Academic literature on the topic 'CAN network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CAN network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "CAN network"
Druzin, Bryan. "Can the Liberal Order be Sustained? Nations, Network Effects, and the Erosion of Global Institutions." Michigan Journal of International Law, no. 42.1 (2021): 1. http://dx.doi.org/10.36642/mjil.42.1.can.
Full textZHU, LING-ZAN, BEI-BEI YIN, LEI ZHAO, and KAI-YUAN CAI. "SCALE-FREE NETWORKS CAN BE LINEAR-WORLD." International Journal of Modern Physics B 25, no. 32 (2011): 4593–603. http://dx.doi.org/10.1142/s0217979211059206.
Full textNEHANIV, CHRYSTOPHER L. "ASYNCHRONOUS AUTOMATA NETWORKS CAN EMULATE ANY SYNCHRONOUS AUTOMATA NETWORK." International Journal of Algebra and Computation 14, no. 05n06 (2004): 719–39. http://dx.doi.org/10.1142/s0218196704002043.
Full textWang, Changjie, Mariano Scazzariello, Alireza Farshin, Simone Ferlin, Dejan Kostić, and Marco Chiesa. "NetConfEval: Can LLMs Facilitate Network Configuration?" Proceedings of the ACM on Networking 2, CoNEXT2 (2024): 1–25. http://dx.doi.org/10.1145/3656296.
Full textMohanraj. M, Mohanraj M., Dr Rani Thottungal, and Jaikumar K. Jaikumar K. "Monitoring and Fault Diagnosis in Wind Turbine Using can Network." International Journal of Scientific Research 2, no. 4 (2012): 144–45. http://dx.doi.org/10.15373/22778179/apr2013/50.
Full textKim, Hyeong Jun, Uri Lee, Manho Kim, and Suk Lee. "Time-Synchronization Method for CAN–Ethernet Networks with Gateways." Applied Sciences 10, no. 24 (2020): 8873. http://dx.doi.org/10.3390/app10248873.
Full textMcNally, Richard J. "Can network analysis transform psychopathology?" Behaviour Research and Therapy 86 (November 2016): 95–104. http://dx.doi.org/10.1016/j.brat.2016.06.006.
Full textCuomo, Francesca, Domenico Garlisi, Alessio Martino, and Antonio Martino. "Predicting LoRaWAN Behavior: How Machine Learning Can Help." Computers 9, no. 3 (2020): 60. http://dx.doi.org/10.3390/computers9030060.
Full textKim, Man-Ho, Kyoung-Nam Ha, Kyung-Chang Lee, Keum-Shik Hong, and Suk Lee. "Implementation of Automated Transfer Crane System using CAN Network." Journal of Korean navigation and port research 29, no. 6 (2005): 555–60. http://dx.doi.org/10.5394/kinpr.2005.29.6.555.
Full textDU, CHENGHANG, HAO CHEN, YUNJIE ZHAO, and CHEN ZENG. "HOW FAR AND HOW FAST CAN ONE MOVE ON NEUTRAL NETWORK?" Journal of Theoretical and Computational Chemistry 12, no. 08 (2013): 1341010. http://dx.doi.org/10.1142/s0219633613410101.
Full textDissertations / Theses on the topic "CAN network"
Ekiz, Huseyin. "Design, implementation, and performance analysis of CAN/CAN and CAN/ethernet bridges." Thesis, University of Sussex, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362210.
Full textMukhija, Punit. "A Wireless Call Button Network Design." Thesis, Virginia Tech, 1999. http://hdl.handle.net/10919/9763.
Full textSellén, Wikström Henrik, and Magnus Roos. "Fjärruppdatering i ett CAN-nätverk : Remote update in a CAN-network." Thesis, KTH, Skolan för kemi, bioteknologi och hälsa (CBH), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278045.
Full textÜnal, İlker Kutlu Akif. "CAN (Control Area Network) üzerinden PIC programlama /." Isparta: SDÜ Fen Bilimleri Enstitüsü, 2006. http://tez.sdu.edu.tr/Tezler/TF00988.pdf.
Full textFranco, Alessia <1996>. "How Blockchain Technology Can Help Rearchitect Social Networks: An Analysis of Desmos Network." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19800.
Full textAngeli, Deivis. "Dynamic coordination with network externalities: procrastination can be efficient." reponame:Repositório Institucional do FGV, 2018. http://hdl.handle.net/10438/24023.
Full textTillberg, Emil. "Controller Area Network : Möjlig CAN-buss lösningar inom entreprenadbranschen." Thesis, Mittuniversitetet, Avdelningen för kvalitets- och maskinteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36881.
Full textErnmark, Niklas. "Utveckling av en CAN-adapter i ett sensorsystem för övervakning av däcktryck. : Development of a CAN-adapter in a sensor system for tire pressure monitoring." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215071.
Full textJeganathan, Nithyananda Siva. "A CONTROLLER AREA NETWORK LAYER FOR RECONFIGURABLE EMBEDDED SYSTEMS." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/484.
Full textWei, Chuliang. "A CAN network based intelligent monitoring system for automotive vehicles." Thesis, University of Liverpool, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428194.
Full textBooks on the topic "CAN network"
Bradley, Carl. Can voice over IP replace the existing public telephone network?. Oxford Brookes University, 2001.
Find full textNetanyahu, Binyamin. Fighting terrorism: How democracies can defeat the international terrorist network. 2nd ed. Farrar, Straus and Giroux, 2001.
Find full textJanal, Daniel S. 101 businesses you can start on the Internet. Van Nostrand Reinhold, 1996.
Find full textFriesen, Dwight J. Thy kingdom connected: What the church can learn from Facebook, the Internet, and other networks. Baker Books, 2009.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Enhanced configuration controls and management policies can improve USCG network security. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.
Find full textAging, National Institute on, ed. Online health information: Can you trust it? National Institute on Aging, 2003.
Find full textInstitute, Pennsylvania Bar. How your computer can get you in trouble. Pennsylvania Bar Institute, 2010.
Find full textRankin, Bob. Dr. Bob's painless guide to the Internet: & amazing things you can do with E-Mail. No Starch Press, 1996.
Find full textIsachyenko, Olyeg. Computer network software. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1033087.
Full textBook chapters on the topic "CAN network"
Zeltwanger, Holger. "Zonal Network Architecture and CAN Networks." In Proceedings. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-37009-1_35.
Full textBernstein, L., and C. M. Yuhas. "“Can we talk?”." In Integrated Network Management IV. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34890-2_56.
Full textDawoud, Dawoud Shenouda, and Peter Dawoud. "Controller Area Network (CAN)." In Microcontroller and Smart Home Networks. River Publishers, 2022. http://dx.doi.org/10.1201/9781003338833-6.
Full textLee, Viktor. "Social network analysis." In How Firms Can Strategically Influence Open Source Communities. Gabler Verlag, 2012. http://dx.doi.org/10.1007/978-3-8349-7140-1_6.
Full textVaudenay, Serge, and Damian Vizár. "Can Caesar Beat Galois?" In Applied Cryptography and Network Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93387-0_25.
Full textMorozov, Vladimir M. "Network Diplomacy and ‘Forgotten’ Conflicts—Can We Resolve Them?" In Network Diplomacy. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7006-1_12.
Full textNatale, Marco Di, Haibo Zeng, Paolo Giusto, and Arkadeb Ghosal. "CAN Tools." In Understanding and Using the Controller Area Network Communication Protocol. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0314-2_8.
Full textNowak, Mateusz, Sławomir Nowak, Piotr Pecka, and Krzysztof Grochla. "Content Identification in PI CAN Network." In Computer Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_18.
Full textShetty, Nikhil, Galina Schwartz, and Jean Walrand. "Can Competitive Insurers Improve Network Security?" In Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13869-0_23.
Full textSethi, Adarshpal S., Yves Raynaud, and Fabienne Faure-Vincent. "Can Simple Management (SNMP) Patrol the Information Highway ?" In Integrated Network Management IV. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34890-2_44.
Full textConference papers on the topic "CAN network"
Fang, Xing, Feiyan Ding, Bang Huang, et al. "Network Can Help Check Itself: Accelerating SMT-based Network Configuration Verification Using Network Domain Knowledge." In IEEE INFOCOM 2024 - IEEE Conference on Computer Communications. IEEE, 2024. http://dx.doi.org/10.1109/infocom52122.2024.10621215.
Full textZhang, Dequan, Jianguo Liu, Zhirong Fan, and Yanbo Cai. "Research on vehicle CAN communication cybersecurity." In 4th International Conference on Green Communication, Network, and Internet of Things (CNIoT 2024), edited by Xiangjie Kong and Cheng Siong Chin. SPIE, 2024. http://dx.doi.org/10.1117/12.3052461.
Full textSun, Rui, Shaojun Zhang, Zhirao Yin, Saoqian Wu, and Yufan Chen. "Intelligent Networked Vehicle CAN Network Security." In 2023 Asia-Europe Conference on Electronics, Data Processing and Informatics (ACEDPI). IEEE, 2023. http://dx.doi.org/10.1109/acedpi58926.2023.00084.
Full textMathony, Hans-Jörg, Karl-Heinz Kaiser, and Jan Unruh. "Network Architecture for CAN." In International Congress & Exposition. SAE International, 1993. http://dx.doi.org/10.4271/930004.
Full textXiang, Qiao, Ridi Wen, Chenyang Huang, Yuxin Wang, and Franck Le. "Network can check itself." In HotNets '22: The 21st ACM Workshop on Hot Topics in Networks. ACM, 2022. http://dx.doi.org/10.1145/3563766.3564095.
Full textCheng-Min Lin, Chen-Wei Yang, Hui-Kang Teng, Ming-Cheng Chung, Kuo-Chen Lang, and Heng-Fa Teng. "Modeling CAN network using PRISM." In 2010 8th IEEE International Conference on Industrial Informatics (INDIN). IEEE, 2010. http://dx.doi.org/10.1109/indin.2010.5549711.
Full textKim, Junwon, KeyHo Kwon, and JaeWook Jeon. "Validation of CAN-CAN gateway in the automotive network system." In 2017 17th International Conference on Control, Automation and Systems (ICCAS). IEEE, 2017. http://dx.doi.org/10.23919/iccas.2017.8204487.
Full textOh, Jung Hwan, Jong Uk Wi, and Seung Eun Lee. "Design of CAN — CAN FD bridge for in-vehicle network." In 2017 International SoC Design Conference (ISOCC). IEEE, 2017. http://dx.doi.org/10.1109/isocc.2017.8368912.
Full textSimoes, Jose, and Thomas Magedanz. "Can you predict human behavior?" In 2010 14th International Conference on Intelligence in Next Generation Networks (ICIN): "Weaving Applications Into the Network Fabric". IEEE, 2010. http://dx.doi.org/10.1109/icin.2010.5640933.
Full textKurachi, Ryo, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, and Yukihiro Miyashita. "DDCAN: Delay-Time Deliverable CAN Network." In 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2019. http://dx.doi.org/10.1109/qrs-c.2019.00020.
Full textReports on the topic "CAN network"
Terry, D. J. Advanced CAN (Controller Area Network) Tool. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/752339.
Full textVatet, Ian V. Can Network-Centric Warfare Save Undersea Warfare? Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada379174.
Full textGoldberg, L. A., P. D. MacKenzie, and D. S. Greenberg. Network congestion can be controlled: Routing algorithms in optical networks and Ethernets. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/565650.
Full textNolan, Parker Stephen. Network Theory: How Can Its Application Cultivate the Conditions to Support Young Creatives? Creative Generation, 2021. http://dx.doi.org/10.51163/creative-gen004.
Full textBeaman, Lori, Ariel BenYishay, Jeremy Magruder, and Ahmed Mushfiq Mobarak. Can Network Theory-based Targeting Increase Technology Adoption? National Bureau of Economic Research, 2018. http://dx.doi.org/10.3386/w24912.
Full textHansen, Donald K. Can Decentralized Command And Control Complement Network-Centric Warfare? Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada422815.
Full textRashid, Afshin. A Network of Communicating Nanoparticles Can Cover a Wider Area and Perform More Network Processing. ResearchHub Technologies, Inc., 2025. https://doi.org/10.55277/researchhub.n749pq5v.1.
Full textDIRusso, Lawrence R. Casting Our Net: Can Network Centric Warfare and Multinational Operations Coexist? Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada389631.
Full textZhilei Zhao, Zhilei Zhao. Can we decipher vocalizations of parrots in a complex social network? Experiment, 2023. http://dx.doi.org/10.18258/54977.
Full textAl-Suwailem, Sami. Can We Trust the “Trust Machine”? Islamic Development Bank Institute, 2020. http://dx.doi.org/10.55780/re24015.
Full text