{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T01:15:08Z","timestamp":1745370908777,"version":"3.37.3"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T00:00:00Z","timestamp":1512604800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2018,3,31]]},"abstract":"\n The concept of approximate computing, that is, to sacrifice computation quality for computation efforts, has recently emerged as a promising design approach. Over the past decade, several research works have explored approximate computing at both the software level and hardware level of abstraction with encouraging results. At the hardware level of abstraction, adders (being the fundamental and most widely used data operators in digital systems) have attracted a significant attention for approximation. In this article, we first explain briefly the need\/significance of approximate adders. We then propose four\n Approximate Full Adders<\/jats:italic>\n (AFAs) for high-performance energy-efficient approximate computing. The key design objective behind the proposed AFAs is to curtail the length of carry propagation subjected to minimal error rate. Next, we exploit one of the proposed AFAs (optimal one) to construct an\n N<\/jats:italic>\n -bit approximate adder that hereinafter is referred as \u201cApproxADD.\u201d An emergent property of ApproxADD is that carries do not propagate in it, and, consequently, it provides bit-width-aware constant delay (\n O<\/jats:italic>\n (1)). ApproxADD also provides improvement in dynamic power consumption by 46.31% and in area by 28.57% w.r.t.\n Ripple Carry Adder<\/jats:italic>\n (RCA), which exhibits the lowest power and area. Although ApproxADD provides a significant improvement in delay, power, and area, it may not be preferred for some of the error-resilient applications because its: (i)\n Error Distance<\/jats:italic>\n (ED) is too high; and (ii)\n Error Rate<\/jats:italic>\n (ER) increases rapidly with bit-width (\n N<\/jats:italic>\n ). To improve ED and ER, we exploit the concept of\n carry-lifetime<\/jats:italic>\n and\n Error Detection and Correction<\/jats:italic>\n logic, respectively. In this way, we introduce two more (improved) versions of ApproxADD--ApproxADD\n \u03c5<\/jats:italic>\n 1 and ApproxADD. We call these as ApproxADD\n \u03c5<\/jats:italic>\n 1 and ApproxADD\n \u03c5<\/jats:italic>\n 2 with existing approximate adders based on conventional design metrics and approximate computing design metrics. Furthermore, to inspect effectiveness of the proposed approach in real-life applications, we demonstrate image compression and decompression by replacing the conventional addition operations in\n Discrete Cosine Transform<\/jats:italic>\n (DCT) and\n Inverse Discrete Cosine Transform<\/jats:italic>\n (IDCT) modules with ApproxADD\n \u03c5<\/jats:italic>\n 2.\n <\/jats:p>","DOI":"10.1145\/3131274","type":"journal-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T13:26:47Z","timestamp":1512998807000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Analysis and Design of Adders for Approximate Computing"],"prefix":"10.1145","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1706-5164","authenticated-orcid":false,"given":"Sunil","family":"Dutt","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Guwahati, Assam, India"}]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Guwahati, Assam, India"}]},{"given":"Gaurav","family":"Trivedi","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Guwahati, Assam, India"}]}],"member":"320","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1982.1675982"},{"key":"e_1_2_1_2_1","article-title":"An analytical framework for evaluating the error characteristics of approximate adders","author":"Han J.","year":"2015","journal-title":"IEEE Trans. Comput. 5"},{"key":"e_1_2_1_3_1","unstructured":"CEVA. 2012. CEVA\u2019s DSP Cores. Retrieved from http:\/\/www.ceva-dsp.com\/DSP-Cores. CEVA. 2012. CEVA\u2019s DSP Cores. Retrieved from http:\/\/www.ceva-dsp.com\/DSP-Cores."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488873"},{"volume-title":"Proceedings of the 26th International Conference Radioelektronika (RADIOELEKTRONIKA\u201916)","author":"Dutt S.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2016.101"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000108"},{"key":"e_1_2_1_8_1","unstructured":"A. Gupta D. E. Culler and J. P. Singh. 1997. Parallel Computer Architecture: A Hardware\/Software Approach (1st ed.). Morgan Kaufmann. A. Gupta D. E. Culler and J. P. Singh. 1997. Parallel Computer Architecture: A Hardware\/Software Approach (1st ed.). Morgan Kaufmann."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2217962"},{"volume-title":"Outbrief of DARPA\/ISAT Workshop: Advancing Computer Systems without Technology Progress.","author":"Mark","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","unstructured":"HSPICE. 2013. The Gold Standard for Accurate Circuit Simulation. Retrieved from http:\/\/www.synopsys.com\/Tools\/Verification\/AMSVerification\/CircuitSimulation\/HSPICE\/Pages\/default.aspx. HSPICE. 2013. The Gold Standard for Accurate Circuit Simulation. Retrieved from http:\/\/www.synopsys.com\/Tools\/Verification\/AMSVerification\/CircuitSimulation\/HSPICE\/Pages\/default.aspx."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742060.2743760"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2008.83"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228509"},{"volume-title":"Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design (ICCAD\u201913)","author":"Kim Y.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1973.5009159"},{"volume-title":"Proceedings of the 21st Annual Conference of Doctoral Students (WDS\u201912)","year":"2012","author":"Kudelka M.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.146"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1274006"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2009.2027626"},{"key":"e_1_2_1_21_1","unstructured":"MATLAB. 2015. Version 8.5 (R2015a). Retrieved from https:\/\/in.mathworks.com\/products\/matlab.html. MATLAB. 2015. Version 8.5 (R2015a). Retrieved from https:\/\/in.mathworks.com\/products\/matlab.html."},{"key":"e_1_2_1_22_1","unstructured":"Mark Miller. 2005. Nanometer Yield Enhancement Begins in the Design Phase. Retrieved from http:\/\/electronicdesign.com\/products\/nanometer-yield-enhancement-begins-design-phase. Mark Miller. 2005. Nanometer Yield Enhancement Begins in the Design Phase. Retrieved from http:\/\/electronicdesign.com\/products\/nanometer-yield-enhancement-begins-design-phase."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893356"},{"key":"e_1_2_1_24_1","volume-title":"Computer Arithmetic: Algorithms and Hardware Designs","author":"Parhami Behrooz","year":"2010","edition":"2"},{"edition":"1","volume-title":"New Horizons in Mobile and Wireless Communications: Radio Interfaces","author":"Prasad Ramjee","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","unstructured":"PTM. 2007. Predictive Technology Model (PTM). Retrieved from http:\/\/ptm.asu.edu\/modelcard\/32nm_MGK.pm. PTM. 2007. Predictive Technology Model (PTM). Retrieved from http:\/\/ptm.asu.edu\/modelcard\/32nm_MGK.pm."},{"edition":"1","volume-title":"Low Power Design Essentials","author":"Rabaey Jan","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2008.75"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.1960.5219822"},{"volume-title":"Proceedings of the IEEE 13th International New Circuits and Systems Conference (NEWCAS\u201915)","author":"Soares L. B.","key":"e_1_2_1_30_1"},{"volume-title":"Logical Effort: Designing Fast CMOS Circuits. Morgan Kaufmann.","year":"1999","author":"Sutherland Ivan","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","unstructured":"Tanner. 2015. Tanner S-Edit Schematic Capture. Retrieved from https:\/\/www.mentor.com\/tannereda\/s-edit. Tanner. 2015. Tanner S-Edit Schematic Capture. Retrieved from https:\/\/www.mentor.com\/tannereda\/s-edit."},{"key":"e_1_2_1_33_1","unstructured":"USC-SIPI. 1977. The USC-SIPI Image Database. Retrieved from http:\/\/sipi.usc.edu\/database\/database.php. USC-SIPI. 1977. The USC-SIPI Image Database. Retrieved from http:\/\/sipi.usc.edu\/database\/database.php."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403679"},{"volume-title":"Bovik","year":"2006","author":"Wang Zhou","key":"e_1_2_1_35_1"},{"volume-title":"CMOS VLSI Design: A Circuits and Systems Perspective","author":"Weste Neil","key":"e_1_2_1_36_1"},{"volume-title":"Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI\u201916)","author":"Yang X.","key":"e_1_2_1_37_1"},{"volume-title":"Proceedings of the 12th International Symposium on Integrated Circuits (ISIC\u201909)","year":"2009","author":"Zhu Ning","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2020591"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3131274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T22:16:01Z","timestamp":1672524961000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3131274"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,7]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,3,31]]}},"alternative-id":["10.1145\/3131274"],"URL":"https:\/\/doi.org\/10.1145\/3131274","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2017,12,7]]},"assertion":[{"value":"2016-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}