{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:41Z","timestamp":1740123581739,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10836-024-06115-9","type":"journal-article","created":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T05:01:27Z","timestamp":1713848487000},"page":"199-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Syntactic and Semantic Analysis of Temporal Assertions to Support the Approximation of RTL Designs"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6116-7339","authenticated-orcid":false,"given":"Alberto","family":"Bosio","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0794-8606","authenticated-orcid":false,"given":"Samuele","family":"Germiniani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7833-1673","authenticated-orcid":false,"given":"Graziano","family":"Pravadelli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1484-5162","authenticated-orcid":false,"given":"Marcello","family":"Traiola","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,23]]},"reference":[{"issue":"3","key":"6115_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3501772","volume":"18","author":"M Barbareschi","year":"2022","unstructured":"Barbareschi M, Barone S, Bosio A, Han J, Traiola M (2022) A genetic-algorithm-based approach to the design of DCT hardware accelerators. ACM J Emerg Technol Comput Syst 18(3):1\u201325","journal-title":"ACM J Emerg Technol Comput Syst"},{"key":"6115_CR2","doi-asserted-by":"publisher","first-page":"86975","DOI":"10.1109\/ACCESS.2021.3087858","volume":"9","author":"S Barone","year":"2021","unstructured":"Barone S, Traiola M, Barbareschi M, Bosio A (2021) Multi-objective application-driven approximate design method. IEEE Access 9:86975\u201386993","journal-title":"IEEE Access"},{"key":"6115_CR3","doi-asserted-by":"crossref","unstructured":"Bosio A, Bragaglio M, Germiniani S, Mori S, Pravadelli G, Traiola M (2022) Assertion-aware approximate computing design exploration on behavioral models. In: 2022 IEEE 23rd Latin American Test Symposium (LATS), pp 1\u20136","DOI":"10.1109\/LATS57337.2022.9936945"},{"key":"6115_CR4","volume-title":"Approximate computing techniques","year":"2022","unstructured":"Bosio A, Menard D, Sentieys O (eds) (2022) Approximate computing techniques, 1st edn. Cham, Switzerland, Springer Nature","edition":"1"},{"key":"6115_CR5","doi-asserted-by":"crossref","unstructured":"Chippa VK, Chakradhar ST, Roy K, Raghunathan A (2013) Analysis and characterization of inherent application resilience for approximate computing. In: Proceedings of ACM\/IEE DAC","DOI":"10.1145\/2463209.2488873"},{"key":"6115_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9228-4","volume-title":"Assertion-based design","author":"H Foster","year":"2003","unstructured":"Foster H, Lacey D, Krolnik A (2003) Assertion-based design, 2nd edn. Kluwer Academic Publishers, USA","edition":"2"},{"issue":"11","key":"6115_CR7","doi-asserted-by":"publisher","first-page":"4277","DOI":"10.1109\/TCAD.2022.3197525","volume":"41","author":"S Germiniani","year":"2022","unstructured":"Germiniani S, Pravadelli G (2022) Harm: a hint-based assertion miner. IEEE Trans Comput Aided Des Integr Circ Syst 41(11):4277\u20134288","journal-title":"IEEE Trans Comput Aided Des Integr Circ Syst"},{"key":"6115_CR8","doi-asserted-by":"crossref","unstructured":"Han J, Orshansky M (2013) Approximate computing: an emerging paradigm for energy-efficient design. In: Proceedings of IEEE ETS","DOI":"10.1109\/ETS.2013.6569370"},{"key":"6115_CR9","unstructured":"https:\/\/github.com\/SamueleGerminiani\/harm. Accessed 22 Jan 2024"},{"key":"6115_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/OJCS.2021.3051643","volume":"2","author":"P Huang","year":"2021","unstructured":"Huang P, Wang C, Liu W, Qiao F, Lombardi F (2021) A hardware\/software co-design methodology for adaptive approximate computing in clustering and ANN learning. IEEE Open J Comput Soc 2:38\u201352","journal-title":"IEEE Open J Comput Soc"},{"key":"6115_CR11","doi-asserted-by":"crossref","unstructured":"Isenberg FPT, Jakobs MC, Wehrheim H (2018) Validity of software verification results on approximate hardware. In: IEEE Embedded Systems Letters","DOI":"10.1109\/LES.2017.2758200"},{"issue":"12","key":"6115_CR12","doi-asserted-by":"publisher","first-page":"2108","DOI":"10.1109\/JPROC.2020.3006451","volume":"108","author":"H Jiang","year":"2020","unstructured":"Jiang H, Santiago FJH, Mo H, Liu L, Han J (2020) Approximate arithmetic circuits: a survey, characterization, and recent applications. Proc IEEE 108(12):2108\u20132135","journal-title":"Proc IEEE"},{"key":"6115_CR13","doi-asserted-by":"crossref","unstructured":"Lee S, John LK, Gerstlauer A (2017) High-level synthesis of approximate hardware under joint precision and voltage scaling. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp 187\u2013192","DOI":"10.23919\/DATE.2017.7926980"},{"issue":"6","key":"6115_CR14","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TC.2018.2890222","volume":"68","author":"W Liu","year":"2018","unstructured":"Liu W, Cao T, Yin P, Zhu Y, Wang C, Swartzlander EE, Lombardi F (2018) Design and analysis of approximate redundant binary multipliers. IEEE Trans Comput 68(6):804\u2013819","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"6115_CR15","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/JPROC.2020.2975695","volume":"108","author":"W Liu","year":"2020","unstructured":"Liu W, Lombardi F, Shulte M (2020) A retrospective and prospective view of approximate computing. Proc IEEE 108(3):394\u2013399","journal-title":"Proc IEEE"},{"issue":"2","key":"6115_CR16","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd S (1982) Least squares quantization in PCM. IEEE Trans Inf Theory 28(2):129\u2013137","journal-title":"IEEE Trans Inf Theory"},{"key":"6115_CR17","doi-asserted-by":"crossref","unstructured":"Ma D, Thapa R, Wang X, Hao C, Jiao X (2021) Workload-aware approximate computing configuration. In: Design, Automation Test in Europe Conference Exhibition (DATE) (in press), pp 258\u2013261","DOI":"10.23919\/DATE51398.2021.9474069"},{"key":"6115_CR18","doi-asserted-by":"crossref","unstructured":"Mitra S, Das M, Banerjee A, Datta K, Ho T-Y (2016) A verification guided approach for selective program transformations for approximate computing. In: Proceedings of IEEE ATS","DOI":"10.1109\/ATS.2016.28"},{"issue":"4","key":"6115_CR19","doi-asserted-by":"publisher","first-page":"62:1","DOI":"10.1145\/2893356","volume":"48","author":"S Mittal","year":"2016","unstructured":"Mittal S (2016) A survey of techniques for approximate computing. ACM Comput Surv 48(4):62:1-62:33","journal-title":"ACM Comput Surv"},{"issue":"4","key":"6115_CR20","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/JETCAS.2020.3032495","volume":"10","author":"V Mrazek","year":"2020","unstructured":"Mrazek V, Sekanina L, Vasicek Z (2020) Libraries of approximate circuits: Automated design and application in CNN accelerators. IEEE J Emerg Select Topics Circ Syst 10(4):406\u2013418","journal-title":"IEEE J Emerg Select Topics Circ Syst"},{"key":"6115_CR21","doi-asserted-by":"crossref","unstructured":"Nepal K, Li Y, Bahar R, Reda S (2014) Abacus: a technique for automated behavioral synthesis of approximate computing circuits. In: Proceedings of ACM\/IEEE DATE","DOI":"10.7873\/DATE2014.374"},{"key":"6115_CR22","unstructured":"Sampson A, Baixo A, Ransford B, Moreau T, Yip J, Ceze L, Oskin M (2015) Accept: a programmer-guided compiler framework for practical approximate computing. University of Washington Technical Report UW-CSE-15-01 (vol. 1, no. 2)"},{"key":"6115_CR23","doi-asserted-by":"crossref","unstructured":"Sidiroglou-Douskos S, Misailovic S, Hoffmann H, Rinard M (2011) Managing performance vs. accuracy trade-offs with loop perforation. In: Proceedings of ACM ESEC\/FSE","DOI":"10.1145\/2025113.2025133"},{"key":"6115_CR24","doi-asserted-by":"crossref","unstructured":"Venkataramani S, Chakradhar ST, Roy K, Raghunathan A (2015) Approximate computing and the quest for computing efficiency. In: Proceedings of ACM\/IEE DAC","DOI":"10.1145\/2744769.2751163"},{"issue":"4","key":"6115_CR25","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"6115_CR26","doi-asserted-by":"crossref","unstructured":"Ye XFM, Wei S (2019) Runtime hardware security verification using approximate computing: a case study on video motion detection. In: Proceedings of IEEE AsianHOST","DOI":"10.1109\/AsianHOST47458.2019.9006675"},{"key":"6115_CR27","doi-asserted-by":"crossref","unstructured":"Yoshisue YMK, Ishihara T (2021) Dynamic verification of approximate computing circuits using coverage-based grey-box fuzzing. In Proceedings of IEEE IOLTS","DOI":"10.1109\/IOLTS52814.2021.9486690"},{"key":"6115_CR28","doi-asserted-by":"publisher","first-page":"53522","DOI":"10.1109\/ACCESS.2020.2981395","volume":"8","author":"G Zervakis","year":"2020","unstructured":"Zervakis G, Amrouch H, Henkel J (2020) Design automation of approximate circuits with runtime reconfigurable accuracy. IEEE Access 8:53522\u201353538","journal-title":"IEEE Access"},{"key":"6115_CR29","doi-asserted-by":"publisher","unstructured":"(2010) Standard for property specification language (PSL).\u00a0IEEE Std 1850-2010 (Revision of IEEE Std 1850-2005), 1\u2013182. https:\/\/doi.org\/10.1109\/IEEESTD.2010.5446004","DOI":"10.1109\/IEEESTD.2010.5446004"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06115-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-024-06115-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06115-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T13:16:02Z","timestamp":1718889362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-024-06115-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["6115"],"URL":"https:\/\/doi.org\/10.1007\/s10836-024-06115-9","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2024,4]]},"assertion":[{"value":"30 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}