb138d196409ef41beb61bd2c82053b5816ab0787df83fe5eefc06a25862"},"events":[{"event_id":2761,"event_type":"pith.integrity.v1","payload_sha256":"282e101a9b381e00e9001b7059642b23e94f58d418f44b98f4ddb22703eec416","signature_b64":"GQLuM//9WV3um27DIY2YR/zOsqKjlmbSfq0hjG/lCC+N5qvemVKMRgAZZU5/kN72dfW7WUZLi5fs2st+Er+aAg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T19:47:20.176966+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-0-387-71107-2_7.url:https://doi.org/10.1007/978-0-387-71107-2) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"W.-S. L. Andreas Antoniou. “Quasi-Newton Methods”. In:Practical Optimization: Algorithms and Engineering Applications. Boston, MA: Springer US, 2007, pp. 175– 202.isbn: 978-0-387-71107-2.doi:10.1007/978-0-387-71107-2_7.url:https: //doi.org/","arxiv_id":"2604.26913","detector":"doi_compliance","evidence":{"ref_index":2,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"W.-S. L. Andreas Antoniou. “Quasi-Newton Methods”. In:Practical Optimization: Algorithms and Engineering Applications. Boston, MA: Springer US, 2007, pp. 175– 202.isbn: 978-0-387-71107-2.doi:10.1007/978-0-387-71107-2_7.url:https: //doi.org/","reconstructed_doi":"10.1007/978-0-387-71107-2_7.url:https://doi.org/10.1007/978-0-387-71107-2"},"severity":"advisory","ref_index":2,"audited_at":"2026-05-19T19:42:52.926770Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-0-387-71107-2_7.url:https://doi.org/10.1007/978-0-387-71107-2","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"e7b8cf881c76ccd94746e697486841d9b4e2324de5bc31a13fdfc76a18f37ce9","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2760,"event_type":"pith.integrity.v1","payload_sha256":"1c2c858fa47cac3339b59d8469a5b2e539999360c09a0dcbf787b9051d1fe802","signature_b64":"zos2YJ7u+Sep/AltBAaRNQO/AUeJ5e7WT2x8OaUdft0x68dQwMMpT/Rf6KIwqq16Q++Xaz9pPk8lGnleXl5hCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T19:47:20.173699+00:00","payload":{"note":"Identifier '10.5555/3540261.3540477' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"F. Alimisis et al. “Distributed principal component analysis with limited communi- cation”.In:Advances in Neural Information Processing Systems (NeurIPS). Vol.34. Adv. Neural Inf. Process. Syst. Online: Curran Associates, Inc., 2021, pp. 28","arxiv_id":"2604.26913","detector":"doi_compliance","evidence":{"doi":"10.5555/3540261.3540477","arxiv_id":null,"ref_index":1,"raw_excerpt":"F. Alimisis et al. “Distributed principal component analysis with limited communi- cation”.In:Advances in Neural Information Processing Systems (NeurIPS). Vol.34. Adv. Neural Inf. Process. Syst. Online: Curran Associates, Inc., 2021, pp. 2823– 2834.url:https://dl.acm.org/doi/10.5555/3540261.3540477","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":1,"audited_at":"2026-05-19T19:42:52.926770Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/3540261.3540477","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"05735fbc6fd22121dfc08492546d9895fc4ffc762402f59af196621723772895","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.26913/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}