{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:19:36Z","timestamp":1768029576789,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":131,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1320941,1421503,1703637,1725734"],"award-info":[{"award-number":["1320941,1421503,1703637,1725734"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297858.3304050","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"1087-1103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Minotaur"],"prefix":"10.1145","author":[{"given":"Abdulrahman","family":"Mahmoud","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, IL, USA"}]},{"given":"Radha","family":"Venkatagiri","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, IL, USA"}]},{"given":"Khalique","family":"Ahmed","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, IL, USA"}]},{"given":"Sasa","family":"Misailovic","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, IL, USA"}]},{"given":"Darko","family":"Marinov","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, IL, USA"}]},{"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, IL, USA"}]},{"given":"Sarita V.","family":"Adve","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of IEEE Workshop on Silicon Errors in Logic - System Effects (SELSE) .","author":"Agrawal Abhinav","year":"2017","unstructured":"Abhinav Agrawal, Bagus Wibowo, and James Tuck. 2017. Software Marking for Cross-Layer Architectural Vulnerability Estimation Model. In Proc. of IEEE Workshop on Silicon Errors in Logic - System Effects (SELSE) ."},{"key":"e_1_3_2_1_2_1","volume-title":"an Open Source Tool for Application-Level Soft Error Resiliency Analysis. (July","author":"Ahmed Khalique","year":"2018","unstructured":"Khalique Ahmed. 2018. Relyzer+: an Open Source Tool for Application-Level Soft Error Resiliency Analysis. (July 2018)."},{"key":"e_1_3_2_1_4_1","volume-title":"2017 IEEE International Symposium on Workload Characterization (IISWC) .","author":"Akram R.","unstructured":"R. Akram and A. Muzahid. 2017. Approximeter: Automatically finding and quantifying code sections for approximation. In 2017 IEEE International Symposium on Workload Characterization (IISWC) ."},{"key":"e_1_3_2_1_5_1","volume-title":"Nam Sung Kim, and Ulya R. Karpuzcu","author":"Akturk Ismail","year":"2015","unstructured":"Ismail Akturk, Nam Sung Kim, and Ulya R. Karpuzcu. 2015. Decoupled Control and Data Processing for Approximate Near-threshold Voltage Computing. IEEE Micro Special Issue on Heterogeneous Computing (2015), 70--78."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970361"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1355340"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806620"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2003.1270912"},{"key":"e_1_3_2_1_10_1","volume-title":"Oak Ridge National Laboratory","author":"Bernholdt David E.","year":"2014","unstructured":"David E. Bernholdt, Al Geist, and Barney Maccabe. 2014. Resilience is a Software Engineering Issue. Software Productivity for Extreme-Scale Science (SWP4XS) Workshop, Oak Ridge National Laboratory (2014)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3145812"},{"key":"e_1_3_2_1_13_1","unstructured":"Matteo Bordin Cyrille Comar Tristan Gingold J\u00e9r\u00f4me Guitton Olivier Hainque and Thomas Quinot. 2010. Object and Source Coverage for Critical Applications with the COUVERTURE Open Analysis Framework. In Embedded Real Time Software and Systems (ERTSS) ."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2005.110"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814301"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080241"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24255-2_31"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14325-5_47"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Franck Cappello Geist Al William Gropp Sanjay Kale Bill Kramer and Marc Snir. 2014. Toward Exascale Resilience: 2014 Update. Supercomput. Front. Innov.: Int. J. (2014). 10.14529\/jsfi140101","DOI":"10.14529\/jsfi140101"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509546"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831713"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2897996"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.112130335"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488859"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of International Conference on Dependable Systems and Networks (DSN) .","author":"Jeffrey","unstructured":"Jeffrey J. Cook and Craig B. Zilles. 2008. A Characterization of Instruction-level Error Derating and its Implications for Error Detection. In Proc. of International Conference on Dependable Systems and Networks (DSN) ."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816026"},{"key":"e_1_3_2_1_27_1","volume-title":"High-end Computing Resilience: Analysis of Issues Facing the HEC Community and Path-forward for Research and Development. Whitepaper","author":"DeBardeleben Nathan","year":"2009","unstructured":"Nathan DeBardeleben, James Laros, John T Daly, Stephen L Scott, Christian Engelmann, and Bill Harrod. 2009. High-end Computing Resilience: Analysis of Issues Facing the HEC Community and Path-forward for Research and Development. Whitepaper (2009)."},{"key":"e_1_3_2_1_28_1","unstructured":"Dua Dheeru and Efi Karra Taniskidou. 2017. UCI Machine Learning Repository. (2017). http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1299042.1299113"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508252"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616606.2616731"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956571"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2012.48"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.24"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736063"},{"key":"e_1_3_2_1_36_1","unstructured":"International Organization for Standardization. 2011. Road vehicles -- Functional safety. Website. (2011). https:\/\/www.iso.org\/standard\/43464.html."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6194"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/951947.951989"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.37"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1574"},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. of International Conference on Dependable Systems and Networks (DSN) .","author":"Gu Weining","year":"2003","unstructured":"Weining Gu, Z. Kalbarczyk, Ravishankar, K. Iyer, and Zhenyu Yang. 2003. Characterization of Linux Kernel Behavior Under Errors. In Proc. of International Conference on Dependable Systems and Networks (DSN) ."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173185"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00056"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS.2014.6860584"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972541"},{"key":"e_1_3_2_1_46_1","volume-title":"Approximate computing: An Emerging Paradigm for Energy-efficient Design","author":"Han Jie","unstructured":"Jie Han and Michael Orshansky. 2013. Approximate computing: An Emerging Paradigm for Energy-efficient Design. In ETS. IEEE Computer Society, 1--6."},{"key":"e_1_3_2_1_47_1","volume-title":"Dally","author":"Han Song","year":"2015","unstructured":"Song Han, Huizi Mao, and William J. Dally. 2015. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding. CoRR (2015)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354410.2355132"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150990"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669129"},{"key":"e_1_3_2_1_51_1","volume-title":"Channel Pruning for Accelerating Very Deep Neural Networks. CoRR","author":"He Yihui","year":"2017","unstructured":"Yihui He, Xiangyu Zhang, and Jian Sun. 2017. Channel Pruning for Accelerating Very Deep Neural Networks. CoRR (2017)."},{"key":"e_1_3_2_1_52_1","volume-title":"The 2nd International Conference on e-Health and Telemedicine (ICEHTM-2014)","author":"Isenkul Muhammed","year":"2014","unstructured":"Muhammed Isenkul, Betul Sakar, and O Kursun. 2014. Improved Spiral Test Using Digitized Graphics Tablet for Monitoring Parkinson's Disease. In The 2nd International Conference on e-Health and Telemedicine (ICEHTM-2014) ."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037718"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080225"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00072"},{"key":"e_1_3_2_1_56_1","volume-title":"Karpuzcu","author":"Khatamifard S. Karen","year":"2017","unstructured":"S. Karen Khatamifard, Ismail Akturk, and Ulya R. Karpuzcu. 2017. On Approximate Speculative Lock Elision. IEEE Transactions on Multiscale Computing Systems, Special Issue on Emerging Technologies and Architectures for Manycore Computing (2017)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2002.8"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908087"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/1874620.1874743"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126964"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00038"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/3014904.3014932"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00016"},{"key":"e_1_3_2_1_64_1","volume-title":"SmartInjector: Exploiting Intelligent Fault Injection for SDC Rate Analysis. In 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS). 236--242","author":"Li Jianli","year":"2013","unstructured":"Jianli Li and Qingping Tan. 2013. SmartInjector: Exploiting Intelligent Fault Injection for SDC Rate Analysis. In 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS). 236--242."},{"key":"e_1_3_2_1_65_1","volume-title":"Proc. of International Symposium on High Performance Computer Architecture (HPCA) .","author":"Li Man-Lap","unstructured":"Man-Lap Li, Pradeep Ramachandran, Rahmet Ulya Karpuzcu, Siva Kumar Sastry Hari, and Sarita V. Adve. 2009. Accurate Microarchitecture-Level Fault Modeling for Studying Hardware Faults. In Proc. of International Symposium on High Performance Computer Architecture (HPCA) ."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630067"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346315"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.9"},{"key":"e_1_3_2_1_69_1","unstructured":"ImageMagick Studio LLC. 2018. Image Magick. Website. (2018). https:\/\/www.imagemagick.org\/."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270291"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.16"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1105734.1105747"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.8"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714064.2660231"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806808"},{"key":"e_1_3_2_1_76_1","unstructured":"Asit K Mishra Rajkishore Barik and Somnath Paul. 2014. iACT: A Software-hardware Framework for Understanding the Scope of Approximate Computing. In WACAS ."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2017.2758679"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956570"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956570"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2003.1261389"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/539883"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.12"},{"key":"e_1_3_2_1_83_1","volume-title":"Fault Site Pruning for Practical Reliability Analysis of GPGPU Applications. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 749--761","author":"Nie Bin","year":"2018","unstructured":"Bin Nie, Lishan Yang, Adwait Jog, and Evgenia Smirni. 2018. Fault Site Pruning for Practical Reliability Analysis of GPGPU Applications. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 749--761."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2654251"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872376"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786807"},{"key":"e_1_3_2_1_88_1","volume-title":"SymPLFIED: Symbolic Program-level Fault Injection and Error Detection Framework. In International Conference on Dependable Systems and Networks .","author":"Pattabiraman Karthik","year":"2008","unstructured":"Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, and Ravishankar Iyer. 2008. SymPLFIED: Symbolic Program-level Fault Injection and Error Detection Framework. In International Conference on Dependable Systems and Networks ."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2006.9"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/2492708.2492981"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346195"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232226"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2008.22"},{"key":"e_1_3_2_1_96_1","volume-title":"2nd IS-ENES workshop on high-performance computing for climate models","author":"Ricoux Philippe","year":"2013","unstructured":"Philippe Ricoux. 2013. European Exascale Software Initiative EESI2-Towards Exascale Roadmap Implementation. 2nd IS-ENES workshop on high-performance computing for climate models (2013)."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597809.2597812"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630072"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2245674"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540711"},{"key":"e_1_3_2_1_101_1","volume-title":"ACCEPT: A Programmer-guided Compiler Framework for Practical Approximate Computing. In Technical Report UW-CSE-15-01-01","author":"Sampson Adrian","year":"2015","unstructured":"Adrian Sampson, Andr\u00e9 Baixo, Benjamin Ransford, Thierry Moreau, Joshua Yip, Luis Ceze, and Mark Oskin. 2015. ACCEPT: A Programmer-guided Compiler Framework for Practical Approximate Computing. In Technical Report UW-CSE-15-01-01, University of Washington ."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993518"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830790"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.30"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038698.2038718"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2232647"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665685"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665685"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2015.28"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025133"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342014522573"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174243.3174965"},{"key":"e_1_3_2_1_113_1","volume-title":"Proc. of International Symposium on High Performance Computer Architecture (HPCA) .","author":"Sridharan Vilas","unstructured":"Vilas Sridharan and David R. Kaeli. 2009. Eliminating Microarchitectural Dependency from Architectural Vulnerability. In Proc. of International Symposium on High Performance Computer Architecture (HPCA) ."},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872402"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575353"},{"key":"e_1_3_2_1_116_1","volume-title":"Siva Kumar Sastry Hari, and Sarita V. Adve","author":"Venkatagiri Radha","year":"2016","unstructured":"Radha Venkatagiri, Abdulrahman Mahmoud, Siva Kumar Sastry Hari, and Sarita V. Adve. 2016a. Approxilyzer Code Repository. Website. (2016). https:\/\/cs.illinois.edu\/approxilyzer"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.5555\/3195638.3195689"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00067"},{"key":"e_1_3_2_1_119_1","unstructured":"Virtutech. 2006. Simics Full System Simulator. Website. (2006). http:\/\/www.simics.net."},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.40"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.5555\/3130379.3130437"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.2"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","unstructured":"Bagus Wibowo Abhinav Agrawal Thomas Stanton and James Tuck. 2016. An Accurate Cross-Layer Approach for Online Architectural Vulnerability Estimation. ACM Trans. Archit. Code Optim. (2016) 30:1--30:27. 10.1145\/2975588","DOI":"10.1145\/2975588"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/223982.223990"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2016.7604686"},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062294"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","unstructured":"Ran Xu Jinkyu Koo Rakesh Kumar Peter Bai Subrata Mitra Sasa Misailovic and Saurabh Bagchi. 2018. Videochef: efficient approximation for streaming video processing pipelines. In 2018 $$USENIX$$ Annual Technical Conference ($$USENIX$$$$ATC$$ 18). 43--56.","DOI":"10.5555\/3277355.3277360"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2735299"},{"key":"e_1_3_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00061"},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","unstructured":"Chaoqiang Zhang Alex Groce and Mohammad Amin Alipour. 2014. Using Test Case Reduction and Prioritization to Improve Symbolic Execution. In ISSTA. 160--170. 10.1145\/2610384.2610392","DOI":"10.1145\/2610384.2610392"},{"key":"e_1_3_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.5555\/3199700.3199736"},{"key":"e_1_3_2_1_134_1","volume-title":"Trends and Challenges: A Guide for Designing with Memory ICs","author":"Ziegler James F","unstructured":"James F Ziegler and Helmut Puchner. 2004. SER--history, Trends and Challenges: A Guide for Designing with Memory ICs. Cypress."}],"event":{"name":"ASPLOS '19: Architectural Support for Programming Languages and Operating Systems","location":"Providence RI USA","acronym":"ASPLOS '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304050","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304050","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:15Z","timestamp":1750204395000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304050"}},"subtitle":["Adapting Software Testing Techniques for Hardware Errors"],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":131,"alternative-id":["10.1145\/3297858.3304050","10.1145\/3297858"],"URL":"https:\/\/doi.org\/10.1145\/3297858.3304050","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}