{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T15:37:03Z","timestamp":1774971423997,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100006639","name":"German Research Foundation","doi-asserted-by":"publisher","award":["AM 534\/5-1"],"award-info":[{"award-number":["AM 534\/5-1"]}],"id":[{"id":"10.13039\/100006639","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NN-Thunder","award":["506419033"],"award-info":[{"award-number":["506419033"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3577946","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T17:35:48Z","timestamp":1749490548000},"page":"104666-104678","source":"Crossref","is-referenced-by-count":4,"title":["Spike-RISC: Algorithm\/ISA Co-Optimization for Efficient SNNs on RISC-V"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4948-4945","authenticated-orcid":false,"given":"Ipek","family":"Akdeniz","sequence":"first","affiliation":[{"name":"Technical University of Munich, TUM School of Computation, Information and Technology, Chair of AI Processor Design, Munich Institute of Robotics and Machine Intelligence, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6078-8640","authenticated-orcid":false,"given":"Sandy A.","family":"Wasif","sequence":"additional","affiliation":[{"name":"Technical University of Munich, TUM School of Computation, Information and Technology, Chair of AI Processor Design, Munich Institute of Robotics and Machine Intelligence, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7175-7284","authenticated-orcid":false,"given":"Paul R.","family":"Genssler","sequence":"additional","affiliation":[{"name":"Technical University of Munich, TUM School of Computation, Information and Technology, Chair of AI Processor Design, Munich Institute of Robotics and Machine Intelligence, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5649-3102","authenticated-orcid":false,"given":"Hussam","family":"Amrouch","sequence":"additional","affiliation":[{"name":"Technical University of Munich, TUM School of Computation, Information and Technology, Chair of AI Processor Design, Munich Institute of Robotics and Machine Intelligence, Munich, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.aacl-main.46"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejmp.2021.02.006"},{"key":"ref3","first-page":"10","article-title":"Edge ai: A survey","volume":"3","author":"Zhou","year":"2023","journal-title":"Internet Things Cyber-Phys. Syst."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.4613"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2021.1885312"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2018.8573514"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2023.3308088"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58526-6_24"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3389\/fncom.2021.658764"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13534-024-00404-0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-32120-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/newcas52662.2022.9842251"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2019.2925391"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2022.795876"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/0471733520"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13152963"},{"issue":"2","key":"ref17","doi-asserted-by":"crossref","first-page":"401","DOI":"10.3390\/electronics12020401","article-title":"ASIPAMPIUM: An efficient ASIP generator for low power applications","volume":"12","author":"Engroff","year":"2023","journal-title":"Electronics"},{"issue":"3","key":"ref18","first-page":"851","article-title":"ASIP for 5G and beyond: Opportunities and vision","volume":"68","author":"Shahabuddin","year":"2021","journal-title":"IEEE Trans. Circuits Syst. II, Exp. Briefs"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.367"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICVD.2001.902643"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17329"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCSoC64144.2024.00074"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747906"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/brainsci12070863"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2023.1266003"},{"key":"ref26","article-title":"A spike learning system for event-driven object recognition","author":"Zhou","year":"2022","journal-title":"arXiv:2101.08850"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2008.12-07-680"},{"key":"ref28","first-page":"620","article-title":"Recherches quantitatives sur l\u2019excitation lectrique des nerfs traite comme une polarisation","volume":"9","author":"Lapicque","year":"1907","journal-title":"J. De Physiol. Et De Pathol. Gnrale"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.781"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2015.00437"},{"key":"ref31","article-title":"Spikepoint: An efficient point-based spiking neural network for event cameras action recognition","volume-title":"Proc. 12th Int. Conf. Learn. Represent.","author":"Ren"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2014.2313565"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.112130359"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2474396"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2304638"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2023.3279349"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2022.3196839"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI54635.2022.00016"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2024.3472293"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01357"},{"key":"ref41","volume-title":"Tonic: A Library for Neuromorphic Data","author":"Library","year":"2023"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/s21186143"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2016.00508"},{"key":"ref44","article-title":"Improving neural networks by preventing co-adaptation of feature detectors","author":"Hinton","year":"2012","journal-title":"arXiv:1207.0580"},{"key":"ref45","volume-title":"Asip Designer","year":"2025"},{"key":"ref46","volume-title":"Vcs","year":"2025"},{"key":"ref47","volume-title":"Fusion Compiler","year":"2025"},{"key":"ref48","volume-title":"Synopsys Asip Designer","year":"2024"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2819366"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF56349.2022.10051957"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2024.3511676"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2024.3450966"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MAPR53640.2021.9585245"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11028132.pdf?arnumber=11028132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T05:32:40Z","timestamp":1750829560000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11028132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3577946","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}