{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:44Z","timestamp":1750309484845,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades - Agencia Estatal de Investigaci\u00f3n","award":["PID2020-120271RB-I00"],"award-info":[{"award-number":["PID2020-120271RB-I00"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,26]]},"DOI":"10.1145\/3697090.3697092","type":"proceedings-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T07:06:08Z","timestamp":1733900768000},"page":"75-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Allocating ECC parity bits into BF16-encoded CNN parameters: A practical experience report"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9715-8960","authenticated-orcid":false,"given":"Joaquin","family":"Gracia-Moran","sequence":"first","affiliation":[{"name":"Instituto ITACA-Universitat Politecnica de Valencia, Valencia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7678-3513","authenticated-orcid":false,"given":"Juan Carlos","family":"Ruiz","sequence":"additional","affiliation":[{"name":"Universitat Politecnica de Valencia, Valencia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4744-3795","authenticated-orcid":false,"given":"David","family":"de Andres","sequence":"additional","affiliation":[{"name":"Universitat Politecnica de Valencia, Valencia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4868-2050","authenticated-orcid":false,"given":"Luis-J.","family":"Saiz-Adalid","sequence":"additional","affiliation":[{"name":"Instituto ITACA-Universitat Politecnica de Valencia, Valencia, Spain"}]}],"member":"320","published-online":{"date-parts":[[2024,12,10]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"B.\u00a0L. Bhuva N. Tam L.\u00a0W. Massengill D. Ball I. Chatterjee M. McCurdy and M.\u00a0L. Alles. 2015. Multi-Cell Soft Errors at Advanced Technology Nodes. IEEE Transactions on Nuclear Science 62 6 (2015) 2585\u20132591. 10.1109\/TNS.2015.2488630","DOI":"10.1109\/TNS.2015.2488630"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/DFT52944.2021.9568363"},{"key":"e_1_3_3_2_4_2","unstructured":"Dhiraj\u00a0Kalamkar et al.2019. A Study of BFLOAT16 for Deep Learning Training. arxiv:https:\/\/arXiv.org\/abs\/1905.12322\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/1905.12322"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476157"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH48897.2020.00029"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Younis Ibrahim Haibin Wang Man Bai Zhi Liu Jianan Wang Zhiming Yang and Zhengming Chen. 2020. Soft Error Resilience of Deep Residual Networks for Object Recognition. IEEE Access 8 (2020) 19490\u201319503. 10.1109\/ACCESS.2020.2968129","DOI":"10.1109\/ACCESS.2020.2968129"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Myeungjae Jang and Jeongkyu Hong. 2021. MATE: Memory-and Retraining-Free Error Correction for Convolutional Neural Network Weights. Journal of Information and Communication Convergence Engineering 19 1 (mar 2021) 22\u201328. 10.6109\/jicce.2021.19.1.22","DOI":"10.6109\/jicce.2021.19.1.22"},{"key":"e_1_3_3_2_9_2","unstructured":"Wendy Kan Addison Howard and Eunbyung Park. 2018. Imagenet object localization challenge."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317805"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8341970"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Y. Lecun L. Bottou Y. Bengio and P. Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 86 11 (1998) 2278\u20132324. 10.1109\/5.726791","DOI":"10.1109\/5.726791"},{"key":"e_1_3_3_2_13_2","unstructured":"Y. LeCun C. Cortes and C.J. Burges. 2010. MNIST handwritten digit database. ATT Labs 2 (2010)."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"JunKyu Lee Lev Mukhanov Amir\u00a0Sabbagh Molahosseini Umar Minhas Yang Hua Jesus\u00a0Martinez del Rincon Kiril Dichev Cheol-Ho Hong and Hans Vandierendonck. 2023. Resource-Efficient Convolutional Networks: A Survey on Model- Arithmetic- and Implementation-Level Techniques. Comput. Surveys 55 13s Article 276 (2023) 36\u00a0pages.","DOI":"10.1145\/3587095"},{"key":"e_1_3_3_2_15_2","first-page":"1","volume-title":"SC17: International Conference for High Performance Computing, Networking, Storage and Analysis","author":"al. Guanpeng Li\u00a0et","year":"2017","unstructured":"Guanpeng Li\u00a0et al.2017. Understanding Error Propagation in Deep Learning Neural Network (DNN) Accelerators and Applications. In SC17: International Conference for High Performance Computing, Networking, Storage and Analysis. 1\u201312."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317915"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Jon Perez-Cerrolaza\u00a0et al.2024. Artificial Intelligence for Safety-Critical Systems in Industrial and Transportation Domains: A Survey. ACM Comput. Surv. 56 7 Article 176 (apr 2024) 40\u00a0pages. 10.1145\/3626314https:\/\/dl.acm.org\/doi\/10.1145\/3626314","DOI":"10.1145\/3626314"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00130"},{"key":"e_1_3_3_2_19_2","unstructured":"Joseph Redmon. 2013\u20132016. Darknet: Open Source Neural Networks in C. http:\/\/pjreddie.com\/darknet\/."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68606-1_1"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC61798.2024.00028"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714885"},{"key":"e_1_3_3_2_23_2","unstructured":"Christian Szegedy Wei Liu Yangqing Jia Pierre Sermanet Scott Reed Dragomir Anguelov Dumitru Erhan Vincent Vanhoucke and Andrew Rabinovich. 2014. Going Deeper with Convolutions. arxiv:https:\/\/arXiv.org\/abs\/1409.4842\u00a0[cs.CV] https:\/\/arxiv.org\/abs\/1409.4842"}],"event":{"name":"LADC 2024: 13th Latin-American Symposium on Dependable and Secure Computing","acronym":"LADC 2024","location":"Recife Brazil"},"container-title":["Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3697090.3697092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3697090.3697092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:33Z","timestamp":1750295853000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3697090.3697092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":22,"alternative-id":["10.1145\/3697090.3697092","10.1145\/3697090"],"URL":"https:\/\/doi.org\/10.1145\/3697090.3697092","relation":{},"subject":[],"published":{"date-parts":[[2024,11,26]]},"assertion":[{"value":"2024-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}