{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:35:16Z","timestamp":1767857716295,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T00:00:00Z","timestamp":1548028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-18-2-0121"],"award-info":[{"award-number":["FA8750-18-2-0121"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1717885"],"award-info":[{"award-number":["1717885"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,21]]},"DOI":"10.1145\/3287624.3288744","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T21:45:18Z","timestamp":1547847918000},"page":"224-229","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Build reliable and efficient neuromorphic design with memristor technology"],"prefix":"10.1145","author":[{"given":"Bing","family":"Li","sequence":"first","affiliation":[{"name":"Duke University and Army Research Office, Research Triangle Park"}]},{"given":"Bonan","family":"Yan","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Chenchen","family":"Liu","sequence":"additional","affiliation":[{"name":"Clarkson Univesity"}]},{"given":"Hai (Helen)","family":"Li","sequence":"additional","affiliation":[{"name":"Duke University"}]}],"member":"320","published-online":{"date-parts":[[2019,1,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2015.7409720"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898010"},{"key":"e_1_3_2_1_3_1","first-page":"815","volume-title":"Automation Test in Europe Conference Exhibition (DATE)","author":"Li B.","year":"2018","unstructured":"B. Li , L. Song , F. Chen , X. Qian , Y. Chen , and H. H. Li . Reram-based accelerator for deep learning. In 2018 Design , Automation Test in Europe Conference Exhibition (DATE) , pages 815 -- 820 , March 2018 . B. Li, L. Song, F. Chen, X. Qian, Y. Chen, and H. H. Li. Reram-based accelerator for deep learning. In 2018 Design, Automation Test in Europe Conference Exhibition (DATE), pages 815--820, March 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2561828.2561832"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMW.2016.7495289"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744783"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2691365.2691377"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062310"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1021\/nn202983n"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3199700.3199772"},{"key":"e_1_3_2_1_11_1","first-page":"148","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Chen Yiran","year":"2010","unstructured":"Yiran Chen , Hai Li , Xiaobin Wang , Wenzhong Zhu , Wei Xu , and Tong Zhang . A nondestructive self-reference scheme for spin-transfer torque random access memory (stt-ram). In 2010 Design , Automation & Test in Europe Conference & Exhibition (DATE) , pages 148 -- 153 , 2010 . Yiran Chen, Hai Li, Xiaobin Wang, Wenzhong Zhu, Wei Xu, and Tong Zhang. A nondestructive self-reference scheme for spin-transfer torque random access memory (stt-ram). In 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 148--153, 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2012.6165062"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2651647"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651928"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCT.1971.1083337"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature06932"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056056"},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE), 2011","author":"Xu Cong","year":"2011","unstructured":"Cong Xu , Xiangyu Dong , Norman P Jouppi , and Yuan Xie . Design implications of memristor-based rram cross-point structures. In Design , Automation & Test in Europe Conference & Exhibition (DATE), 2011 , pages 1 -- 6 . IEEE, 2011 . Cong Xu, Xiangyu Dong, Norman P Jouppi, and Yuan Xie. Design implications of memristor-based rram cross-point structures. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2011, pages 1--6. IEEE, 2011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/CISDA.2013.6595431","volume-title":"Computational Intelligence for Security and Defense Applications (CISDA), 2013 IEEE Symposium on","author":"Hu Miao","year":"2013","unstructured":"Miao Hu , Hai Li , Yiran Chen , Qing Wu , and Garrett S Rose . Bsb training scheme implementation on memristor-based circuit . In Computational Intelligence for Security and Defense Applications (CISDA), 2013 IEEE Symposium on , pages 80 -- 87 . IEEE, 2013 . Miao Hu, Hai Li, Yiran Chen, Qing Wu, and Garrett S Rose. Bsb training scheme implementation on memristor-based circuit. In Computational Intelligence for Security and Defense Applications (CISDA), 2013 IEEE Symposium on, pages 80--87. IEEE, 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2015.2492421"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2013.2264476"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2017.21"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2018.2829919"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060431"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967074"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS.2011.5784590"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858421"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062248"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2017.2776980"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755753.2755947"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2529279"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14441"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/4.229397"}],"event":{"name":"ASPDAC '19: 24th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan","acronym":"ASPDAC '19","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEICE ESS Institute of Electronics, Information and Communication Engineers, Engineering Sciences Society","IEEE CAS","IEEE CEDA","IPSJ SIG-SLDM Information Processing Society of Japan, SIG System LSI Design Methodology"]},"container-title":["Proceedings of the 24th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3288744","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287624.3288744","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287624.3288744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:54Z","timestamp":1750208274000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3288744"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,21]]},"references-count":33,"alternative-id":["10.1145\/3287624.3288744","10.1145\/3287624"],"URL":"https:\/\/doi.org\/10.1145\/3287624.3288744","relation":{},"subject":[],"published":{"date-parts":[[2019,1,21]]},"assertion":[{"value":"2019-01-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}