scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Journal Article•DOI•
Abstract: Purpose This paper aims to dissect cross-border contracting practices among exporting businesses. The under-representation of exporter-importer dynamics and the superficial understanding of contracts are the motivation for this exploratory study. Design/methodology/approach The qualitative multiple case study design focuses on 18 small to medium size enterprise (SMEs) exporting from New Zealand. The analysis encompasses coding, pattern matching and explanation building. This paper uses coding to uncover themes and pattern matching/cross-case comparison to facilitate explanation building. Findings The paper underlines the scant use of formal international sales/distribution contracts, the lack of knowledge concerning contracting, barriers to contract formation, misgivings about the court system and litigation and the adoption of proxy contracts. This paper depicts varieties of contracting practices, namely, no formal contract, improvisational, normative, and formal contractual arrangements and underlines the context in which each approach applies. Research limitations/implications Similar to most studies in this area, the dissection of contracting practices derives from the exporter side of the dyad. This robs the research of a holistic view of the exchange. Nonetheless, this paper contributes to a better understanding of contract formation and formalization and to the role of context in shaping the activities of exporting SMEs. Practical implications Although formal contracts are vital, they are not obligatory in all exchanges. Contracts matter more for high intensity exporters with comparatively short relationship histories, selling knowledge-intensive products in predominantly non-relational cultures. Policymakers should highlight the importance of contracts in such contexts and direct SMEs to several freely available resources on cross-border contracting. Social implications The research casts fairness/equity and access to justice as pertinent structural disadvantages impacting the contracting practices of exporting SMEs. Originality/value According to the authors’ knowledge, this paper is among the first studies to provide an in-depth portrayal of the contracting practices of exporting SMEs, to detail the pervasiveness of non-contractual contracting practices and to depict contracting as nuanced and context-dependent.

2 citations

Journal Article•DOI•
TL;DR: In this article , a variable neighborhood search based hybrid genetic algorithm is designed to solve the problem of storage space allocation for both inbound and outbound containers and twin automated stacking cranes scheduling in the automated container terminals, a new repositioning strategy is designed and a cooperative optimization model is established.
Abstract: To solve the problem of storage space allocation for both inbound and outbound containers and twin automated stacking cranes scheduling in the automated container terminals, a new repositioning strategy is designed and a cooperative optimization model is established. The model considers the constraints of safety distance and handshake area capacity. The objective of the model is to minimize the makespan of all storage requests and the total rehandling time during the retrieval process, which is calculated according to the priority of inbound and outbound containers defined by the early retrieval and early loading rule respectively. A variable neighborhood search based hybrid genetic algorithm is designed to solve the model. Numerical experiments show that the sum of the makespan of all storage requests and the total rehandling time during the retrieval process is reduced by approximately 10% compared to the traditional repositioning strategy by optimizing the sequence of container repositioning from the handshake area to the seaside or landside designated storage space. The research is beneficial to improve the operation efficiency of automated container terminal yards.

2 citations

Patent•
03 Mar 1984
TL;DR: In this paper, a special machine language instruction (instruction HSS) equipped with a prescribed field for the purpose of supporting OS handshake is provided, which has a value indicating that the instruction is the instruction HSS, as the instruction code part and has a field ID indicating a function to be handshaked by a master OS, as an operand.
Abstract: PURPOSE:To facilitate an OS handshake, by providing a special machine language instruction equipped with a prescribed field for the purpose of supporting the OS handshake. CONSTITUTION:An instruction decoding mechanism 1, a handshake mechanism 2, a handshake control table 3, an OS switching mechanism 4, and a mode FF5 are provided. For the purpose of supporting the OS handshake, a special machine language instruction (instruction HSS) is provided. This instruction HSS is equipped with a field OP, which has a value indicating that the instruction is the instruction HSS, as the instruction code part and has a field ID, which indicates a function to be handshaked by a master OS, as an operand. The system is constituted in this manner to facilitate the OS handshake.

2 citations

Patent•
18 Mar 2009
TL;DR: In this paper, a handshake protocol adapted to ultra wide band network was proposed. But the method relates to no calculated value, that is, even if an attacker fabricates a different first message and sends to the responser, the response will consume no calculating resource, consequently, the Dos attacking is hard to realize, and the safety is improved.
Abstract: The invention relates to a handshake protocol method adapted to ultra wide band network. In which, the responser receives a first message, if master cryptography key MKID and PKID is legal, generates a random number R-Nonce and constructs a second message, and sends it to the sponsor. The method relates to no calculated value, that is, even if an attacker fabricates a different first message and sends to the responser, the responser will consume no calculating resource, consequently, the Dos attacking is hard to realize, and the safety is improved.

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877