{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:58:06Z","timestamp":1725710286012},"reference-count":68,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/dsn.2018.00067","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T23:02:56Z","timestamp":1532386976000},"page":"598-609","source":"Crossref","is-referenced-by-count":8,"title":["Impact of Software Approximations on the Resiliency of a Video Summarization System"],"prefix":"10.1109","author":[{"given":"Radha","family":"Venkatagiri","sequence":"first","affiliation":[]},{"given":"Karthik","family":"Swaminathan","sequence":"additional","affiliation":[]},{"given":"Chung-Ching","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Alper","family":"Buyuktosunoglu","sequence":"additional","affiliation":[]},{"given":"Pradip","family":"Bose","sequence":"additional","affiliation":[]},{"given":"Sarita","family":"Adve","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000089"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176660"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2015.7357189"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995586"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2008.4751886"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2009.4798242"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346315"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.18"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630072"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575353"},{"key":"ref61","article-title":"mSWAT: Low-Cost Hardware Fault Detection and Diagnosis for Multicore Systems","author":"hari","year":"2009","journal-title":"Micro"},{"journal-title":"Image Alignment and Stitching A Tutorial","year":"2004","author":"szeliski","key":"ref63"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2005.104"},{"key":"ref64","article-title":"Mosaic evaluation: An efficient and robust method based on maximum information retrieval","author":"rane","year":"2013","journal-title":"Int J Computer Applications"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2015.2394515"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.5772\/56534"},{"key":"ref66","article-title":"Application and evaluation of spatio-temporal enhancement of live aerial video using temporally local mosaics","author":"morse","year":"2008","journal-title":"CVPR"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_34"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02230-2_48"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6115723"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3641638"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416652"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2012.48"},{"key":"ref21","first-page":"115","article-title":"Architecting processors to allow volt-age\/reliability tradeoffs","author":"sartori","year":"2011","journal-title":"Intl Conf Compilers Architectures & Synthesis Embedded Systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950391"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1145\/2830772.2830790","article-title":"Doppel-ganger: A cache for approximate computing","author":"san miguel","year":"2015","journal-title":"International Symposium on Microarchitecture (MICRO)"},{"key":"ref26","article-title":"A case for approximate computing in real-time mobile cognition","author":"swaminathan","year":"2015","journal-title":"Workshop on Approximate Computing Across the System Stack (WACAS)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593667"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1990.89371"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028924"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346315"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630067"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.15"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.88"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.18"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253181"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311877"},{"key":"ref52","article-title":"Soft Error Sensitivity Characterization for Microprocessor Dependability Enhancement Strategy","author":"kim","year":"2002","journal-title":"DSN"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2232647"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.16"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150990"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872402"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509546"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2714064.2660231"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786807"},{"key":"ref16","article-title":"Accept: A programmer-guided compiler framework for practical approximate computing","author":"sampson","year":"2015","journal-title":"Technical Report UW-CSE-J5&#x2013;01-01 University of Washington"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993518"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814301"},{"key":"ref19","article-title":"Expax: A framework for automating approximate programming","author":"park","year":"2014","journal-title":"Technical report Georgia Institute of Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2015.7273519"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2015.7357187"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2013.6569370"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806620"},{"key":"ref7","first-page":"124","article-title":"Managing performance vs. accuracy trade-offs with loop perforation","author":"sidiroglou-douskos","year":"2011","journal-title":"SIGSOFT FSE"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1147\/rd.401.0003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540711"},{"key":"ref46","first-page":"1","article-title":"Approxi-lyzer: Towards a systematic framework for instruction-level approximate computing and its application to hardware resiliency","author":"venkatagiri","year":"2016","journal-title":"International Symposium on Microarchitecture (MICRO)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2014.2365204"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575353"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2597809.2597812"},{"journal-title":"Open Source Computer Vision Library (OpenCV)","year":"2015","key":"ref42"},{"journal-title":"Perf Linux Profiling with Performance Counters","year":"0","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2654251"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831713"}],"event":{"name":"2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2018,6,25]]},"location":"Luxembourg City","end":{"date-parts":[[2018,6,28]]}},"container-title":["2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8415926\/8415932\/08416519.pdf?arnumber=8416519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T05:29:31Z","timestamp":1571635771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8416519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/dsn.2018.00067","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}