{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:31:17Z","timestamp":1774801877277,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T00:00:00Z","timestamp":1307145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,4]]},"DOI":"10.1145\/1993498.1993518","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T07:53:52Z","timestamp":1307346832000},"page":"164-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":381,"title":["EnerJ"],"prefix":"10.1145","author":[{"given":"Adrian","family":"Sampson","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Werner","family":"Dietl","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Emily","family":"Fortuna","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Danushen","family":"Gnanapragasam","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Luis","family":"Ceze","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Dan","family":"Grossman","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"MIT","author":"Agarwal A.","year":"2009","unstructured":"A. Agarwal , M. Rinard , S. Sidiroglou , S. Misailovic , and H. Hoffmann . Using code perforation to improve performance, reduce energy consumption, and respond to failures. Technical report , MIT , 2009 . A. Agarwal, M. Rinard, S. Sidiroglou, S. Misailovic, and H. Hoffmann. Using code perforation to improve performance, reduce energy consumption, and respond to failures. Technical report, MIT, 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11957-6_5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806620"},{"key":"e_1_3_2_1_4_1","volume-title":"MIT","author":"Bhalodia V.","year":"2005","unstructured":"V. Bhalodia . SCALE DRAM subsystem power analysis. Master's thesis , MIT , 2005 . V. Bhalodia. SCALE DRAM subsystem power analysis. Master's thesis, MIT, 2005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/339647.339657"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX","author":"Carroll A.","year":"2010","unstructured":"A. Carroll and G. Heiser . An analysis of power consumption in a smartphone . In USENIX , 2010 . A. Carroll and G. Heiser. An analysis of power consumption in a smartphone. In USENIX, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040294.1040301"},{"key":"e_1_3_2_1_8_1","volume-title":"SELSE","author":"de Kruijf M.","year":"2009","unstructured":"M. de Kruijf and K. Sankaralingam . Exploring the synergy of emerging workloads and silicon reliability trends . In SELSE , 2009 . M. de Kruijf and K. Sankaralingam. Exploring the synergy of emerging workloads and silicon reliability trends. In SELSE, 2009."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816026"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956571"},{"key":"e_1_3_2_1_11_1","volume-title":"Type Annotations specification (JSR 308). http: \/\/types.cs.washington.edu\/jsr308\/","author":"Ernst M. D.","year":"2008","unstructured":"M. D. Ernst . Type Annotations specification (JSR 308). http: \/\/types.cs.washington.edu\/jsr308\/ , 2008 . M. D. Ernst. Type Annotations specification (JSR 308). http: \/\/types.cs.washington.edu\/jsr308\/, 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250665"},{"key":"e_1_3_2_1_13_1","volume-title":"ISCA","author":"Flautner K.","year":"2002","unstructured":"K. Flautner , N. S. Kim , S. Martin , D. Blaauw , and T. Mudge . Drowsy caches: simple techniques for reducing leakage power . In ISCA , 2002 . K. Flautner, N. S. Kim, S. Martin, D. Blaauw, and T. Mudge. Drowsy caches: simple techniques for reducing leakage power. In ISCA, 2002."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301665"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.38"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/503502.503505"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416652"},{"key":"e_1_3_2_1_19_1","volume-title":"DATE","author":"Leem L.","year":"2010","unstructured":"L. Leem , H. Cho , J. Bau , Q. A. Jacobson , and S. Mitra . ERSA: error resilient system architecture for probabilistic applications . In DATE , 2010 . L. Leem, H. Cho, J. Bau, Q. A. Jacobson, and S. Mitra. ERSA: error resilient system architecture for probabilistic applications. In DATE, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669172"},{"key":"e_1_3_2_1_21_1","volume-title":"ASGI","author":"Li X.","year":"2006","unstructured":"X. Li and D. Yeung . Exploiting soft computing for increased fault tolerance . In ASGI , 2006 . X. Li and D. Yeung. Exploiting soft computing for increased fault tolerance. In ASGI, 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346196"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950391"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11574859_12"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806808"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/871506.871577"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390656"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69166-2_22"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250741"},{"key":"e_1_3_2_1_31_1","volume-title":"Onward!","author":"Rinard M.","year":"2010","unstructured":"M. Rinard , H. Hoffmann , S. Misailovic , and S. Sidiroglou . Patterns and statistical analysis for understanding reduced resource computing . In Onward! , 2010 . M. Rinard, H. Hoffmann, S. Misailovic, and S. Sidiroglou. Patterns and statistical analysis for understanding reduced resource computing. In Onward!, 2010."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/92.845894"},{"key":"e_1_3_2_1_35_1","volume-title":"SELSE","author":"Wong V.","year":"2006","unstructured":"V. Wong and M. Horowitz . Soft error resilience of probabilistic inference applications . In SELSE , 2006 . V. Wong and M. Horowitz. Soft error resilience of probabilistic inference applications. In SELSE, 2006."}],"event":{"name":"PLDI '11: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"San Jose California USA","acronym":"PLDI '11","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993498.1993518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:05:46Z","timestamp":1750230346000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993518"}},"subtitle":["approximate data types for safe and general low-power computation"],"short-title":[],"issued":{"date-parts":[[2011,6,4]]},"references-count":33,"alternative-id":["10.1145\/1993498.1993518","10.1145\/1993498"],"URL":"https:\/\/doi.org\/10.1145\/1993498.1993518","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1993316.1993518","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2011,6,4]]},"assertion":[{"value":"2011-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}