{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.15173","arxiv_id":"2605.15173","integrity":{"available":true,"endpoint":"/pith/2605.15173/integrity.json","summary":{"critical":0,"advisory":5,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":0,"advisory":3,"informational":0},"external_links":{"total":2,"critical":0,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-19T14:41:54.316692Z","findings_count":0},{"name":"external_links","version":"1.0.0","status":"completed","ran_at":"2026-05-19T11:32:41.412386Z","findings_count":2},{"name":"shingle_duplication","version":"0.1.0","status":"completed","ran_at":"2026-05-19T05:50:11.048104Z","findings_count":0},{"name":"citation_quote_validity","version":"0.1.0","status":"completed","ran_at":"2026-05-19T05:50:07.485557Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-19T05:33:40.299965Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T05:21:39.776219Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T05:17:28.118206Z","findings_count":3}],"findings":[{"detector":"external_links","finding_type":"dead_url","severity":"advisory","verdict_class":"incontrovertible","note":"URL 'https://github' returned status transport error (transport error: [Errno -3] Temporary failure in name resolution) at last check.","detected_doi":null,"detected_arxiv_id":null,"ref_index":null,"audited_at":"2026-05-19T11:32:41.412386Z"},{"detector":"external_links","finding_type":"dead_url","severity":"advisory","verdict_class":"incontrovertible","note":"URL 'https://cug.org/5-publications/proceedings_attendee_lists/CUG10CD/pages/1-' returned status 404 (Not Found) at last check.","detected_doi":null,"detected_arxiv_id":null,"ref_index":null,"audited_at":"2026-05-19T11:32:41.412386Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/S0378-8733(99) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/S0378-8733(99","detected_arxiv_id":null,"ref_index":12,"audited_at":"2026-05-19T05:17:28.118206Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/0167-6423(82) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/0167-6423(82","detected_arxiv_id":null,"ref_index":48,"audited_at":"2026-05-19T05:17:28.118206Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1002/(sici)1098-2418(199712)11:4<369::AID-RSA5>3.0.CO;2-V) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1002/(sici)1098-2418(199712)11:4<369::AID-RSA5>3.0.CO;2-V","detected_arxiv_id":null,"ref_index":36,"audited_at":"2026-05-19T05:17:28.118206Z"}],"snapshot_sha256":"d1461c8879cfb06a49ac43089247a0f7099d7b6d0b80ebd08dcb55a7cf28edb7"},"events":[{"event_id":1086,"event_type":"pith.integrity.v1","payload_sha256":"e04efe8d31cf5921fbd79b7bfb68351f9c04d75160f563232754e5179fa0afdd","signature_b64":"g12v1QArBJOJTSK1seiKsU1ZNeN60X9gE4iGye6ONpMfZCdWUHD8gkQld+k+Pizxuht3I2t9loPLcnl/qOEICQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:37:01.961713+00:00","payload":{"note":"URL 'https://github' returned status transport error (transport error: [Errno -3] Temporary failure in name resolution) at last check.","snippet":null,"arxiv_id":"2605.15173","detector":"external_links","evidence":{"url":"https://github","final_url":null,"host_kind":"website","status_code":0,"status_text":"transport error: [Errno -3] Temporary failure in name resolution","verdict_class":"incontrovertible","checked_at_unix":1779190359.839999},"severity":"advisory","ref_index":null,"audited_at":"2026-05-19T11:32:41.412386Z","event_type":"pith.integrity.v1","detected_doi":null,"detector_url":"https://pith.science/pith-integrity-protocol#external_links","external_url":"https://github","finding_type":"dead_url","evidence_hash":"497edeaa91feb7cd85b52f53c10891253e3dedc97e3c268a7744c2a14a370049","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1085,"event_type":"pith.integrity.v1","payload_sha256":"04ccc380fd34c97b0e6e76158b2e0a094d25034d1c42762c85667b2b6c02cd4a","signature_b64":"DRtbki8iM8lovaTRFhJ4NCvx+8A5JJWM4m0NWwQIpRPcYf1rwaFOd0OMZi+1e2A2TnLwmgsAN9l7VGkkQ7r6BQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:37:01.960444+00:00","payload":{"note":"URL 'https://cug.org/5-publications/proceedings_attendee_lists/CUG10CD/pages/1-' returned status 404 (Not Found) at last check.","snippet":null,"arxiv_id":"2605.15173","detector":"external_links","evidence":{"url":"https://cug.org/5-publications/proceedings_attendee_lists/CUG10CD/pages/1-","final_url":"https://cug.org/5-publications/proceedings_attendee_lists/CUG10CD/pages/1-","host_kind":"website","status_code":404,"status_text":"Not Found","verdict_class":"incontrovertible","checked_at_unix":1779190359.54995},"severity":"advisory","ref_index":null,"audited_at":"2026-05-19T11:32:41.412386Z","event_type":"pith.integrity.v1","detected_doi":null,"detector_url":"https://pith.science/pith-integrity-protocol#external_links","external_url":"https://cug.org/5-publications/proceedings_attendee_lists/CUG10CD/pages/1-","finding_type":"dead_url","evidence_hash":"0216f282a4abbb50035025ef26b0f2dab7c3592607b8d664395c1e713635b3a8","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":5,"event_type":"pith.integrity.v1","payload_sha256":"8be96a8c177e4a023a05b6f690cfcfbf25176aa992983be9a9cc87ec8357eac6","signature_b64":"BBNg9tusMmq+zwxYGzSApiw9iGPYA9Og7WI0Magh5gYwff8y18v9vNaioahl0TngD7N+V85WJWRAJ9i7lArRAw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T05:26:20.158232+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1002/(sici)1098-2418(199712)11:4<369::AID-RSA5>3.0.CO;2-V) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Monika R. Henzinger and Mikkel Thorup. 1997. Sampling to Provide or to Bound: With Applications to Fully Dynamic Graph Algorithms.Random Structures & Algorithms11, 4 (1997), 369–379. https://doi.org/10.1002/(SICI)1098- 2418(199712)11:4<369:","arxiv_id":"2605.15173","detector":"doi_compliance","evidence":{"ref_index":36,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Monika R. Henzinger and Mikkel Thorup. 1997. Sampling to Provide or to Bound: With Applications to Fully Dynamic Graph Algorithms.Random Structures & Algorithms11, 4 (1997), 369–379. https://doi.org/10.1002/(SICI)1098- 2418(199712)11:4<369:","reconstructed_doi":"10.1002/(sici)1098-2418(199712)11:4<369::AID-RSA5>3.0.CO;2-V"},"severity":"advisory","ref_index":36,"audited_at":"2026-05-19T05:17:28.118206Z","event_type":"pith.integrity.v1","detected_doi":"10.1002/(sici)1098-2418(199712)11:4<369::AID-RSA5>3.0.CO;2-V","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4e5c6c53bde4464835828e5d97f33dd3d1a4d309ec80197334d495d988f61b99","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4,"event_type":"pith.integrity.v1","payload_sha256":"af0a1d95a16cbcf04b9a8b66ba255538fcc925293e0776f90990528c6805e5aa","signature_b64":"vsvTAGqBMAJBvhWuqIvZDgRqz07Vj36I2xj0bZJNvLVtYZuKaUpBTNftRjku1oZCqkQBOE75bN0XLnbnshXnCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T05:26:20.156601+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/0167-6423(82) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Jayadev Misra and David Gries. 1982. Finding Repeated Elements.Science of Computer Programming2, 2 (1982), 143–152. https://doi.org/10.1016/0167- 6423(82)90012-0","arxiv_id":"2605.15173","detector":"doi_compliance","evidence":{"ref_index":48,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Jayadev Misra and David Gries. 1982. Finding Repeated Elements.Science of Computer Programming2, 2 (1982), 143–152. https://doi.org/10.1016/0167- 6423(82)90012-0","reconstructed_doi":"10.1016/0167-6423(82"},"severity":"advisory","ref_index":48,"audited_at":"2026-05-19T05:17:28.118206Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/0167-6423(82","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"b4ac0a727bbb505587f3b38e352897918a4a3740cd6fe0fbacc69825822db458","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3,"event_type":"pith.integrity.v1","payload_sha256":"8e48ef68ecc57e4abd0ae299fc2fb85b84a999496c87770b2992fef6b77f0b61","signature_b64":"B+QimX9E8LR3Wif7EHtAs6SF32N1BNm2k3SRVh9JnNVZyF3CA2PX67ErfqXMbyKfUDujDTBy+AfFz68yoJEWCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T05:26:20.153790+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/S0378-8733(99) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Stephen P. Borgatti and Martin G. Everett. 2000. Models of Core/Periphery Structures.Social Networks21, 4 (2000), 375–395. https://doi.org/10.1016/S0378- 8733(99)00019-2","arxiv_id":"2605.15173","detector":"doi_compliance","evidence":{"ref_index":12,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Stephen P. Borgatti and Martin G. Everett. 2000. Models of Core/Periphery Structures.Social Networks21, 4 (2000), 375–395. https://doi.org/10.1016/S0378- 8733(99)00019-2","reconstructed_doi":"10.1016/S0378-8733(99"},"severity":"advisory","ref_index":12,"audited_at":"2026-05-19T05:17:28.118206Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/S0378-8733(99","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"da74b1f727e1fd6212fe302ae7488723655e5cd8db00055a67f619bc2496c30f","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.15173/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}