{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:55:41Z","timestamp":1730303741277,"version":"3.28.0"},"reference-count":62,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/vts.2019.8758649","type":"proceedings-article","created":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T23:56:14Z","timestamp":1562889374000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["Special Session: Does Approximation Make Testing Harder (or Easier)?"],"prefix":"10.1109","author":[{"given":"R. Iris","family":"Bahar","sequence":"first","affiliation":[]},{"given":"Ulya","family":"Karpuzcu","sequence":"additional","affiliation":[]},{"given":"Sasa","family":"Misailovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2017.7863739"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806808"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346196"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908087"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763153"},{"key":"ref30","article-title":"On Approximate Speculative Lock Elision","author":"khatamifard","year":"2017","journal-title":"IEEE Transactions on Multiscale Computing Systems Special Issue on Emerging Technologies and Architectures for Manycore Computing"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660231"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2008.4636089"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.22"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/2808704.2754959","article-title":"Clover: Compiler directed lightweight soft error resilience","volume":"50","author":"liu","year":"2015","journal-title":"ACM SIGPLAN Notices"},{"key":"ref60","first-page":"43","article-title":"Videochef: efficient approximation for streaming video processing pipelines","author":"xu","year":"2018","journal-title":"2018 USENIX Annual Technical Conference ( USENIX ATC 18)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.043191123"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1640443.1640448"},{"key":"ref28","article-title":"Statistical algorithmic profiling for randomized approximate programs","author":"joshi","year":"2019","journal-title":"ICSE"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950390"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835977"},{"key":"ref2","article-title":"On Quantification of Accuracy Loss in Approximate Computing","author":"akturk","year":"2015","journal-title":"Proc 12th Annu Workshop Duplicating Deconstructing Debunking"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814314"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254120"},{"journal-title":"Shoestring Probabilistic soft error reliability on the cheap","year":"2010","author":"feng","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/173682.165164"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263960"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1837853.1693507"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815403"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27813-9_16"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025133"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2015.2505723"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1995.524546"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2017.8091090"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2000675"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744805"},{"key":"ref53","article-title":"Parboil: A Revised Benchmark Suite for Scientific and Commercial Throughput Computing","author":"stratton","year":"2012","journal-title":"University of Illinois at Urbana-Champaign"},{"key":"ref52","article-title":"Exploiting errors for efficiency: A survey from circuits to algorithms","volume":"abs 1809 5859","author":"stanley-marbell","year":"2018","journal-title":"CoRR"},{"key":"ref10","first-page":"194","article-title":"A 45nm resilient microprocessor core for dynamic variation tolerance","volume":"46","author":"bowman","year":"2011","journal-title":"JSSC"},{"key":"ref11","article-title":"Hardware That Produces Bounded Rather Than Exact Resuits","author":"breuer","year":"2010","journal-title":"Design Automation Conference (DAC)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2017.2758679"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509546"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254086"},{"journal-title":"Proceedings of the ACM SIGPLAN 2013 workshop on Partial evnluation and program manipulation","article-title":"Verified integrity properties for safe approximate program transformations","year":"2013","key":"ref14"},{"key":"ref15","article-title":"Best-effort Computing: Rethinking Parallel Software and Hardware","author":"chakradhar","year":"2010","journal-title":"Design Automation Con-terence (DAC"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2009.5306797"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837411"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2011.2179038"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816026"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3017991"},{"key":"ref3","article-title":"Decoupling Control and Data Processing for Approximate Near-threshold Voltage Computing","author":"akturk","year":"2015","journal-title":"IEEE Micro Special Issue on Heterogeneous Computing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806620"},{"key":"ref5","article-title":"AISC: Approximate Instruction Set Computer","author":"ferrer\u00f3n","year":"2018","journal-title":"Workshop on Approximate Computing in conjunction with ASPLOS"},{"key":"ref8","article-title":"The PARSEC Benchmark Suite: Characterization and Architectural Implications","author":"bienia","year":"2008","journal-title":"Princeton University"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3145812"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993518"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3276533"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2414729.2414737"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.21"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297055"},{"key":"ref47","article-title":"Parallel Synchronization-Free Approximate Data Structure Construction","author":"rinard","year":"2013","journal-title":"The 5th USENIX Workshop on Hot Topics in Parallelism"},{"key":"ref42","article-title":"Ig-noretm: Opportunistically ignoring timing violations for energy savings using htm","author":"papagiannopoulou","year":"2019","journal-title":"Proc IEEE Design Automation and Test in Europe (DATE"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2006.302743"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.34"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3126556"}],"event":{"name":"2019 IEEE 37th VLSI Test Symposium (VTS)","start":{"date-parts":[[2019,4,23]]},"location":"Monterey, CA, USA","end":{"date-parts":[[2019,4,25]]}},"container-title":["2019 IEEE 37th VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8753115\/8758605\/08758649.pdf?arnumber=8758649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:49:21Z","timestamp":1658155761000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8758649\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/vts.2019.8758649","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}