Main Page: Difference between revisions
mNo edit summary |
Ali Siddiqi (talk | contribs) No edit summary |
||
Line 63: | Line 63: | ||
6. | 6.[http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy] (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel) | ||
6.1 Overview of Security Challenges in Edge Computing | 6.1 Overview of Security Challenges in Edge Computing |
Revision as of 01:24, 6 April 2025
Please note that:
- you can only create or edit a page when you are on campus or connected to the UM VPN.
- read this help page for formatting: Formatting
- read this help page for user's guide: User's Guide
Consult the User's Guide for information on using the wiki software.
Getting started
- Configuration settings list
- MediaWiki FAQ
- MediaWiki release mailing list
- Localise MediaWiki for your language
- Learn how to combat spam on your wiki
Structure of this WiKi
1. Edge Cloud Demo - Sample
2. Edge Computing Chapter 1 - Reference Sample
1. Introduction to Edge Computing (Vrunda Kadam, Aayush Chopra, and Riya Pawar)
1.2 Why We Need Edge Computing?
1.3 Edge Computing Application Domains and Typical Applications
1.4 Different Edge Computing Paradigms
2.Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)
2.1 IoT, Mobile, and Digital Twins
2.2 Cloud
2.3 Edge and Fog
3.Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)
3.1 Industry Products: AWS as an Example
4.Machine Learning at the Edge (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)
4.1 Overview of ML at the Edge
4.3 ML Model Optimization at the Edge
5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )
6.[1] (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)
6.1 Overview of Security Challenges in Edge Computing
6.2 Data Privacy and Compliance in Edge Applications
6.3 Security Protocols and Frameworks for Edge Systems
6.4 Case Studies: Real-World Security Breaches
7. Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)
7.1 Task and Resource Scheduling
7.2 Edge for AR/VR
7.4 Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)
7.5 Data Persistence (Warren Lazarraga)
8. Applications of Edge Computing: Underwater Internet of Things (UIoT)
8.1 Introduction to UIoT and AUVs
8.2 Edge Computing for AUVs: Benefits and Necessity
8.3 Key Challenges in Applying Edge Computing to AUVs
8.4 State-of-the-Art Edge Computing Solutions
8.5 Future Research Directions
9.Conclusion and Future Outlook (cannot be chosen by students)