{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:55Z","timestamp":1750219735269,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T00:00:00Z","timestamp":1667520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,4]]},"DOI":"10.1145\/3581792.3581802","type":"proceedings-article","created":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T22:07:37Z","timestamp":1683151657000},"page":"54-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Single Node Acceleration of Generative Adversarial Networks using HPC for Image Analytics"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0897-6991","authenticated-orcid":false,"given":"Aswathy","family":"Ravikumar","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2192-8153","authenticated-orcid":false,"given":"Harini","family":"Sriraman","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2023,5,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12021-018-9377-x"},{"key":"e_1_3_2_1_2_1","first-page":"1167","volume-title":"2021 5th International Conference on Computing Methodologies and Communication (ICCMC)","author":"Robin M.","year":"2021","unstructured":"[ 2 ] M. Robin , J. John , and A. Ravikumar , \u201c Breast Tumor Segmentation using U-NET ,\u201d in 2021 5th International Conference on Computing Methodologies and Communication (ICCMC) , Apr. 2021 , pp. 1164\u2013 1167 . doi: 10.1109\/ICCMC51019.2021.9418447. 10.1109\/ICCMC51019.2021.9418447 [2] M. Robin, J. John, and A. Ravikumar, \u201cBreast Tumor Segmentation using U-NET,\u201d in 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), Apr. 2021, pp. 1164\u20131167. doi: 10.1109\/ICCMC51019.2021.9418447."},{"key":"e_1_3_2_1_3_1","first-page":"169","volume-title":"Innovative Data Communication Technologies and Application","author":"Harini S.","year":"2022","unstructured":"[ 3 ] S. Harini , A. Ravikumar , and N. Keshwani , \u201c Malware Prediction Analysis Using AI Techniques with the Effective Preprocessing and Dimensionality Reduction ,\u201d in Innovative Data Communication Technologies and Application , Singapore , 2022 , pp. 153\u2013 169 . [3] S. Harini, A. Ravikumar, and N. Keshwani, \u201cMalware Prediction Analysis Using AI Techniques with the Effective Preprocessing and Dimensionality Reduction,\u201d in Innovative Data Communication Technologies and Application, Singapore, 2022, pp. 153\u2013169."},{"key":"e_1_3_2_1_4_1","first-page":"1017","volume-title":"2020 International Conference on Smart Electronics and Communication (ICOSEC)","author":"Harini S.","year":"2020","unstructured":"[ 4 ] S. Harini and A. Ravikumar , \u201c Effect of Parallel Workload on Dynamic Voltage Frequency Scaling for Dark Silicon Ameliorating ,\u201d in 2020 International Conference on Smart Electronics and Communication (ICOSEC) , 2020 , pp. 1012\u2013 1017 . doi: 10.1109\/ICOSEC49089.2020.9215262. 10.1109\/ICOSEC49089.2020.9215262 [4] S. Harini and A. Ravikumar, \u201cEffect of Parallel Workload on Dynamic Voltage Frequency Scaling for Dark Silicon Ameliorating,\u201d in 2020 International Conference on Smart Electronics and Communication (ICOSEC), 2020, pp. 1012\u20131017. doi: 10.1109\/ICOSEC49089.2020.9215262."},{"key":"e_1_3_2_1_5_1","volume-title":"Jun. 10, 2014. Accessed","author":"Goodfellow I. J.","year":"2022","unstructured":"[ 5 ] I. J. Goodfellow , \u201c Generative Adversarial Networks.\u201d arXiv , Jun. 10, 2014. Accessed : Jun. 16, 2022 . [Online]. Available : http:\/\/arxiv.org\/abs\/1406.2661 [5] I. J. Goodfellow , \u201cGenerative Adversarial Networks.\u201d arXiv, Jun. 10, 2014. Accessed: Jun. 16, 2022. [Online]. Available: http:\/\/arxiv.org\/abs\/1406.2661"},{"key":"e_1_3_2_1_6_1","first-page":"12","volume-title":"2019 IEEE International Conference on Cluster Computing (CLUSTER)","author":"Han J.","year":"2019","unstructured":"[ 6 ] J. Han , L. Xu , M. M. Rafique , A. R. Butt , and S.-H. Lim , \u201c A Quantitative Study of Deep Learning Training on Heterogeneous Supercomputers ,\u201d in 2019 IEEE International Conference on Cluster Computing (CLUSTER) , Albuquerque, NM, USA , Sep. 2019 , pp. 1\u2013 12 . doi: 10.1109\/CLUSTER.2019.8890993. 10.1109\/CLUSTER.2019.8890993 [6] J. Han, L. Xu, M. M. Rafique, A. R. Butt, and S.-H. Lim, \u201cA Quantitative Study of Deep Learning Training on Heterogeneous Supercomputers,\u201d in 2019 IEEE International Conference on Cluster Computing (CLUSTER), Albuquerque, NM, USA, Sep. 2019, pp. 1\u201312. doi: 10.1109\/CLUSTER.2019.8890993."},{"volume-title":"MNIST handwritten digit database, Yann LeCun, Corinna Cortes and Chris Burges","year":"2022","key":"e_1_3_2_1_7_1","unstructured":"[ 7 ] \u201c MNIST handwritten digit database, Yann LeCun, Corinna Cortes and Chris Burges .\u201d http:\/\/yann.lecun.com\/exdb\/mnist\/ (accessed Jun. 16, 2022 ). [7] \u201cMNIST handwritten digit database, Yann LeCun, Corinna Cortes and Chris Burges.\u201d http:\/\/yann.lecun.com\/exdb\/mnist\/ (accessed Jun. 16, 2022)."},{"volume-title":"CIFAR-10 and CIFAR-100 datasets","year":"2022","key":"e_1_3_2_1_8_1","unstructured":"[ 8 ] \u201c CIFAR-10 and CIFAR-100 datasets .\u201d https:\/\/www.cs.toronto.edu\/\u223ckriz\/cifar.html (accessed Sep. 13, 2022 ). [8] \u201cCIFAR-10 and CIFAR-100 datasets.\u201d https:\/\/www.cs.toronto.edu\/\u223ckriz\/cifar.html (accessed Sep. 13, 2022)."},{"key":"e_1_3_2_1_9_1","volume-title":"May 24, 2016. Accessed","author":"Mateos-N\u00fa\u00f1ez D.","year":"2022","unstructured":"[ 9 ] D. Mateos-N\u00fa\u00f1ez and J. Cort\u00e9s , \u201c Distributed saddle-point subgradient algorithms with Laplacian averaging.\u201d arXiv , May 24, 2016. Accessed : Jun. 16, 2022 . [Online]. Available : http:\/\/arxiv.org\/abs\/1510.05169 [9] D. Mateos-N\u00fa\u00f1ez and J. Cort\u00e9s, \u201cDistributed saddle-point subgradient algorithms with Laplacian averaging.\u201d arXiv, May 24, 2016. Accessed: Jun. 16, 2022. [Online]. Available: http:\/\/arxiv.org\/abs\/1510.05169"},{"key":"e_1_3_2_1_10_1","volume-title":"Jan. 07, 2016. Accessed","author":"Radford A.","year":"2022","unstructured":"[ 10 ] A. Radford , L. Metz , and S. Chintala , \u201c Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks.\u201d arXiv , Jan. 07, 2016. Accessed : Jun. 16, 2022 . [Online]. Available : http:\/\/arxiv.org\/abs\/1511.06434 [10] A. Radford, L. Metz, and S. Chintala, \u201cUnsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks.\u201d arXiv, Jan. 07, 2016. Accessed: Jun. 16, 2022. [Online]. Available: http:\/\/arxiv.org\/abs\/1511.06434"},{"key":"e_1_3_2_1_11_1","volume-title":"Nov. 06, 2014. Accessed","author":"Mirza M.","year":"2022","unstructured":"[ 11 ] M. Mirza and S. Osindero , \u201c Conditional Generative Adversarial Nets.\u201d arXiv , Nov. 06, 2014. Accessed : Sep. 13, 2022 . [Online]. Available : http:\/\/arxiv.org\/abs\/1411.1784 [11] M. Mirza and S. Osindero, \u201cConditional Generative Adversarial Nets.\u201d arXiv, Nov. 06, 2014. Accessed: Sep. 13, 2022. [Online]. Available: http:\/\/arxiv.org\/abs\/1411.1784"},{"volume-title":"JAIT","author":"Sithungu S. P.","key":"e_1_3_2_1_12_1","unstructured":"[ 12 ] S. P. Sithungu and E. M. Ehlers , \u201c GAAINet: A Generative Adversarial Artificial Immune Network Model for Intrusion Detection in Industrial IoT Systems ,\u201d JAIT , vol. 13 , no. 5, 2022, doi: 10.12720\/jait.13.5.456-461. 10.12720\/jait.13.5.456-461 [12] S. P. Sithungu and E. M. Ehlers, \u201cGAAINet: A Generative Adversarial Artificial Immune Network Model for Intrusion Detection in Industrial IoT Systems,\u201d JAIT, vol. 13, no. 5, 2022, doi: 10.12720\/jait.13.5.456-461."},{"key":"e_1_3_2_1_13_1","volume-title":"Oct. 21, 2016. Accessed","author":"Odena A.","year":"2022","unstructured":"[ 13 ] A. Odena , \u201c Semi-Supervised Learning with Generative Adversarial Networks.\u201d arXiv , Oct. 21, 2016. Accessed : Sep. 13, 2022 . [Online]. Available : http:\/\/arxiv.org\/abs\/1606.01583 [13] A. Odena, \u201cSemi-Supervised Learning with Generative Adversarial Networks.\u201d arXiv, Oct. 21, 2016. Accessed: Sep. 13, 2022. [Online]. Available: http:\/\/arxiv.org\/abs\/1606.01583"},{"key":"e_1_3_2_1_14_1","volume-title":"Jul. 20, 2017. Accessed","author":"Odena A.","year":"2022","unstructured":"[ 14 ] A. Odena , C. Olah , and J. Shlens , \u201c Conditional Image Synthesis With Auxiliary Classifier GANs.\u201d arXiv , Jul. 20, 2017. Accessed : Sep. 13, 2022 . [Online]. Available : http:\/\/arxiv.org\/abs\/1610.09585 [14] A. Odena, C. Olah, and J. Shlens, \u201cConditional Image Synthesis With Auxiliary Classifier GANs.\u201d arXiv, Jul. 20, 2017. Accessed: Sep. 13, 2022. [Online]. Available: http:\/\/arxiv.org\/abs\/1610.09585"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"e330","DOI":"10.7717\/peerj-cs.330","article-title":"Numerical behavior of NVIDIA tensor cores","volume":"7","author":"Fasi M.","year":"2021","unstructured":"[ 15 ] M. Fasi , N. J. Higham , M. Mikaitis , and S. Pranesh , \u201c Numerical behavior of NVIDIA tensor cores ,\u201d PeerJ Comput. Sci. , vol. 7 , p. e330 , Feb. 2021 , doi: 10.7717\/peerj-cs.330. 10.7717\/peerj-cs.330 [15] M. Fasi, N. J. Higham, M. Mikaitis, and S. Pranesh, \u201cNumerical behavior of NVIDIA tensor cores,\u201d PeerJ Comput. Sci., vol. 7, p. e330, Feb. 2021, doi: 10.7717\/peerj-cs.330.","journal-title":"PeerJ Comput. Sci."}],"event":{"name":"CIIS 2022: 2022 The 5th International Conference on Computational Intelligence and Intelligent Systems","acronym":"CIIS 2022","location":"Quzhou China"},"container-title":["Proceedings of the 2022 5th International Conference on Computational Intelligence and Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581792.3581802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581792.3581802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:31Z","timestamp":1750178191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581792.3581802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,4]]},"references-count":15,"alternative-id":["10.1145\/3581792.3581802","10.1145\/3581792"],"URL":"https:\/\/doi.org\/10.1145\/3581792.3581802","relation":{},"subject":[],"published":{"date-parts":[[2022,11,4]]},"assertion":[{"value":"2023-05-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}