{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:00:10Z","timestamp":1740132010537,"version":"3.37.3"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Air Force Research Laboratory (AFRL) and Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8650-18-2-7860"],"award-info":[{"award-number":["FA8650-18-2-7860"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tcad.2024.3445815","type":"journal-article","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T18:40:50Z","timestamp":1730918450000},"page":"4202-4213","source":"Crossref","is-referenced-by-count":0,"title":["Runtime Monitoring of ML-Based Scheduling Algorithms Toward Robust Domain-Specific SoCs"],"prefix":"10.1109","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8679-9842","authenticated-orcid":false,"given":"A. Alper","family":"Goksoy","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Wisconsin-Madison, Madison, WI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8585-9241","authenticated-orcid":false,"given":"Alish","family":"Kanani","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Satrajit","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"Research Division, Kepler AI, Palo Alto, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5045-5535","authenticated-orcid":false,"given":"Umit","family":"Ogras","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Wisconsin-Madison, Madison, WI, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3282307"},{"key":"ref2","first-page":"1","article-title":"Heterogeneous integration at DARPA: Pathfinding and progress in assembly approaches","volume-title":"Proc. 68th IEEE ECTC","author":"Green"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3358203"},{"issue":"2","key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3529257","article-title":"CEDR: A compiler-integrated, extensible DSSoC runtime","volume":"22","author":"Mack","year":"2022","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(75)80008-0"},{"volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","year":"1979","author":"Garey","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342080"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04118-8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012861"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3012509"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2020.2992182"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00046"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_15"},{"key":"ref15","first-page":"1","article-title":"Energy-based out-of-distribution detection","volume-title":"Proc. 34th Conf. Neural Inf. Process. Syst.","author":"Liu"},{"volume-title":"Jetson xavier NX developer kit","year":"2024","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012169"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18656-2_6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3476982"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3197489"},{"issue":"184","key":"ref21","first-page":"4","article-title":"Completely fair scheduler","volume":"2009","author":"Pabla","year":"2009","journal-title":"Linux J."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.11.019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/0218016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/71.993206"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/71.503776"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2004.1303065"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-009-0119-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.57"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2010.56"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89982-2_41"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/socdc.2008.4815591"},{"volume-title":"Handbook of Constraint Programming","year":"2006","author":"Rossi","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00201"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3609108"},{"key":"ref35","first-page":"2430","article-title":"Device placement optimization with reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mirhoseini"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2014.7116910"},{"key":"ref37","first-page":"77","article-title":"Matchmaker: Data drift mitigation in machine learning for large-scale systems","volume-title":"Proc. Mach. Learn. Syst.","author":"Mallick"},{"key":"ref38","article-title":"Detection of data drift and outliers affecting machine learning model performance over time","author":"Ackerman","year":"2020","journal-title":"arXiv:2012.09258"},{"key":"ref39","first-page":"2327","article-title":"CADE: Detecting and explaining concept drift samples for security applications","volume-title":"Proc. 30th USENIX Security Symp. (USENIX Security)","author":"Yang"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939836"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10283"},{"key":"ref42","first-page":"1","article-title":"Evaluating robustness of neural networks with mixed integer programming","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Tjeng"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2006.311868"},{"key":"ref44","article-title":"On the generalization mystery in deep learning","author":"Chatterjee","year":"2022","journal-title":"arXiv:2203.10036"},{"key":"ref45","first-page":"1","article-title":"SGD on neural networks learns functions of increasing complexity","volume-title":"Proc. 33rd Conf. Neural Inf. Process. Syst.","author":"Kalimeris"},{"key":"ref46","article-title":"Stiffness: A new perspective on generalization in neural networks","author":"Fort","year":"2019","journal-title":"arXiv:1901.09491"},{"key":"ref47","first-page":"1","article-title":"Coherent gradients: An approach to understanding Generalization in gradient descent-based optimization","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Chatterjee"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/687"},{"key":"ref49","first-page":"627","article-title":"A reduction of imitation learning and structured prediction to no-regret online learning","volume-title":"Proc. 14th Int. Conf. Artif. Intell. Statist.","author":"Ross"},{"key":"ref50","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv:1707.06347"},{"volume-title":"Cross entropy loss","year":"2024","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2010.35"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2700726"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2446205"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.042"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2986963"},{"volume-title":"DS3 simulator","year":"2024","key":"ref57"},{"volume-title":"ODROID-XU3.","year":"2014","key":"ref58"},{"volume-title":"Zynq ZCU102 evaluation kit","year":"2024","key":"ref59"},{"volume-title":"OpenAI gym","year":"2016","author":"Brockman","key":"ref60"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/43\/10745760\/10745816.pdf?arnumber=10745816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T13:57:50Z","timestamp":1732715870000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10745816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":60,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2024.3445815","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}