Main Page: Difference between revisions
Ram229kumar (talk | contribs) No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
== Structure of this WiKi == | == Structure of this WiKi == | ||
1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar) | 1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar) | ||
Line 120: | Line 101: | ||
9.Conclusion and Future Outlook | 9.[http://www.edgecomputingbook.com/index.php/Conclusion Conclusion and Future Outlook] |
Revision as of 17:29, 8 April 2025
Structure of this WiKi
1. Introduction to Edge Computing (Vrunda Kadam, Aayush Chopra, and Riya Pawar)
1.2 Why We Need Edge Computing?
1.3 Edge Computing Application Domains and Typical Applications
1.4 Different Edge Computing Paradigms
2.Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)
2.1 IoT, Mobile, and Digital Twins
2.2 Cloud
2.3 Edge and Fog
3.Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)
3.1 Industry Products: AWS as an Example
4.Machine Learning at the Edge (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)
4.1 Overview of ML at the Edge
4.3 ML Model Optimization at the Edge
5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )
5.2 Federated Learning Architectures
5.3 Aggregation Algorithms & Communication
5.5 Security Threats
5.6 Resource-Efficient Model Training
5.8 Open Challenges
5.9 References
6.Edge Security and Privacy (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)
6.1 Overview of Security Challenges in Edge Computing
6.2 Data Privacy and Compliance in Edge Applications
6.3 Security Protocols and Frameworks for Edge Systems
6.4 Case Studies: Real-World Security Breaches
7. Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)
7.1 Task and Resource Scheduling
7.2 Edge for AR/VR
7.4 Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)
7.5 Data Persistence (Warren Lazarraga)
8. Applications of Edge Computing: Underwater Internet of Things (UIoT)
8.1 Introduction to UIoT and AUVs
8.2 Edge Computing for AUVs: Benefits and Necessity
8.3 Key Challenges in Applying Edge Computing to AUVs
8.4 State-of-the-Art Edge Computing Solutions