{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:30:37Z","timestamp":1764174637765,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T00:00:00Z","timestamp":1532304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,23]]},"DOI":"10.1145\/3218603.3218643","type":"proceedings-article","created":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T20:59:18Z","timestamp":1550609958000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["AxTrain"],"prefix":"10.1145","author":[{"given":"Xin","family":"He","sequence":"first","affiliation":[{"name":"Washington University in St. Louis"}]},{"given":"Liu","family":"Ke","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis"}]},{"given":"Wenyan","family":"Lu","sequence":"additional","affiliation":[{"name":"SKLCA, Institute of Computing Technology, Chinese Academy of Sciences"}]},{"given":"Guihai","family":"Yan","sequence":"additional","affiliation":[{"name":"SKLCA, Institute of Computing Technology, Chinese Academy of Sciences"}]},{"given":"Xuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis"}]}],"member":"320","published-online":{"date-parts":[[2018,7,23]]},"reference":[{"issue":"2","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Recognition, mining and synthesis moves computers to the era of tera","volume":"9","author":"Dubey P.","year":"2005","unstructured":"P. Dubey , \" Recognition, mining and synthesis moves computers to the era of tera ,\" Technology@ Intel Magazine , vol. 9 , no. 2 , pp. 1 -- 10 , 2005 . P. Dubey, \"Recognition, mining and synthesis moves computers to the era of tera,\" Technology@ Intel Magazine, vol. 9, no. 2, pp. 1--10, 2005.","journal-title":"Technology@ Intel Magazine"},{"key":"e_1_3_2_1_2_1","first-page":"770","volume-title":"Deep residual learning for image recognition,\" in In CVPR","author":"He K","year":"2016","unstructured":"K He , , \" Deep residual learning for image recognition,\" in In CVPR , pp. 770 -- 778 , 2016 . K He, et al, \"Deep residual learning for image recognition,\" in In CVPR, pp. 770--778, 2016."},{"key":"e_1_3_2_1_3_1","unstructured":"I Hubara and M Courbariaux and D Soudry and R El-Yaniv and Y Bengio \"Binarized neural networks \" in NIPS 2016.   I Hubara and M Courbariaux and D Soudry and R El-Yaniv and Y Bengio \"Binarized neural networks \" in NIPS 2016."},{"key":"e_1_3_2_1_4_1","volume-title":"Deep Compression: Compressing Deep Neural Networks with Pruning, Trained Quantization and Huffman Coding,\" in ICLR","author":"Han S","year":"2016","unstructured":"S Han , , \" Deep Compression: Compressing Deep Neural Networks with Pruning, Trained Quantization and Huffman Coding,\" in ICLR , 2016 . S Han, et al, \"Deep Compression: Compressing Deep Neural Networks with Pruning, Trained Quantization and Huffman Coding,\" in ICLR, 2016."},{"issue":"3","key":"e_1_3_2_1_5_1","first-page":"152","article-title":"Exploiting the potential of computation reuse through approximate computing","volume":"3","author":"He X.","year":"2017","unstructured":"X. He , G. Yan , Y. Han , and X. Li , \" Exploiting the potential of computation reuse through approximate computing ,\" TMSCS , vol. 3 , no. 3 , pp. 152 -- 165 , 2017 . X. He, G. Yan, Y. Han, and X. Li, \"Exploiting the potential of computation reuse through approximate computing,\" TMSCS, vol. 3, no. 3, pp. 152--165, 2017.","journal-title":"TMSCS"},{"key":"e_1_3_2_1_6_1","first-page":"402","article-title":"ApproxEye: Enabling approximate computation reuse for microrobotic computer vision","author":"He X.","year":"2017","unstructured":"X. He , G. Yan , F. Sun , Y. Han , and X. Li , \" ApproxEye: Enabling approximate computation reuse for microrobotic computer vision ,\" in ASP-DAC , pp. 402 -- 407 , 2017 . X. He, G. Yan, F. Sun, Y. Han, and X. Li, \"ApproxEye: Enabling approximate computation reuse for microrobotic computer vision,\" in ASP-DAC, pp. 402--407, 2017.","journal-title":"ASP-DAC"},{"key":"e_1_3_2_1_7_1","first-page":"19","volume-title":"Accelerator-friendly neural-network training: Learning variations and defects in rram crossbar,\" in DATE","author":"Chen L","year":"2017","unstructured":"L Chen , , \" Accelerator-friendly neural-network training: Learning variations and defects in rram crossbar,\" in DATE , pp. 19 -- 24 , 2017 . L Chen, et al, \"Accelerator-friendly neural-network training: Learning variations and defects in rram crossbar,\" in DATE, pp. 19--24, 2017."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034764"},{"key":"e_1_3_2_1_9_1","first-page":"643","article-title":"ACR: Enabling computation reuse for approximate computing","author":"He X.","year":"2016","unstructured":"X. He , G. Yan , F. Sun , Y. Han , and X. Li , \" ACR: Enabling computation reuse for approximate computing ,\" in ASP-DAC , pp. 643 -- 648 , 2016 . X. He, G. Yan, F. Sun, Y. Han, and X. Li, \"ACR: Enabling computation reuse for approximate computing,\" in ASP-DAC, pp. 643--648, 2016.","journal-title":"ASP-DAC"},{"key":"e_1_3_2_1_10_1","first-page":"337","volume-title":"Enabling near-threshold voltage (ntv) operation in multi-vdd cache for power reduction,\" in ISCAS","author":"Han Y","year":"2013","unstructured":"Y Han , , \" Enabling near-threshold voltage (ntv) operation in multi-vdd cache for power reduction,\" in ISCAS , pp. 337 -- 340 , 2013 . Y Han, et al, \"Enabling near-threshold voltage (ntv) operation in multi-vdd cache for power reduction,\" in ISCAS, pp. 337--340, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.32"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"O. Temam \"A defect-tolerant accelerator for emerging high-performance applications \" in ISCA 2012.   O. Temam \"A defect-tolerant accelerator for emerging high-performance applications \" in ISCA 2012.","DOI":"10.1109\/ISCA.2012.6237031"},{"key":"e_1_3_2_1_13_1","first-page":"201","article-title":"Leveraging the error resilience of machine-learning applications for designing highly energy efficient accelerators","author":"Du Z","year":"2014","unstructured":"Z Du , , \" Leveraging the error resilience of machine-learning applications for designing highly energy efficient accelerators ,\" in ASP-DAC , pp. 201 -- 206 , 2014 . Z Du, et al, \"Leveraging the error resilience of machine-learning applications for designing highly energy efficient accelerators,\" in ASP-DAC, pp. 201--206, 2014.","journal-title":"ASP-DAC"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627369.2627613"},{"key":"e_1_3_2_1_15_1","first-page":"701","volume-title":"ApproxANN: an approximate computing framework for artificial neural network,\" in DATE","author":"Zhang Q","year":"2015","unstructured":"Q Zhang , , \" ApproxANN: an approximate computing framework for artificial neural network,\" in DATE , pp. 701 -- 706 , 2015 . Q Zhang, et al, \"ApproxANN: an approximate computing framework for artificial neural network,\" in DATE, pp. 701--706, 2015."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1994.6.1.147"},{"key":"e_1_3_2_1_17_1","first-page":"875","volume-title":"Generalization by Weight-Elimination with Application to Forecasting,\" in NIPS","author":"Weigend AS","year":"1991","unstructured":"AS Weigend , , \" Generalization by Weight-Elimination with Application to Forecasting,\" in NIPS , pp. 875 -- 882 , 1991 . AS Weigend, et al, \"Generalization by Weight-Elimination with Application to Forecasting,\" in NIPS, pp. 875--882, 1991."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.13"},{"key":"e_1_3_2_1_19_1","unstructured":"G. Hinton \"Neural networks for machine learning \" Coursera 2012.  G. Hinton \"Neural networks for machine learning \" Coursera 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"Estimating or propagating gradients through stochastic neurons for conditional computation,\" in arXiv preprint","author":"Bengio Y","year":"2013","unstructured":"Y Bengio , , \" Estimating or propagating gradients through stochastic neurons for conditional computation,\" in arXiv preprint , 2013 . Y Bengio, et al, \"Estimating or propagating gradients through stochastic neurons for conditional computation,\" in arXiv preprint, 2013."},{"key":"e_1_3_2_1_21_1","first-page":"553","volume-title":"FlexFlow: A Flexible Dataflow Accelerator Architecture for Convolutional Neural Networks,\" in HPCA","author":"Lu W.","year":"2017","unstructured":"W. Lu , , \" FlexFlow: A Flexible Dataflow Accelerator Architecture for Convolutional Neural Networks,\" in HPCA , pp. 553 -- 564 , 2017 . W. Lu, et al, \"FlexFlow: A Flexible Dataflow Accelerator Architecture for Convolutional Neural Networks,\" in HPCA, pp. 553--564, 2017."},{"key":"e_1_3_2_1_22_1","first-page":"418","volume-title":"DRUM: A dynamic range unbiased multiplier for approximate applications,\" in ICCAD","author":"Hashemi S","year":"2015","unstructured":"S Hashemi , , \" DRUM: A dynamic range unbiased multiplier for approximate applications,\" in ICCAD , pp. 418 -- 425 , 2015 . S Hashemi, et al, \"DRUM: A dynamic range unbiased multiplier for approximate applications,\" in ICCAD, pp. 418--425, 2015."},{"key":"e_1_3_2_1_23_1","first-page":"694","volume-title":"CACTI-P: Architecture-level modeling for SRAM-based structures with advanced leakage reduction techniques,\" in ICCAD","author":"Li S.","year":"2011","unstructured":"S. Li , , \" CACTI-P: Architecture-level modeling for SRAM-based structures with advanced leakage reduction techniques,\" in ICCAD , pp. 694 -- 701 , 2011 . S. Li, et al, \"CACTI-P: Architecture-level modeling for SRAM-based structures with advanced leakage reduction techniques,\" in ICCAD, pp. 694--701, 2011."}],"event":{"name":"ISLPED '18: International Symposium on Low Power Electronics and Design","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS"],"location":"Seattle WA USA","acronym":"ISLPED '18"},"container-title":["Proceedings of the International Symposium on Low Power Electronics and Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3218603.3218643","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3218603.3218643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:04Z","timestamp":1750212424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3218603.3218643"}},"subtitle":["Hardware-Oriented Neural Network Training for Approximate Inference"],"short-title":[],"issued":{"date-parts":[[2018,7,23]]},"references-count":23,"alternative-id":["10.1145\/3218603.3218643","10.1145\/3218603"],"URL":"https:\/\/doi.org\/10.1145\/3218603.3218643","relation":{},"subject":[],"published":{"date-parts":[[2018,7,23]]},"assertion":[{"value":"2018-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}