{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:42Z","timestamp":1763468262089,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1253867"],"award-info":[{"award-number":["1253867"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["2014-EP-2577"],"award-info":[{"award-number":["2014-EP-2577"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005144","name":"Qualcomm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,30]]},"DOI":"10.1145\/2786805.2786807","type":"proceedings-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T16:48:13Z","timestamp":1440607693000},"page":"745-757","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["FlexJava: language support for safe and modular approximate programming"],"prefix":"10.1145","author":[{"given":"Jongse","family":"Park","sequence":"first","affiliation":[{"name":"Georgia Tech, USA"}]},{"given":"Hadi","family":"Esmaeilzadeh","sequence":"additional","affiliation":[{"name":"Georgia Tech, USA"}]},{"given":"Xin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Georgia Tech, USA"}]},{"given":"Mayur","family":"Naik","sequence":"additional","affiliation":[{"name":"Georgia Tech, USA"}]},{"given":"William","family":"Harris","sequence":"additional","affiliation":[{"name":"Georgia Tech, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/567067.567085"},{"key":"e_1_3_2_1_2_1","volume-title":"ISCA","author":"Amant R. S.","year":"2014","unstructured":"R. S. Amant , A. Yazdanbakhsh , J. Park , B. Thwaites , H. Esmaeilzadeh , A. Hassibi , L. Ceze , and D. Burger . General-purpose code acceleration with limited-precision analog computation . In ISCA , 2014 . R. S. Amant, A. Yazdanbakhsh, J. Park, B. Thwaites, H. Esmaeilzadeh, A. Hassibi, L. Ceze, and D. Burger. General-purpose code acceleration with limited-precision analog computation. In ISCA, 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806620"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/567752.567756"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541958"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509546"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263735"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1816038.1816026"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/207110.207119"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000108"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151008"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2012.48"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2589750"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.121"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2014698.2014884"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056067"},{"key":"e_1_3_2_1_17_1","volume-title":"DATE","author":"Leem L.","year":"2010","unstructured":"L. Leem , H. Cho , J. Bau , Q. Jacobson , and S. Mitra . ERSA: error resilient system architecture for probabilistic applications . In DATE , 2010 . L. Leem, H. Cho, J. Bau, Q. Jacobson, and S. Mitra. ERSA: error resilient system architecture for probabilistic applications. In DATE, 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669172"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660231"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806808"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056066"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.30"},{"key":"e_1_3_2_1_23_1","unstructured":"M. Naik. Chord. http:\/\/jchord.googlecode.com\/.  M. Naik. Chord. http:\/\/jchord.googlecode.com\/."},{"key":"e_1_3_2_1_24_1","volume-title":"DATE","author":"Narayanan S.","year":"2010","unstructured":"S. Narayanan , J. Sartori , R. Kumar , and D. Jones . Scalable stochastic processors . In DATE , 2010 . S. Narayanan, J. Sartori, R. Kumar, and D. Jones. Scalable stochastic processors. In DATE, 2010."},{"key":"e_1_3_2_1_25_1","volume-title":"Implementation of a fast artificial neural network library (fann). Technical report","author":"Nissen S.","year":"2003","unstructured":"S. Nissen . Implementation of a fast artificial neural network library (fann). Technical report , Department of Computer Science University of Copenhagen (DIKU) , 2003 . http:\/\/leenissen.dk\/fann\/wp. S. Nissen. Implementation of a fast artificial neural network library (fann). Technical report, Department of Computer Science University of Copenhagen (DIKU), 2003. http:\/\/leenissen.dk\/fann\/wp."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665678"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2654822.2541948"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540711"},{"key":"e_1_3_2_1_29_1","unstructured":"A. Sampson W. Dietl E. Fortuna D. Gnanapragasam L. Ceze and D. Grossman. EnerJ. http:\/\/sampa.cs.washington.edu\/research\/ approximation\/enerj.html.  A. Sampson W. Dietl E. Fortuna D. Gnanapragasam L. Ceze and D. Grossman. EnerJ. http:\/\/sampa.cs.washington.edu\/research\/ approximation\/enerj.html."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993518"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594294"},{"key":"e_1_3_2_1_32_1","volume-title":"SAS","author":"Sidiroglou S.","year":"2011","unstructured":"S. Sidiroglou , S. Misailovic , H. Hoffman , and M. Rinard . Probabilistically accurate program transformations . In SAS , 2011 . S. Sidiroglou, S. Misailovic, H. Hoffman, and M. Rinard. Probabilistically accurate program transformations. In SAS, 2011."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025133"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628071.2628110"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540710"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736044"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155640"},{"issue":"166","key":"e_1_3_2_1_38_1","article-title":"Bits and bytes masquerading as machines","volume":"2008","author":"Watson J.","year":"2008","unstructured":"J. Watson . Virtualbox : Bits and bytes masquerading as machines . Linux J. , 2008 ( 166 ), Feb. 2008 . J. Watson. Virtualbox: Bits and bytes masquerading as machines. Linux J., 2008(166), Feb. 2008.","journal-title":"Linux J."},{"key":"e_1_3_2_1_39_1","volume-title":"DATE","author":"Yazdanbakhsh A.","year":"2015","unstructured":"A. Yazdanbakhsh , D. Mahajan , B. Thwaites , J. Park , A. Nagendrakumar , S. Sethuraman , K. Ramkrishnan , N. Ravindran , R. Jariwala , A. Rahimi , H. Esmailzadeh , and K. Bazargan . Axilog: Language support for approximate hardware design . In DATE , 2015 . A. Yazdanbakhsh, D. Mahajan, B. Thwaites, J. Park, A. Nagendrakumar, S. Sethuraman, K. Ramkrishnan, N. Ravindran, R. Jariwala, A. Rahimi, H. Esmailzadeh, and K. Bazargan. Axilog: Language support for approximate hardware design. In DATE, 2015."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462185"}],"event":{"name":"ESEC\/FSE'15: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Bergamo Italy","acronym":"ESEC\/FSE'15"},"container-title":["Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786807","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2786805.2786807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:21Z","timestamp":1750227381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":40,"alternative-id":["10.1145\/2786805.2786807","10.1145\/2786805"],"URL":"https:\/\/doi.org\/10.1145\/2786805.2786807","relation":{},"subject":[],"published":{"date-parts":[[2015,8,30]]},"assertion":[{"value":"2015-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}