{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T13:42:58Z","timestamp":1769262178567,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Indian Institute of Technology (IIT), Hyderabad"},{"DOI":"10.13039\/501100001849","name":"Defence Research and Development Organisation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001849","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Defence, Government of India"},{"name":"Tools and Hardware through the Ministry of Electronics and Information Technology"},{"name":"Government of India"},{"name":"IIT Jodhpur through Science and Engineering Research Board"},{"name":"Government of India","award":["SRG\/2023\/002383"],"award-info":[{"award-number":["SRG\/2023\/002383"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tetci.2025.3579707","type":"journal-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T14:25:31Z","timestamp":1750861531000},"page":"412-424","source":"Crossref","is-referenced-by-count":0,"title":["EdgeNet: Empowering Edge Device Performance by Leveraging Clustered Networks for Optimal Memory Management With Platform-Awareness"],"prefix":"10.1109","volume":"10","author":[{"given":"Pratibha","family":"Verma","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Indian Institute of Technology, Hyderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0576-8014","authenticated-orcid":false,"given":"Chandrajit","family":"Pal","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Indian Institute of Technology, Hyderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0111-2509","authenticated-orcid":false,"given":"Pradip","family":"Sasmal","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Indian Institute of Technology, Jodhpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8200-216X","authenticated-orcid":false,"given":"K. Z.","family":"Najiya","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Indian Institute of Technology, Hyderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5636-0676","authenticated-orcid":false,"given":"Amit","family":"Acharyya","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Indian Institute of Technology, Hyderabad, Telangana, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref2","article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"Proc. 3rd Int. Conf. Learn. Representations","author":"Simonyan","year":"2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"ref4","first-page":"2493","article-title":"Natural language processing (almost) from scratch","volume-title":"J. Mach. Learn. Res.","volume":"12","author":"Collobert","year":"2011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021741"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21931"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2825145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001163"},{"key":"ref9","article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and Huffman coding","volume-title":"Proc. 4th Int. Conf. Learn. Representations","author":"Han","year":"2016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09816-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3623402"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3182659"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NEWCAS52662.2022.9842117"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01249-6_18"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.686"},{"key":"ref16","first-page":"2148","article-title":"Predicting parameters in deep learning","volume-title":"Proc. 27th Int. Conf. Neural Inf. Process. Syst.","author":"Denil","year":"2013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"issue":"2011","key":"ref18","first-page":"1","article-title":"Improving the speed of neural networks on CPUs","volume-title":"Proc. Deep Learn. Unsupervised Feature Learn. NIPS Workshop","volume":"1","author":"Vanhoucke","year":"2011"},{"key":"ref19","article-title":"Compressing deep convolutional networks using vector quantization","author":"Gong","year":"2014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SiPS.2014.6986082"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178146"},{"key":"ref22","first-page":"1269","article-title":"Exploiting linear structure within convolutional networks for efficient evaluation","volume-title":"Proc. 28th Int. Conf. Neural Inf. Process. Syst.","author":"Denton","year":"2014"},{"key":"ref23","first-page":"1135","article-title":"Learning both weights and connections for efficient neural network","volume-title":"Proc. 29th Int. Conf. Neural Inf. Process. Syst.","author":"Han","year":"2015"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3214528"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2023.3337369"},{"key":"ref26","article-title":"Network in network","volume-title":"Proc. 3rd Int. Conf. Learn. Representations","author":"Lin","year":"2015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3134930"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01330"},{"key":"ref30","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref32","first-page":"107","article-title":"Skeletonization: A technique for trimming the fat from a network via relevance assessment","volume-title":"Proc. 2nd Int. Conf. Neural Inf. Process. Syst.","author":"Mozer","year":"1988"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00171"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/computers12030060"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.643"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2017.8335698"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2616357"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2023.3336831"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"ref40","first-page":"6849","article-title":"DepthShrinker: A new compression paradigm towards boosting real-hardware efficiency of compact neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Fu","year":"2022"},{"key":"ref41","first-page":"23825","article-title":"LayerMerge: Neural network depth compression through layer pruning and merging","volume-title":"Proc. 41st Int. Conf. Mach. Learn.","volume":"235","author":"Kim","year":"2024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19800-7_6"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC62300.2024.10737722"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS61496.2024.10849059"},{"key":"ref45","first-page":"854","article-title":"Parseval networks: Improving robustness to adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Cisse","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-020-05929-w"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SAUPEC\/RobMech\/PRASA48453.2020.9041096"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7433297\/11361307\/11050919.pdf?arnumber=11050919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T21:01:28Z","timestamp":1769202088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11050919\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":47,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2025.3579707","relation":{},"ISSN":["2471-285X"],"issn-type":[{"value":"2471-285X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}