Abstract
Edge computing holds great promise, and almost as many challenges in deployment.
- Bagchi, S., Shroff, N.B., Khalil, I.M., Panta, R.K., Krasniewski, M.D., and Krogmeier, J.V. Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks. U.S. Patent 8,107,397. 2012.Google Scholar
- Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. Fog computing and its role in the Internet of things. In Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing. ACM, 2012, 13--16.Google ScholarDigital Library
- Butler, R., Welch, V., Engert, D., Foster, I., Tuecke, S., Volmer, J., and Kesselman, C. A national-scale authentication infrastructure. Computer 33, 12 (2000), 60--66.Google Scholar
- Capkun, S., Buttyan, L., and Hubaux, J.P. Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Computing 2, 1 (2003), 52--64.Google ScholarDigital Library
- Felter, W., Ferreira, A., Rajamony, R., and Rubio, J. An updated performance comparison of virtual machines and Linux containers. In Proceedings of the 2015 IEEE Intern. Symposium on Performance Analysis of Systems and Software. IEEE. 2015, 1--14.Google ScholarCross Ref
- Hu, Y.C., Patel, M., Sabella, D., Sprecher, N., and Young, V. Mobile edge computing---A key technology towards 5G. ETSI White Paper 11 (2015).Google Scholar
- Kong, L., McCreery, C., and Yamamoto, M. Indian Ocean Tsunami Information Center, 2008; http://bit.ly/2lQHyhL.Google Scholar
- Koo, J., Panta, R.K., Bagchi, S., and Montestruque, L. A tale of two synchronizing clocks. In Proceedings of the 7th ACM Conf. Embedded Networked Sensor Systems. ACM, 2009, 239--252.Google Scholar
- International Business Machines. IBM Blockchain, 2017; https://www.ibm.com/blockchain/Google Scholar
- Maji, A.K., Mitra, S., Zhou, B., Bagchi, S., and Verma, A. Mitigating interference in cloud services by middleware reconfiguration. In Proceedings of the 15th Intern. Middleware Conf. ACM, 2014, 277--288.Google ScholarDigital Library
- Juniper Networks. Mobile Edge Computing Use Cases & Deployment Options, 2015; https://juni.pr/2kEXy6kGoogle Scholar
- Novakovic, D.M., Vasic, N., Novakovic, S., Kostic, D., and Bianchini, R. DeepDive: Transparently identifying and managing performance interference in virtualized environments. In Proceedings of USENIX Annual Technical Conf., 2013, 219--230.Google Scholar
- Panta, R.K., Bagchi, S., and Midkiff, S.P. Efficient incremental code update for sensor networks. In Proceedings of ACM Trans. Sensor Networks, 2011, 30:1--30:32.Google Scholar
- Petersen, M.K., Edlund, K., Hansen, L.H., Bendtsen, J., and Stoustrup, J. A taxonomy for modeling flexibility and a computationally efficient algorithm for dispatch in smart grids. In Proceedings of the American Control Conf. IEEE. 2013, 1150--1156.Google ScholarCross Ref
- Satyanarayanan, M. The emergence of edge computing. Computer 50, 1 (2017), 30--39.Google ScholarCross Ref
- Ars Technica. Crypto shocker: Four of every 1,000 public keys provide no security (2012); http://bit.ly/2kaCZOY/Google Scholar
- UNESCO and ITU. The State of Broadband 2014: Broadband for all, 2014; http://bit.ly/2mdHxFb.Google Scholar
Index Terms
- Dependability in edge computing
Recommendations
Deviceless edge computing: extending serverless computing to the edge of the network
SYSTOR '17: Proceedings of the 10th ACM International Systems and Storage ConferenceThe serverless paradigm has been rapidly adopted by developers of cloud-native applications, mainly because it relieves them from the burden of provisioning, scaling and operating the underlying infrastructure. In this paper, we propose a novel ...
Edge computing: A survey
AbstractIn recent years, the Edge computing paradigm has gained considerable popularity in academic and industrial circles. It serves as a key enabler for many future technologies like 5G, Internet of Things (IoT), augmented reality and ...
Highlights- A comprehensive survey on edge computing, i.e., Fog, Mobile-edge and Cloudlet.
- ...
Opportunistic Edge Computing: Concepts, opportunities and research challenges
AbstractThe growing need for low-latency access to computing resources has motivated the introduction of edge computing, where resources are strategically placed at the access networks. Unfortunately, edge computing infrastructures like fogs ...
Highlights- Edge computing infrastructures like fogs and cloudlets have limited scalability.
Comments