Academic literature on the topic 'CAN network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CAN network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "CAN network"

1

Druzin, Bryan. "Can the Liberal Order be Sustained? Nations, Network Effects, and the Erosion of Global Institutions." Michigan Journal of International Law, no. 42.1 (2021): 1. http://dx.doi.org/10.36642/mjil.42.1.can.

Full text
Abstract:
A growing retreat from multilateralism is threatening to upend the institutions that underpin the liberal international order. This article applies network theory to this crisis in global governance, arguing that policymakers can strengthen these institutions by leveraging network effect pressures. Network effects arise when networks of actors—say language speakers or users of a social media platform—interact and the value one user derives from the network increases as other users join the network (e.g., the more people who speak your language, the more useful it is because there are more peop
APA, Harvard, Vancouver, ISO, and other styles
2

ZHU, LING-ZAN, BEI-BEI YIN, LEI ZHAO, and KAI-YUAN CAI. "SCALE-FREE NETWORKS CAN BE LINEAR-WORLD." International Journal of Modern Physics B 25, no. 32 (2011): 4593–603. http://dx.doi.org/10.1142/s0217979211059206.

Full text
Abstract:
It was generally believed that scale-free networks would be small-world. In this paper, two models, named Model A and Model B, are proposed to show that certain scale-free networks can be linear-world instead of small-world. By linear-world, it means that the average path length L of the network grows linearly with the total number of nodes N, i.e., L~N. Model A generates a deterministic scale-free network with high assortativity and numerical simulations demonstrate that the network is linear-world when it satisfies degree exponent λ>1. Model B constructs a partially deterministic scale-fr
APA, Harvard, Vancouver, ISO, and other styles
3

NEHANIV, CHRYSTOPHER L. "ASYNCHRONOUS AUTOMATA NETWORKS CAN EMULATE ANY SYNCHRONOUS AUTOMATA NETWORK." International Journal of Algebra and Computation 14, no. 05n06 (2004): 719–39. http://dx.doi.org/10.1142/s0218196704002043.

Full text
Abstract:
We show that any locally finite automata network [Formula: see text] with global synchronous updates can be emulated by another one [Formula: see text], whose structure derives from that of [Formula: see text] by a simple construction, but whose updates are made asynchronously at its various component automata (e.g. possibly randomly or sequentially, with or without possible simultaneous updates at different nodes). By "emulation", we refer to the existence of a spatial-temporal covering 'local time', allowing one to project the behavior of [Formula: see text] continuously onto that of [Formul
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Changjie, Mariano Scazzariello, Alireza Farshin, Simone Ferlin, Dejan Kostić, and Marco Chiesa. "NetConfEval: Can LLMs Facilitate Network Configuration?" Proceedings of the ACM on Networking 2, CoNEXT2 (2024): 1–25. http://dx.doi.org/10.1145/3656296.

Full text
Abstract:
This paper explores opportunities to utilize Large Language Models (LLMs) to make network configuration human-friendly, simplifying the configuration of network devices & development of routing algorithms and minimizing errors. We design a set of benchmarks (NetConfEval) to examine the effectiveness of different models in facilitating and automating network configuration. More specifically, we focus on the scenarios where LLMs translate high-level policies, requirements, and descriptions (i.e., specified in natural language) into low-level network configurations & Python code. NetConfE
APA, Harvard, Vancouver, ISO, and other styles
5

Mohanraj. M, Mohanraj M., Dr Rani Thottungal, and Jaikumar K. Jaikumar K. "Monitoring and Fault Diagnosis in Wind Turbine Using can Network." International Journal of Scientific Research 2, no. 4 (2012): 144–45. http://dx.doi.org/10.15373/22778179/apr2013/50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Hyeong Jun, Uri Lee, Manho Kim, and Suk Lee. "Time-Synchronization Method for CAN–Ethernet Networks with Gateways." Applied Sciences 10, no. 24 (2020): 8873. http://dx.doi.org/10.3390/app10248873.

Full text
Abstract:
Time-synchronization technology can provide a common notion of time among the participating nodes on a network. This is essential not only for protocol operation for time-critical services but also for the time stamp for information included in the message. Precise time information can be very crucial for such things as autonomous driving because there are various sensor measurements from multiple cameras, and radio detection and ranging (radar) and light detection and ranging (LiDAR) are used for perceiving the current situation via sensor fusion. A well-known synchronization method, IEEE 158
APA, Harvard, Vancouver, ISO, and other styles
7

McNally, Richard J. "Can network analysis transform psychopathology?" Behaviour Research and Therapy 86 (November 2016): 95–104. http://dx.doi.org/10.1016/j.brat.2016.06.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cuomo, Francesca, Domenico Garlisi, Alessio Martino, and Antonio Martino. "Predicting LoRaWAN Behavior: How Machine Learning Can Help." Computers 9, no. 3 (2020): 60. http://dx.doi.org/10.3390/computers9030060.

Full text
Abstract:
Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used for an extensive analysis to improve the functionality of IoT systems in terms of network performance and user services. LoRaWAN (Long Range Wide Area Network) is one of the emerging IoT technologies, with a simple protocol based on LoRa modulation. In this work, we discuss how machine learning approaches can be used to improve network performance
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Man-Ho, Kyoung-Nam Ha, Kyung-Chang Lee, Keum-Shik Hong, and Suk Lee. "Implementation of Automated Transfer Crane System using CAN Network." Journal of Korean navigation and port research 29, no. 6 (2005): 555–60. http://dx.doi.org/10.5394/kinpr.2005.29.6.555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

DU, CHENGHANG, HAO CHEN, YUNJIE ZHAO, and CHEN ZENG. "HOW FAR AND HOW FAST CAN ONE MOVE ON NEUTRAL NETWORK?" Journal of Theoretical and Computational Chemistry 12, no. 08 (2013): 1341010. http://dx.doi.org/10.1142/s0219633613410101.

Full text
Abstract:
A central theme in systems biology is to reveal the intricate relationship between structure and dynamics of many complex biological networks. Using Boolean models that describe yeast cell cycle process, we developed a unique logic-based theoretical framework to quantitatively determine the structure-dynamics mapping, also known as genotype–phenotype mapping. Moreover, under the dominant inhibition condition, we used a superposition property to show rigorously that the neutral network — the network of all possible structures that encode the same dynamics and are connected via single interactio
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "CAN network"

1

Ekiz, Huseyin. "Design, implementation, and performance analysis of CAN/CAN and CAN/ethernet bridges." Thesis, University of Sussex, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mukhija, Punit. "A Wireless Call Button Network Design." Thesis, Virginia Tech, 1999. http://hdl.handle.net/10919/9763.

Full text
Abstract:
Traditional call button networks that control elevator systems utilize a wired connection for communication. The communication cables are run through the elevator shaft from one call button to another and finally to the controller on the roof. Installing this wired link is highly time consuming. In this thesis, we propose the design for a wireless call button network. Two important features of this wireless network design are low cost and low power consumption. Controller Area Network (CAN) is a widely used protocol for wired networks and has been proposed for use in next generation elevator c
APA, Harvard, Vancouver, ISO, and other styles
3

Sellén, Wikström Henrik, and Magnus Roos. "Fjärruppdatering i ett CAN-nätverk : Remote update in a CAN-network." Thesis, KTH, Skolan för kemi, bioteknologi och hälsa (CBH), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278045.

Full text
Abstract:
Sammanfattning Controller Area Network (CAN) är ett väletablerat, robust, meddelandebaseratprotokoll som tillsammans med Society ofAutomotive Engineers (SAE) J1939standard används det till kommunikation och dataöverföring i tunga fordonoch industrier. Noderna i ett sådant nät sitter oftast svårtåtkomliga för direktfysisk tillgång vilket gör uppdateringsprocessen av mikrokontrollern svår attgenomföra. Målet med arbetet har varit att ta fram en lösning som möjliggör mjukvaruuppdateringvia CAN i ett redan etablerat nätverk. Den här rapporten ger enteknisk genomgång av CAN och standarden J1939 sam
APA, Harvard, Vancouver, ISO, and other styles
4

Ünal, İlker Kutlu Akif. "CAN (Control Area Network) üzerinden PIC programlama /." Isparta: SDÜ Fen Bilimleri Enstitüsü, 2006. http://tez.sdu.edu.tr/Tezler/TF00988.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Franco, Alessia <1996&gt. "How Blockchain Technology Can Help Rearchitect Social Networks: An Analysis of Desmos Network." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19800.

Full text
Abstract:
Centralized Social Networks (CSNs) such as Facebook, Instagram and Twitter are operated in an obscure, opaque and autocratic manner; many problems arise from centralized corporate power, these issues are based on the misalignment between profit-seeking incentives of corporations and user goals. Censorship, banning and data breaches have become increasingly frequent in the past five years, recent political tensions and the outbreak of Covid-19 have worsened this situation globally. The main issue has an inborn nature: the business model of CSNs utilizes and monetizes users’ data to maximize the
APA, Harvard, Vancouver, ISO, and other styles
6

Angeli, Deivis. "Dynamic coordination with network externalities: procrastination can be efficient." reponame:Repositório Institucional do FGV, 2018. http://hdl.handle.net/10438/24023.

Full text
Abstract:
Submitted by Deivis Angeli (deivisangeli@gmail.com) on 2018-06-06T06:09:47Z No. of bitstreams: 1 DynamicCoordinationWithNetworkExternalities.pdf: 394741 bytes, checksum: e157b70d33e77a4676224e1c72a1e34d (MD5)<br>Approved for entry into archive by Katia Menezes de Souza (katia.menezes@fgv.br) on 2018-06-06T12:05:15Z (GMT) No. of bitstreams: 1 DynamicCoordinationWithNetworkExternalities.pdf: 394741 bytes, checksum: e157b70d33e77a4676224e1c72a1e34d (MD5)<br>Approved for entry into archive by Suzane Guimarães (suzane.guimaraes@fgv.br) on 2018-06-06T12:50:08Z (GMT) No. of bitstreams: 1 DynamicC
APA, Harvard, Vancouver, ISO, and other styles
7

Tillberg, Emil. "Controller Area Network : Möjlig CAN-buss lösningar inom entreprenadbranschen." Thesis, Mittuniversitetet, Avdelningen för kvalitets- och maskinteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36881.

Full text
Abstract:
Företaget engcon Nordic AB producerar redskap till   entreprenadbranschen, där tiltrotator är hjärtat i deras verksamhet. För att   förbättra användningen och förenkla installationen har en litteraturstudie   gjorts som tittar på två delar, funktionen kring CAN-buss som grund för ett   kommunikationssystem, och olika högre lager protokoll som byggs ovanpå CAN.   Varför CAN-buss skapades och hur systemet fungerar är viktiga att förstå för   att kunna titta på dem ovanliggande lager, kallade HLP (Higher Layer   Protocol). HLP ger ett slags maskin-människa gränssnitt att arbeta emot.   Typer av H
APA, Harvard, Vancouver, ISO, and other styles
8

Ernmark, Niklas. "Utveckling av en CAN-adapter i ett sensorsystem för övervakning av däcktryck. : Development of a CAN-adapter in a sensor system for tire pressure monitoring." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215071.

Full text
Abstract:
Den här rapporten beskriver ett examensarbete i elektroteknik på Kungliga tekniska högskolan. Syftet var att skapa en unik systemlösning där ett CAN-adapterkort (Controller Area Network) skulle integreras med ett system för övervakning av däcktryck i tunga fordon. Målet var att presentera mätvärden från ventilsensorer på en persondator. Systemet för övervakning av lufttryck heter J1939 – TPMS och är en färdig produkt. J1939 – TPMS skickar CAN-ramar på en CAN-buss i J1939-format. Dessa ramar ska läsas in av adapterkortet och presenteras på ett terminalprogram på en persondator. Arbetet har best
APA, Harvard, Vancouver, ISO, and other styles
9

Jeganathan, Nithyananda Siva. "A CONTROLLER AREA NETWORK LAYER FOR RECONFIGURABLE EMBEDDED SYSTEMS." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/484.

Full text
Abstract:
Dependable and Fault-tolerant computing is actively being pursued as a research area since the 1980s in various fields involving development of safety-critical applications. The ability of the system to provide reliable functional service as per its design is a key paradigm in dependable computing. For providing reliable service in fault-tolerant systems, dynamic reconfiguration has to be supported to enable recovery from errors (induced by faults) or graceful degradation in case of service failures. Reconfigurable Distributed applications provided a platform to develop fault-tolerant systems
APA, Harvard, Vancouver, ISO, and other styles
10

Wei, Chuliang. "A CAN network based intelligent monitoring system for automotive vehicles." Thesis, University of Liverpool, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428194.

Full text
Abstract:
Road vehicles are the major pollution sources which seriously harm human health and the environment worldwide. A series of directives for limiting vehicle pollution have been introduced pillticularly in the EU and USA. Presently many investigations are being carried out in order to find out more effectively ways to reduce the vehicle pollution hy precise measurement of the vehicle pollution. Tllis thesis reports the details of the design illId construction of a CAN network based intelligent monitoring system for the distributed monitoring of vellicle pollution. The essential theory to SUppOlt
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "CAN network"

1

Bradley, Carl. Can voice over IP replace the existing public telephone network?. Oxford Brookes University, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Netanyahu, Binyamin. Fighting terrorism: How democracies can defeat the international terrorist network. 2nd ed. Farrar, Straus and Giroux, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gascoigne, Marc. You can surf the Net! Puffin, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Janal, Daniel S. 101 businesses you can start on the Internet. Van Nostrand Reinhold, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Friesen, Dwight J. Thy kingdom connected: What the church can learn from Facebook, the Internet, and other networks. Baker Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Department of Homeland Security. Office of Inspector General. Enhanced configuration controls and management policies can improve USCG network security. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aging, National Institute on, ed. Online health information: Can you trust it? National Institute on Aging, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Institute, Pennsylvania Bar. How your computer can get you in trouble. Pennsylvania Bar Institute, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rankin, Bob. Dr. Bob's painless guide to the Internet: & amazing things you can do with E-Mail. No Starch Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Isachyenko, Olyeg. Computer network software. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1033087.

Full text
Abstract:
The tutorial includes information about the main types of computer network software, modern Web technologies, and popular Web application development tools.&#x0D; Meets the requirements of the Federal state educational standards of secondary professional education of the last generation.&#x0D; Designed for students of secondary professional education, enrolled in the enlarged group of specialties 09.02.00 "computer science" and studying discipline "Software, computer networks and Software, computer networks and Web servers." It can also be useful for students of higher educational institutions
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "CAN network"

1

Zeltwanger, Holger. "Zonal Network Architecture and CAN Networks." In Proceedings. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-37009-1_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bernstein, L., and C. M. Yuhas. "“Can we talk?”." In Integrated Network Management IV. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34890-2_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dawoud, Dawoud Shenouda, and Peter Dawoud. "Controller Area Network (CAN)." In Microcontroller and Smart Home Networks. River Publishers, 2022. http://dx.doi.org/10.1201/9781003338833-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Viktor. "Social network analysis." In How Firms Can Strategically Influence Open Source Communities. Gabler Verlag, 2012. http://dx.doi.org/10.1007/978-3-8349-7140-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vaudenay, Serge, and Damian Vizár. "Can Caesar Beat Galois?" In Applied Cryptography and Network Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93387-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Morozov, Vladimir M. "Network Diplomacy and ‘Forgotten’ Conflicts—Can We Resolve Them?" In Network Diplomacy. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7006-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Natale, Marco Di, Haibo Zeng, Paolo Giusto, and Arkadeb Ghosal. "CAN Tools." In Understanding and Using the Controller Area Network Communication Protocol. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0314-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nowak, Mateusz, Sławomir Nowak, Piotr Pecka, and Krzysztof Grochla. "Content Identification in PI CAN Network." In Computer Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shetty, Nikhil, Galina Schwartz, and Jean Walrand. "Can Competitive Insurers Improve Network Security?" In Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13869-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sethi, Adarshpal S., Yves Raynaud, and Fabienne Faure-Vincent. "Can Simple Management (SNMP) Patrol the Information Highway ?" In Integrated Network Management IV. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34890-2_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "CAN network"

1

Fang, Xing, Feiyan Ding, Bang Huang, et al. "Network Can Help Check Itself: Accelerating SMT-based Network Configuration Verification Using Network Domain Knowledge." In IEEE INFOCOM 2024 - IEEE Conference on Computer Communications. IEEE, 2024. http://dx.doi.org/10.1109/infocom52122.2024.10621215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Dequan, Jianguo Liu, Zhirong Fan, and Yanbo Cai. "Research on vehicle CAN communication cybersecurity." In 4th International Conference on Green Communication, Network, and Internet of Things (CNIoT 2024), edited by Xiangjie Kong and Cheng Siong Chin. SPIE, 2024. http://dx.doi.org/10.1117/12.3052461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, Rui, Shaojun Zhang, Zhirao Yin, Saoqian Wu, and Yufan Chen. "Intelligent Networked Vehicle CAN Network Security." In 2023 Asia-Europe Conference on Electronics, Data Processing and Informatics (ACEDPI). IEEE, 2023. http://dx.doi.org/10.1109/acedpi58926.2023.00084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mathony, Hans-Jörg, Karl-Heinz Kaiser, and Jan Unruh. "Network Architecture for CAN." In International Congress & Exposition. SAE International, 1993. http://dx.doi.org/10.4271/930004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xiang, Qiao, Ridi Wen, Chenyang Huang, Yuxin Wang, and Franck Le. "Network can check itself." In HotNets '22: The 21st ACM Workshop on Hot Topics in Networks. ACM, 2022. http://dx.doi.org/10.1145/3563766.3564095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cheng-Min Lin, Chen-Wei Yang, Hui-Kang Teng, Ming-Cheng Chung, Kuo-Chen Lang, and Heng-Fa Teng. "Modeling CAN network using PRISM." In 2010 8th IEEE International Conference on Industrial Informatics (INDIN). IEEE, 2010. http://dx.doi.org/10.1109/indin.2010.5549711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Junwon, KeyHo Kwon, and JaeWook Jeon. "Validation of CAN-CAN gateway in the automotive network system." In 2017 17th International Conference on Control, Automation and Systems (ICCAS). IEEE, 2017. http://dx.doi.org/10.23919/iccas.2017.8204487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oh, Jung Hwan, Jong Uk Wi, and Seung Eun Lee. "Design of CAN — CAN FD bridge for in-vehicle network." In 2017 International SoC Design Conference (ISOCC). IEEE, 2017. http://dx.doi.org/10.1109/isocc.2017.8368912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Simoes, Jose, and Thomas Magedanz. "Can you predict human behavior?" In 2010 14th International Conference on Intelligence in Next Generation Networks (ICIN): "Weaving Applications Into the Network Fabric". IEEE, 2010. http://dx.doi.org/10.1109/icin.2010.5640933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kurachi, Ryo, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, and Yukihiro Miyashita. "DDCAN: Delay-Time Deliverable CAN Network." In 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2019. http://dx.doi.org/10.1109/qrs-c.2019.00020.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "CAN network"

1

Terry, D. J. Advanced CAN (Controller Area Network) Tool. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/752339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vatet, Ian V. Can Network-Centric Warfare Save Undersea Warfare? Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada379174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goldberg, L. A., P. D. MacKenzie, and D. S. Greenberg. Network congestion can be controlled: Routing algorithms in optical networks and Ethernets. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/565650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nolan, Parker Stephen. Network Theory: How Can Its Application Cultivate the Conditions to Support Young Creatives? Creative Generation, 2021. http://dx.doi.org/10.51163/creative-gen004.

Full text
Abstract:
As observers to the intersectional fields of culture, education, and social change, Creative Generation witnessed the chosen organizational structure of “networks” come into vogue – particularly as smaller, community-based organizations have begun to participate in larger-scale, collaborative initiatives. In almost all examples, the individuals and organizations involved do their collaborative work through a “network,” using any number of connections and patterns. This qualitative inquiry sought to understand how applying Network Theory to organizational structures can cultivate the conditions
APA, Harvard, Vancouver, ISO, and other styles
5

Beaman, Lori, Ariel BenYishay, Jeremy Magruder, and Ahmed Mushfiq Mobarak. Can Network Theory-based Targeting Increase Technology Adoption? National Bureau of Economic Research, 2018. http://dx.doi.org/10.3386/w24912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hansen, Donald K. Can Decentralized Command And Control Complement Network-Centric Warfare? Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada422815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rashid, Afshin. A Network of Communicating Nanoparticles Can Cover a Wider Area and Perform More Network Processing. ResearchHub Technologies, Inc., 2025. https://doi.org/10.55277/researchhub.n749pq5v.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

DIRusso, Lawrence R. Casting Our Net: Can Network Centric Warfare and Multinational Operations Coexist? Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada389631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhilei Zhao, Zhilei Zhao. Can we decipher vocalizations of parrots in a complex social network? Experiment, 2023. http://dx.doi.org/10.18258/54977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Suwailem, Sami. Can We Trust the “Trust Machine”? Islamic Development Bank Institute, 2020. http://dx.doi.org/10.55780/re24015.

Full text
Abstract:
Blockchain technology is famously considered a “trust machine”. It is a machine (a set of code and procedures) that will make transactions reliable without the need to trust any particular person. In other words, the blockchain replaces trust of persons with trust of computational systems. But there is a little problem. What makes the machine trustworthy? The members of the blockchain network must agree on the validity of the transactions to be registered in the network. Once they agree, then the transaction is encrypted in a “block” of data, that is chained to previous blocks. This is done in
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!