{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:04:24Z","timestamp":1764183864932,"version":"3.46.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["SHF-1901192,CCF-1936794,CCF-2324645,CCF-2311544,CCF-1953980,CCF-2131946,CCF-1901165,CNS-2321224,CNS-2321225"],"award-info":[{"award-number":["SHF-1901192,CCF-1936794,CCF-2324645,CCF-2311544,CCF-1953980,CCF-2131946,CCF-1901165,CNS-2321224,CNS-2321225"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,21]]},"DOI":"10.1109\/dft66274.2025.11257575","type":"proceedings-article","created":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T18:27:02Z","timestamp":1764095222000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Algorithmic Strategies for Sustainable Reuse of Neural Network Accelerators with Permanent Faults"],"prefix":"10.1109","author":[{"given":"Youssef Ait","family":"Alama","sequence":"first","affiliation":[{"name":"University of North Carolina at Charlotte"}]},{"given":"Sampada","family":"Sakpal","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte"}]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte"}]},{"given":"Razvan","family":"Bunescu","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte"}]},{"given":"Avinash","family":"Karanth","sequence":"additional","affiliation":[{"name":"Ohio University"}]},{"given":"Ahmed","family":"Louri","sequence":"additional","affiliation":[{"name":"The George Washington University"}]}],"member":"263","reference":[{"volume-title":"Training in turmoil: Silent data corruption in systems at scale","year":"2021","author":"Bonderson","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS52814.2021.9486694"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00018"},{"volume-title":"Detecting silent data corruptions in the wild","year":"2022","author":"Dixit","key":"ref4"},{"volume-title":"An image is worth 16x16 words: Transformers for image recognition at scale","year":"2021","author":"Dosovitskiy","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2006.22"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589105"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465297"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2016.01.067"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714869"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/157485.164617"},{"journal-title":"A study of bfloat16 for deep learning training","year":"2019","author":"Kalamkar","key":"ref12"},{"key":"ref13","article-title":"ImageNet Classification with Deep Convolutional Neural Networks","volume":"25","author":"Krizhevsky","year":"2012","journal-title":"NeurIPS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.1984.5005689"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126964"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-Asia.2019.00039"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.1998.743358"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56258-2_18"},{"article-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition","volume-title":"International Conference of Learning Representations (ICLR)","author":"Simonyan","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2017.24"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322274"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2019.00-23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2018.8368656"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2018.8693202"}],"event":{"name":"2025 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","start":{"date-parts":[[2025,10,21]]},"location":"Barcelona, Spain","end":{"date-parts":[[2025,10,23]]}},"container-title":["2025 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11253546\/11257433\/11257575.pdf?arnumber=11257575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:00:33Z","timestamp":1764183633000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11257575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,21]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dft66274.2025.11257575","relation":{},"subject":[],"published":{"date-parts":[[2025,10,21]]}}}