Main Page: Difference between revisions
Zheng Song (talk | contribs) |
No edit summary |
||
(102 intermediate revisions by 20 users not shown) | |||
Line 1: | Line 1: | ||
Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we [http://www.edgecomputingbook.com/index.php/About (Click to See Who are We)] write together! | |||
== Structure of this Textbook == | |||
1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar) | |||
1.1 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.1_What_is_Edge_Computing? What is Edge Computing?] | |||
1. | |||
1. | |||
1. | |||
1.2 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.2_Why_we_need_Edge_Computing? Why We Need Edge Computing?] | |||
2. | |||
3. | 1.3 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.3_Edge_Computing_application_Domains_and_Typical_Applications Edge Computing Application Domains and Typical Applications] | ||
4. | 1.4 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.4_Different_Edge_Computing_Paradigms Different Edge Computing Paradigms ] | ||
2.[http://www.edgecomputingbook.com/index.php/User:Farhan#Edge_Computing_Architecture_and_Layers Edge Computing Architecture and Layers] (Amit Saha, Md Eleus, Farhan Tanvir) | |||
7.Conclusion and Future Outlook | 2.1 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.1_IoT,_Mobile,_and_Digital_Twins IoT, Mobile, and Digital Twins] | ||
2.2 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.2_Cloud Cloud] | |||
2.3 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.3_Edge_and_Fog Edge and Fog] | |||
2.4 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.4_Edge-Cloud_Continuum Edge-Cloud Continuum] | |||
3.[http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks Edge Computing Products and Frameworks] (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer) | |||
3.1 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.1_Industry_Products:_AWS_as_an_Example Industry Products: AWS as an Example] | |||
3.2 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.2_Open_Source_Frameworks Open Source Frameworks] | |||
3.3 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.3_Serverless_at_the_Edge Serverless at the Edge] | |||
4.[http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge Machine Learning at the Edge] (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed) | |||
4.1 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.1_Overview_of_ML_at_the_Edge Overview of ML at the Edge] | |||
4.2 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.2_ML_Training_at_the_edge ML Training at the Edge] | |||
4.3 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.3_ML_Model_Optimization_at_the_Edge ML Model Optimization at the Edge] | |||
5. [http://www.edgecomputingbook.com/index.php/Federated_Learning Federated Learning] (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi ) | |||
5.1 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.1_Overview_and_Motivation Overview & Motivation] | |||
5.2 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.2_Federated_Learning_Architectures Federated Learning Architectures] | |||
5.3 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.3_Aggregation_Algorithms_and_Communication_Efficiency Aggregation Algorithms & Communication] | |||
5.4 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.4_Privacy_Mechanisms Privacy Mechanisms] | |||
5.5 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.5_Security_Threats Security Threats] | |||
5.6 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.6_Resource-Efficient_Model_Training Resource-Efficient Model Training] | |||
5.7 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_Real-World_Use_Cases Real-World Use Cases] | |||
5.8 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.8_Open_Challenges Open Challenges] | |||
5.9 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_References References] | |||
6.[http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy Edge Security and Privacy] (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel) | |||
6.1 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.1_Overview_of_Security_Challenges_in_Edge_Computing Overview of Security Challenges in Edge Computing] | |||
6.2 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.2_Data_Privacy_and_Compliance_in_Edge_Applications Data Privacy and Compliance in Edge Applications] | |||
6.3 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.3_Security_Protocols_and_Frameworks_for_Edge_Systems Security Protocols and Frameworks for Edge Systems] | |||
6.4 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.4_Case_Studies:_Real-World_Security_Breaches Case Studies: Real-World Security Breaches] | |||
7. [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions Emerging Research Directions] (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan) | |||
7.1 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.1_Task_and_Resource_Scheduling Task and Resource Scheduling] | |||
7.2 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.2_Edge_for_AR/VR Edge for AR/VR] | |||
7.3 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.3_Vehicle_Computing Vehicle Computing] | |||
7.4 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.4_Energy-Efficient_Edge_Architectures Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)] | |||
7.5 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.5_Data_Persistence Data Persistence (Warren Lazarraga)] | |||
8. [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing Applications of Edge Computing: Underwater Internet of Things (UIoT)] | |||
8.1 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.1_Introduction_to_UIoT_and_AUVs Introduction to UIoT and AUVs] | |||
8.2 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.2_Edge_Computing_for_AUVs:_Benefits_and_Necessity Edge Computing for AUVs: Benefits and Necessity] | |||
8.3 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.3_Challenges_of_Using_Edge_Computing_with_AUVs Key Challenges in Applying Edge Computing to AUVs] | |||
8.4 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.4_State-of-the-Art_Edge_Computing_Solutions State-of-the-Art Edge Computing Solutions] | |||
8.5 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.5_Future_Research_Directions_(Work_in_progress) Future Research Directions] | |||
: [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#References References] | |||
9.[http://www.edgecomputingbook.com/index.php/Conclusion Conclusion and Future Outlook] |
Latest revision as of 16:15, 21 April 2025
Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we (Click to See Who are We) write together!
Structure of this Textbook[edit]
1. Introduction to Edge Computing (Vrunda Kadam, Aayush Chopra, and Riya Pawar)
1.2 Why We Need Edge Computing?
1.3 Edge Computing Application Domains and Typical Applications
1.4 Different Edge Computing Paradigms
2.Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)
2.1 IoT, Mobile, and Digital Twins
2.2 Cloud
2.3 Edge and Fog
3.Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)
3.1 Industry Products: AWS as an Example
4.Machine Learning at the Edge (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)
4.1 Overview of ML at the Edge
4.3 ML Model Optimization at the Edge
5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )
5.2 Federated Learning Architectures
5.3 Aggregation Algorithms & Communication
5.5 Security Threats
5.6 Resource-Efficient Model Training
5.8 Open Challenges
5.9 References
6.Edge Security and Privacy (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)
6.1 Overview of Security Challenges in Edge Computing
6.2 Data Privacy and Compliance in Edge Applications
6.3 Security Protocols and Frameworks for Edge Systems
6.4 Case Studies: Real-World Security Breaches
7. Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)
7.1 Task and Resource Scheduling
7.2 Edge for AR/VR
7.4 Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)
7.5 Data Persistence (Warren Lazarraga)
8. Applications of Edge Computing: Underwater Internet of Things (UIoT)
8.1 Introduction to UIoT and AUVs
8.2 Edge Computing for AUVs: Benefits and Necessity
8.3 Key Challenges in Applying Edge Computing to AUVs
8.4 State-of-the-Art Edge Computing Solutions