LEADER 02305oam 2200673 450 001 9910709662003321 005 20180531100558.0 035 $a(CKB)5470000002471615 035 $a(OCoLC)896811009 035 $a(OCoLC)995470000002471615 035 $a(EXLCZ)995470000002471615 100 $a20141123d1982 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aUpper Cretaceous subsurface stratigraphy and structure of coastal Georgia and South Carolina /$fby Page C. Valentine 210 1$aWashington :$cUnited States Department of the Interior, Geological Survey,$d1982. 215 $a1 online resource (iii, 33 pages) $cillustrations, map 225 1 $aGeological Survey professional paper ;$v1222 300 $aTitle from title screen (viewed October 14, 2014). 300 $a"A study based on 24 wells along transects from the Southeast Georgia Embayment northeastward to the Cape Fear Arch and offshore to the Outer Continental Shelf." 320 $aIncludes bibliographical references (pages 31-33). 606 $aGeology, Stratigraphic$yCretaceous 606 $aGeology$zGeorgia Embayment 606 $aGeology$zGeorgia 606 $aGeology$zSouth Carolina 606 $aCoasts$zGeorgia Embayment 606 $aCoasts$zGeorgia 606 $aCoasts$zSouth Carolina 606 $aCoasts$2fast 606 $aCretaceous Geologic Period$2fast 606 $aGeology$2fast 606 $aGeology, Stratigraphic$2fast 607 $aGeorgia$2fast 607 $aSouth Carolina$2fast 615 0$aGeology, Stratigraphic 615 0$aGeology 615 0$aGeology 615 0$aGeology 615 0$aCoasts 615 0$aCoasts 615 0$aCoasts 615 7$aCoasts. 615 7$aCretaceous Geologic Period. 615 7$aGeology. 615 7$aGeology, Stratigraphic. 700 $aValentine$b Page C.$01382630 712 02$aGeological Survey (U.S.), 801 0$bCOP 801 1$bCOP 801 2$bOCLCO 801 2$bOCLCF 801 2$bGPO 906 $aBOOK 912 $a9910709662003321 996 $aUpper Cretaceous subsurface stratigraphy and structure of coastal Georgia and South Carolina$93503959 997 $aUNINA LEADER 04215nam 22005895 450 001 9910151840603321 005 20200705231354.0 010 $a3-319-47355-7 024 7 $a10.1007/978-3-319-47355-0 035 $a(CKB)3710000000953001 035 $a(DE-He213)978-3-319-47355-0 035 $a(MiAaPQ)EBC4731733 035 $a(PPN)197139671 035 $a(EXLCZ)993710000000953001 100 $a20161102d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRFID Technologies for Internet of Things /$fby Min Chen, Shigang Chen 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (VII, 95 p. 37 illus.) 225 1 $aWireless Networks,$x2366-1186 311 $a3-319-47354-9 320 $aIncludes bibliographical references at the end of each chapters. 327 $aIntroduction -- Efficient Tag Search in Large RFID Systems -- Lightweight Anonymous RFID Authentication -- Identifying State-Free Networked Tags. 330 $aThis book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel. The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags. Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags. Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content. 410 0$aWireless Networks,$x2366-1186 606 $aApplication software 606 $aElectrical engineering 606 $aComputer networks 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aApplication software. 615 0$aElectrical engineering. 615 0$aComputer networks. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aCommunications Engineering, Networks. 615 24$aComputer Communication Networks. 676 $a621.384192 700 $aChen$b Min$4aut$4http://id.loc.gov/vocabulary/relators/aut$0875214 702 $aChen$b Shigang$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910151840603321 996 $aRFID Technologies for Internet of Things$91953975 997 $aUNINA