{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:M5X6D4WAUZWSCKH7VSN22DHCDW","short_pith_number":"pith:M5X6D4WA","canonical_record":{"source":{"id":"1711.03386","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2017-11-09T14:28:12Z","cross_cats_sorted":["cs.LG","cs.PF"],"title_canon_sha256":"3c5913c85a4ac8a34f0cb319f05a5da3cc6b5ec4efd504d49b9aa69745043f40","abstract_canon_sha256":"a3ac1e3517a91795da0d66567e43918ddb8b1f93af04f9969a0e321f11cb8463"},"schema_version":"1.0"},"canonical_sha256":"676fe1f2c0a66d2128ffac9bad0ce21dbe63dcb65711beffefea4aec9c3f42a8","source":{"kind":"arxiv","id":"1711.03386","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1711.03386","created_at":"2026-05-18T00:30:56Z"},{"alias_kind":"arxiv_version","alias_value":"1711.03386v1","created_at":"2026-05-18T00:30:56Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1711.03386","created_at":"2026-05-18T00:30:56Z"},{"alias_kind":"pith_short_12","alias_value":"M5X6D4WAUZWS","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_16","alias_value":"M5X6D4WAUZWSCKH7","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_8","alias_value":"M5X6D4WA","created_at":"2026-05-18T12:31:28Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:M5X6D4WAUZWSCKH7VSN22DHCDW","target":"record","payload":{"canonical_record":{"source":{"id":"1711.03386","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2017-11-09T14:28:12Z","cross_cats_sorted":["cs.LG","cs.PF"],"title_canon_sha256":"3c5913c85a4ac8a34f0cb319f05a5da3cc6b5ec4efd504d49b9aa69745043f40","abstract_canon_sha256":"a3ac1e3517a91795da0d66567e43918ddb8b1f93af04f9969a0e321f11cb8463"},"schema_version":"1.0"},"canonical_sha256":"676fe1f2c0a66d2128ffac9bad0ce21dbe63dcb65711beffefea4aec9c3f42a8","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:30:56.289759Z","signature_b64":"FWEqA2qW1m+qV8+m6LBybn9KK4yznyx6v1tDTxTqVEGFiUjjeX/BdOCpN7z9VWp1XQRd2v2qTpq7uAUiWVwCDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"676fe1f2c0a66d2128ffac9bad0ce21dbe63dcb65711beffefea4aec9c3f42a8","last_reissued_at":"2026-05-18T00:30:56.289143Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:30:56.289143Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1711.03386","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:30:56Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"QhEQ+VbVMooWcSWINqQz+CuzViFZCbcJl+DQhkFTrI1nAf8w2LqEezdbkXdolyxnaOIytVifKLHjMwweSrTvBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T10:49:47.793706Z"},"content_sha256":"e7d7ef6f3d69104b61dab6f97ba462dbd8a00ce8948a80fa2974125ac734cd96","schema_version":"1.0","event_id":"sha256:e7d7ef6f3d69104b61dab6f97ba462dbd8a00ce8948a80fa2974125ac734cd96"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:M5X6D4WAUZWSCKH7VSN22DHCDW","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Performance Evaluation of Deep Learning Tools in Docker Containers","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG","cs.PF"],"primary_cat":"cs.DC","authors_text":"Pengfei Xu, Shaohuai Shi, Xiaowen Chu","submitted_at":"2017-11-09T14:28:12Z","abstract_excerpt":"With the success of deep learning techniques in a broad range of application domains, many deep learning software frameworks have been developed and are being updated frequently to adapt to new hardware features and software libraries, which bring a big challenge for end users and system administrators. To address this problem, container techniques are widely used to simplify the deployment and management of deep learning software. However, it remains unknown whether container techniques bring any performance penalty to deep learning applications. The purpose of this work is to systematically "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1711.03386","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:30:56Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"fFru6DjcOY+pUIZX9t4LsBDcbCxGlNDztM6DQTS9SWDkKtFClX7IiCxKQeytVDBqiZqhtIvGzp9GKhigvr6OCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T10:49:47.794057Z"},"content_sha256":"84ad372a78424e329fd96cd1c523956f046bc44e55132fe1e058885d841a660e","schema_version":"1.0","event_id":"sha256:84ad372a78424e329fd96cd1c523956f046bc44e55132fe1e058885d841a660e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/M5X6D4WAUZWSCKH7VSN22DHCDW/bundle.json","state_url":"https://pith.science/pith/M5X6D4WAUZWSCKH7VSN22DHCDW/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/M5X6D4WAUZWSCKH7VSN22DHCDW/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T10:49:47Z","links":{"resolver":"https://pith.science/pith/M5X6D4WAUZWSCKH7VSN22DHCDW","bundle":"https://pith.science/pith/M5X6D4WAUZWSCKH7VSN22DHCDW/bundle.json","state":"https://pith.science/pith/M5X6D4WAUZWSCKH7VSN22DHCDW/state.json","well_known_bundle":"https://pith.science/.well-known/pith/M5X6D4WAUZWSCKH7VSN22DHCDW/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:M5X6D4WAUZWSCKH7VSN22DHCDW","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"a3ac1e3517a91795da0d66567e43918ddb8b1f93af04f9969a0e321f11cb8463","cross_cats_sorted":["cs.LG","cs.PF"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2017-11-09T14:28:12Z","title_canon_sha256":"3c5913c85a4ac8a34f0cb319f05a5da3cc6b5ec4efd504d49b9aa69745043f40"},"schema_version":"1.0","source":{"id":"1711.03386","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1711.03386","created_at":"2026-05-18T00:30:56Z"},{"alias_kind":"arxiv_version","alias_value":"1711.03386v1","created_at":"2026-05-18T00:30:56Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1711.03386","created_at":"2026-05-18T00:30:56Z"},{"alias_kind":"pith_short_12","alias_value":"M5X6D4WAUZWS","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_16","alias_value":"M5X6D4WAUZWSCKH7","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_8","alias_value":"M5X6D4WA","created_at":"2026-05-18T12:31:28Z"}],"graph_snapshots":[{"event_id":"sha256:84ad372a78424e329fd96cd1c523956f046bc44e55132fe1e058885d841a660e","target":"graph","created_at":"2026-05-18T00:30:56Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"With the success of deep learning techniques in a broad range of application domains, many deep learning software frameworks have been developed and are being updated frequently to adapt to new hardware features and software libraries, which bring a big challenge for end users and system administrators. To address this problem, container techniques are widely used to simplify the deployment and management of deep learning software. However, it remains unknown whether container techniques bring any performance penalty to deep learning applications. The purpose of this work is to systematically ","authors_text":"Pengfei Xu, Shaohuai Shi, Xiaowen Chu","cross_cats":["cs.LG","cs.PF"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2017-11-09T14:28:12Z","title":"Performance Evaluation of Deep Learning Tools in Docker Containers"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1711.03386","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:e7d7ef6f3d69104b61dab6f97ba462dbd8a00ce8948a80fa2974125ac734cd96","target":"record","created_at":"2026-05-18T00:30:56Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"a3ac1e3517a91795da0d66567e43918ddb8b1f93af04f9969a0e321f11cb8463","cross_cats_sorted":["cs.LG","cs.PF"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2017-11-09T14:28:12Z","title_canon_sha256":"3c5913c85a4ac8a34f0cb319f05a5da3cc6b5ec4efd504d49b9aa69745043f40"},"schema_version":"1.0","source":{"id":"1711.03386","kind":"arxiv","version":1}},"canonical_sha256":"676fe1f2c0a66d2128ffac9bad0ce21dbe63dcb65711beffefea4aec9c3f42a8","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"676fe1f2c0a66d2128ffac9bad0ce21dbe63dcb65711beffefea4aec9c3f42a8","first_computed_at":"2026-05-18T00:30:56.289143Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:30:56.289143Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"FWEqA2qW1m+qV8+m6LBybn9KK4yznyx6v1tDTxTqVEGFiUjjeX/BdOCpN7z9VWp1XQRd2v2qTpq7uAUiWVwCDw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:30:56.289759Z","signed_message":"canonical_sha256_bytes"},"source_id":"1711.03386","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:e7d7ef6f3d69104b61dab6f97ba462dbd8a00ce8948a80fa2974125ac734cd96","sha256:84ad372a78424e329fd96cd1c523956f046bc44e55132fe1e058885d841a660e"],"state_sha256":"dee8915dbb2b0978d5bd2155c4f7c8539fc351c654fa9bb1a5409358bed20581"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"6WVivjHu8z3rTEA/X/BW5WUxoyOWNJ8tYBkT0W0eNQaHClVHUAVjPMGwoGZ0SdgM+0subZouIWs5ItrucKYvCQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T10:49:47.796010Z","bundle_sha256":"a35f6a4a797e30f9dbca7897ded5b3c0cd34fccfb703a173b4779ce1c846aad3"}}