Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Spectral leakage

Known as: Leakage 
The Fourier transform of a function of time, s(t), is a complex-valued function of frequency, S(f), often referred to as a frequency spectrum. Any… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
This paper introduces McPAT, an integrated power, area, and timing modeling framework that supports comprehensive design space… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
2009
Highly Cited
2009
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft's Azure… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2003
Review
2003
High leakage current in deep-submicrometer regimes is becoming a significant contributor to power dissipation of CMOS circuits as… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
Silicon nanowires can be prepared with single-crystal structures, diameters as small as several nanometers and controllable hole… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
Review
2000
Review
2000
One of the main reasons that firms participate in alliances is to learn know-how and capabilities from their alliance partners… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4
Highly Cited
1995
Highly Cited
1995
A SIGNIFICANT fraction of the computer memory industry is at present involved in the manufacture of non-volatile memory devices1… Expand
Highly Cited
1992
Highly Cited
1992
Motivated by emerging battery-operated applications that demand intensive computation in portable environments, techniques are… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table I
Highly Cited
1987
Highly Cited
1987
  • D. Denning
  • IEEE Transactions on Software Engineering
  • 1987
  • Corpus ID: 10028835
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of… Expand
Highly Cited
1980
Highly Cited
1980
From headwaters to mouth, the physical variables within a river system present a continuous gradient of physical conditions. This… Expand
  • figure 1
  • figure 2
Highly Cited
1977
Highly Cited
1977
A conduit arrangement for a tilt cylinder of a bulldozer comprises a trunnion having a hole to be connected to the hole in a… Expand