Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
versions View all 3 versions
addClaim

ARLE: A Preregistered Instrument for Boundary‑Condition Load Escalation and Asymmetric Repair Load

Authors: Kelly Rhys;

ARLE: A Preregistered Instrument for Boundary‑Condition Load Escalation and Asymmetric Repair Load

Abstract

This Zenodo collection publishes the ARLE Suite: a three-layer, audit-oriented framework for producing tamper-evident, independently verifiable admissibility decisions and deploying conservative, preregistered instruments whose outputs can be cited without relying on trust or informal interpretation. Layer 1 — ARLE-CORE-STD (Governance substrate).The CORE standard defines the run-package format and the admissibility semantics required for interoperable verification. It specifies canonical artifact structure and canonicalization rules (including deterministic JSON and bundle rules), domain-separated hashing and binding, and a verifier workflow that recomputes governing outputs when possible. CORE’s primary aim is to ensure that admissibility verdicts are replay-verifiable and that post-production modification is detectable and routed into governing refusal outcomes rather than narrative reconciliation. Layer 2 — ARLE Methods Profiles (Controlled evolution membrane).The Methods Profiles layer defines how implementations declare method constraints, determinism boundaries, registries, and extension requests without weakening CORE invariants. It establishes a “closed-world” governance surface: only explicitly packaged, schema-bound artifacts may influence governing outcomes. Methods Profiles also standardize refusal mapping, FailureID lifecycle constraints, and deterministic registry resolution, enabling method evolution while preserving cross-implementation comparability. Layer 3 — ARLE Instrument (Domain deployment: BCLE + ARLE).The instrument document provides a preregistered measurement procedure for estimating P(BCLE | data) (Boundary-Condition Load Escalation) and P(ARLE | data) (Asymmetric Repair Load Event) from interaction logs under strict conservatism. It includes explicit gating (including a Null-World Gate for calibration and incremental value vs stress-only baselines), integrity/adversary screening, and identifiability defaults that suppress unsafe or overconfident interpretations. The instrument constrains output language and is designed to be portable across implementations when bound to the CORE + Methods governance substrate. What this suite is for: Producing citable, hash-bound receipts for admissibility outcomes (PASS / REFUSE / DOWNSCOPE). Standardizing conservative failure modes so that insufficient evidence becomes an explicit outcome, not a hidden narrative gap. Supporting third-party verification and audit workflows across labs, reviewers, or deployment environments. Enabling domain instruments (like ARLE) that remain stable under adversarial pressure, incomplete data, or boundary ambiguity. How to use the collection: Implement or adopt ARLE-CORE-STD for run packaging + verification. Select/define a Methods Profile to declare governing fields, registries, determinism constraints, and any EXT requests. Apply the ARLE instrument (or other domain instruments) with outputs produced and cited through CORE-conformant run packages. In short: this collection provides a complete, layered pathway from verifier-grade governance → method-controlled extensibility → preregistered, conservative instruments, designed to reduce interpretive drift, increase auditability, and make “admissibility” a mechanically checkable property rather than a social claim.Keywords: Core Governance & Verification: admissibility semantics, run-package standard, deterministic verification, replayable verification, canonicalization, content-addressed artifacts, domain-separated hashing, tamper-evident packaging, independent verification, refusal semantics, structured failure modes, PASS / REFUSE / DOWNSCOPE, monotonic downscoping, byte-deterministic artifacts, verifier recomputation. Methods & Extension Governance: methods profile standard, closed-world governance, determinism boundaries, registry resolution, extension gating (EXT), non-override invariants, failure ID lifecycle, schema-bound artifacts, governance substrate, interoperability standard. Instrument & Measurement Layer (ARLE): preregistered instrument, boundary-condition load escalation (BCLE), asymmetric repair load event (ARLE), posterior probability estimation, null-world gate (NWG), calibration gate, adversarial robustness, identifiability constraints, conservative inference, suppression defaults, interaction log analysis. Cross-Domain & Meta-Level: audit-ready research artifacts, reproducibility infrastructure, measurement governance, metrology protocol, evidence admissibility, anti-narrative inflation, hash-bound receipts, research integrity tooling, adversary-aware standards, formalized interpretation constraints.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!