Main Page: Difference between revisions
Ali Siddiqi (talk | contribs) No edit summary |
No edit summary |
||
(40 intermediate revisions by 7 users not shown) | |||
Line 1: | Line 1: | ||
Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we [http://www.edgecomputingbook.com/index.php/About (Click to See Who are We)] write together! | |||
== Structure of this Textbook == | |||
== Structure of this | |||
1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar) | 1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar) | ||
Line 31: | Line 16: | ||
2.[http://www.edgecomputingbook.com/index.php/User:Farhan#Edge_Computing_Architecture_and_Layers Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir) | 2.[http://www.edgecomputingbook.com/index.php/User:Farhan#Edge_Computing_Architecture_and_Layers Edge Computing Architecture and Layers] (Amit Saha, Md Eleus, Farhan Tanvir) | ||
2.1 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.1_IoT,_Mobile,_and_Digital_Twins IoT, Mobile, and Digital Twins] | 2.1 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.1_IoT,_Mobile,_and_Digital_Twins IoT, Mobile, and Digital Twins] | ||
Line 42: | Line 27: | ||
3.[http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer) | 3.[http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks Edge Computing Products and Frameworks] (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer) | ||
3.1 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.1_Industry_Products:_AWS_as_an_Example Industry Products: AWS as an Example] | 3.1 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.1_Industry_Products:_AWS_as_an_Example Industry Products: AWS as an Example] | ||
Line 60: | Line 45: | ||
5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi ) | 5. [http://www.edgecomputingbook.com/index.php/Federated_Learning Federated Learning] (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi ) | ||
5.1 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.1_Overview_and_Motivation Overview & Motivation] | |||
5.2 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.2_Federated_Learning_Architectures Federated Learning Architectures] | |||
5.3 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.3_Aggregation_Algorithms_and_Communication_Efficiency Aggregation Algorithms & Communication] | |||
5.4 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.4_Privacy_Mechanisms Privacy Mechanisms] | |||
5.5 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.5_Security_Threats Security Threats] | |||
6. | 5.6 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.6_Resource-Efficient_Model_Training Resource-Efficient Model Training] | ||
5.7 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_Real-World_Use_Cases Real-World Use Cases] | |||
7. [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan) | 5.8 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.8_Open_Challenges Open Challenges] | ||
5.9 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_References References] | |||
6.[http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy Edge Security and Privacy] (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel) | |||
6.1 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.1_Overview_of_Security_Challenges_in_Edge_Computing Overview of Security Challenges in Edge Computing] | |||
6.2 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.2_Data_Privacy_and_Compliance_in_Edge_Applications Data Privacy and Compliance in Edge Applications] | |||
6.3 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.3_Security_Protocols_and_Frameworks_for_Edge_Systems Security Protocols and Frameworks for Edge Systems] | |||
6.4 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.4_Case_Studies:_Real-World_Security_Breaches Case Studies: Real-World Security Breaches] | |||
7. [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions Emerging Research Directions] (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan) | |||
7.1 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.1_Task_and_Resource_Scheduling Task and Resource Scheduling] | 7.1 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.1_Task_and_Resource_Scheduling Task and Resource Scheduling] | ||
Line 91: | Line 94: | ||
8.1 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.1_Introduction_to_UIoT_and_AUVs Introduction to UIoT and AUVs] | 8.1 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.1_Introduction_to_UIoT_and_AUVs Introduction to UIoT and AUVs] | ||
8.2 Edge Computing for AUVs: Benefits and Necessity | 8.2 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.2_Edge_Computing_for_AUVs:_Benefits_and_Necessity Edge Computing for AUVs: Benefits and Necessity] | ||
8.3 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.3_Challenges_of_Using_Edge_Computing_with_AUVs Key Challenges in Applying Edge Computing to AUVs] | |||
8. | 8.4 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.4_State-of-the-Art_Edge_Computing_Solutions State-of-the-Art Edge Computing Solutions] | ||
8. | 8.5 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.5_Future_Research_Directions_(Work_in_progress) Future Research Directions] | ||
: [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#References References] | |||
9.Conclusion and Future Outlook | 9.[http://www.edgecomputingbook.com/index.php/Conclusion Conclusion and Future Outlook] |
Latest revision as of 16:15, 21 April 2025
Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we (Click to See Who are We) write together!
Structure of this Textbook[edit]
1. Introduction to Edge Computing (Vrunda Kadam, Aayush Chopra, and Riya Pawar)
1.2 Why We Need Edge Computing?
1.3 Edge Computing Application Domains and Typical Applications
1.4 Different Edge Computing Paradigms
2.Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)
2.1 IoT, Mobile, and Digital Twins
2.2 Cloud
2.3 Edge and Fog
3.Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)
3.1 Industry Products: AWS as an Example
4.Machine Learning at the Edge (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)
4.1 Overview of ML at the Edge
4.3 ML Model Optimization at the Edge
5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )
5.2 Federated Learning Architectures
5.3 Aggregation Algorithms & Communication
5.5 Security Threats
5.6 Resource-Efficient Model Training
5.8 Open Challenges
5.9 References
6.Edge Security and Privacy (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)
6.1 Overview of Security Challenges in Edge Computing
6.2 Data Privacy and Compliance in Edge Applications
6.3 Security Protocols and Frameworks for Edge Systems
6.4 Case Studies: Real-World Security Breaches
7. Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)
7.1 Task and Resource Scheduling
7.2 Edge for AR/VR
7.4 Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)
7.5 Data Persistence (Warren Lazarraga)
8. Applications of Edge Computing: Underwater Internet of Things (UIoT)
8.1 Introduction to UIoT and AUVs
8.2 Edge Computing for AUVs: Benefits and Necessity
8.3 Key Challenges in Applying Edge Computing to AUVs
8.4 State-of-the-Art Edge Computing Solutions