Edge Computing :Fundamentals, Advances and Applications
Material type:
- 9781032126081
- 004.678 2 KUM/E
Item type | Current library | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|
![]() |
IIIT Kottayam Central Library General Stacks | 004.678 2 KUM/E (Browse shelf(Opens below)) | Available | 2209 |
Browsing IIIT Kottayam Central Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
004.678 2 JAM/C Cloud Computing :SaaS,PaaS,LaaS,Virtualization,Business Models,Mobile,Security,and more | 004.678 2 JAY/C Cloud Computing :Black Book | 004.678 2 JAY/C Cloud Computing :Black Book | 004.678 2 KUM/E Edge Computing :Fundamentals, Advances and Applications | 004.678 2 MIL/C Cloud Computing : Web Based Applications That Change the Way You Work and Collabrate Online | 004.678 2 RAJ/I;1 The Internet of things : enabling technologies, platforms, and use cases | 004.678 2 RAJ/I;1 The Internet of things : enabling technologies, platforms, and use cases |
Includes bibliographical references and index.
"This reference text presents the state-of-the-art in edge computing, its primitives, devices and simulators, applications, and healthcare-based case studies. The text provides integration of blockchain with edge computing systems and integration of edge with Internet of Things (IoT) and cloud computing. It will facilitate the readers to setup edge-based environment and work with edge analytics. It covers important topics including cluster computing, fog computing, networking architecture, edge computing simulators, edge analytics, privacy-preserving schemes, edge computing with blockchain, autonomous vehicles, and cross-domain authentication. Aimed at senior undergraduate, graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology, this text: Discusses edge data storage security with case studies and blockchain integration with edge computing system. Covers theoretical methods with the help of applications, use cases, case studies, and examples. Provides healthcare real-time case studies are elaborated in detailed by utilizing the virtues of homomorphic encryption. Discusses real-time interfaces, devices, and simulators in detail"--
There are no comments on this title.