scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Proceedings ArticleDOI
19 Apr 2004
TL;DR: Handshake technology is an extremely disciplined asynchronous design style supported by a complete tool set for design, simulation, prototyping and testing that enables the industrialization of asynchronous design and has been used in dozens of different IC types with tens of millions of ICs already sold with handshake technology inside.
Abstract: There are many incentives to tackle the chaos of asynchronous circuit technology. The holy grail of supreme speed is certainly one of them, but it remains a distant goal. However, today's market suffers from other problems for which asynchronous circuits may provide immediate answers - problems such as energy consumption and the integration of analog and digital circuits. Solutions in these domains may have direct impact on the market in areas such as automotive, wireless connectivity, identification and smart cards. A line of business within the Philips Technology Incubator, handshake solutions brings handshake technology to the semiconductor market. Handshake technology is an extremely disciplined asynchronous design style, supported by a complete tool set for design, simulation, prototyping and testing. It enables the industrialization of asynchronous design and has been used in dozens of different IC types with tens of millions of ICs already sold with handshake technology inside. Summary form only given.

2 citations

Proceedings ArticleDOI
01 Jul 2015
TL;DR: The proposed secret attribute handshake scheme verifies the legitimacy of a node over an insecure wireless communication channel and accomplish the secret attributes negotiation to enable a new efficient solution to underground emergency response system.
Abstract: Wireless Sensor Networks (WSNs) is one of the most important solutions for emergency applications, such as fire, flood and volcano monitoring, especially underground disasters. In this paper, we propose a mobile-hierarchy WSN architecture for underground emergency response system and a secure handshake scheme for the mobile-hierarchy architecture. In the discussions, the proposed secret attribute handshake scheme verifies the legitimacy of a node over an insecure wireless communication channel and accomplish the secret attributes negotiation. Mobile-hierarchy WSN architecture is evaluated in underground emergency response system by experiments. It shows good efficiency by extensive simulations in special emergency scenario. Moreover, it enables a new efficient solution to underground emergency response system.

2 citations

Patent
21 Aug 2018
TL;DR: In this paper, an optimization method and system for a network transmission link is presented, which comprises the steps that an edge node downloads back-to-the-source path information from a computing center, wherein the backto the source path information is obtained by computing according to feedback detection information of each node.
Abstract: The invention provides an optimization method and system for a network transmission link. The method comprises the steps that an edge node downloads back-to-the-source path information from a computing center, wherein the back-to-the-source path information is obtained by the computing center through computing according to feedback detection information of each node; the edge node receives a handshake request which is sent by a client and points to a target domain name and determines a back-to-the-source path for transmitting the handshake request based on the handshake request and the back-to-the-source path information; when the edge node establishes connection with an adjacent node in the back-to-the-source path unsuccessfully, the edge node reselects the back-to-the-source path according to the back-to-the-source path information; and the edge node attempts to establish connection with the adjacent node in the reselected back-to-the-source path. According to the technical scheme provided by the invention, the transmission efficiency of data between the client of a user and a source station server can be improved.

2 citations

Patent
16 Jul 2008
TL;DR: In this paper, the authors proposed a method for multiple spanning tree instance fast transfer and an exchanger, where the upstream MST domain boundary exchanger can quickly transfer the MSTI with the changed domain root to the forwarding state without need to wait certain time delay.
Abstract: The invention provides a method for multiple spanning tree instance fast transfer and an exchanger. When an existing multiple spanning tree instance (MSTI) needs to be transferred to a forwarding state from a blocking state, between MST domains, the method is that: a downstream multiple spanning tree (MST) domain boundary exchanger receives a handshake request message from an upstream MST domain boundary exchanger, the handshake request message is a handshake request message which aims at the existing MSTI needing to be transferred to the forwarding state from the blocking state, then the downstream MST domain boundary exchanger returns a handshake response message; the MSTI is transferred into the forwarding state after the upstream MST domain boundary exchanger receives the handshake response message. With the proposal of the invention, the upstream MST domain boundary exchanger can quickly transfer the MSTI with the changed domain root to the forwarding state without need to wait certain time delay, thereby being capable of improving the whole performance of the second-layer network.

2 citations

Journal ArticleDOI
TL;DR: A novel set of solutions to quench the GP is proposed, called crosstalk-glitch gating, as the quenching is obtained by using carefully generated control signals in comparison with contemporary signal-integrity management techniques.
Abstract: This paper proposes a novel solution to make asynchronous handshake interfaces tolerant to crosstalk-glitch propagation (GP). This study leverages our recently proposed crosstalk-glitch modeling technique for asynchronous systems, which models the crosstalk GP in asynchronous interfaces. In this paper, a novel set of solutions to quench the GP is proposed. This set of solutions is called crosstalk-glitch gating, as the quenching is obtained by using carefully generated control signals. A step-by-step method is recommended to apply crosstalk-glitch gating to conventional asynchronous handshake interfaces. Transistor-level electrical simulations demonstrate that our method effectively generates crosstalk-glitch gate-controlling signals. In comparison with contemporary signal-integrity management techniques, our gating methodology can be applied to fewer nodes and earlier in the design cycle.

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877