Название | Fog Computing |
---|---|
Автор произведения | Группа авторов |
Жанр | Отраслевые издания |
Серия | |
Издательство | Отраслевые издания |
Год выпуска | 0 |
isbn | 9781119551775 |
6 Index
List of Tables
1 Chapter 2Table 2.1 Threat model for fog and edge computing [21].
2 Chapter 3Table 3.1 Memory and computational expensiveness of some of the most commonly...
3 Chapter 4Table 4.1 Caching schemes comparison.Table 4.2 Objectives-based comparison.
4 Chapter 5Table 5.1 State of the art research work timeline.Table 5.2 Authentication grid.Table 5.3 Authorization requirements in the Internet of Things.Table 5.4 Privacy requirements in the light of Internet of Things.
5 Chapter 6Table 6.1 Comparison between surveyed communication approaches.Table 6.2 Comparison between surveyed security and privacy approaches.Table 6.3 Comparison of the surveyed solution related to the Internet of Thin...Table 6.4 Comparison of the surveyed solution related to the data quality lay...Table 6.5 Comparison of the surveyed solution related to the cloudification l...Table 6.6 Comparison of the surveyed solution related to the analytics and de...
6 Chapter 7Table 7.1 Exemplar continuum computing science applications.Table 7.2 Twister2 components and status.
7 Chapter 10Table 10.1 Summary of symbols.
8 Chapter 12Table 12.1 Comparison of machine learningtechnologies [14].Table 12.2 Execution time (ms) for running DL models in three hardware platfo...Table 12.3 Classification of smart IoT devices according to their capacities ...
9 Chapter 13Table 13.1 Comparison of communication technologies for the SG [10–13].
10 Chapter 14Table 14.1 Simulation environmental parameters.Table 14.2 Comparison results of utility between heuristic and uEDA.
11 Chapter 15Table 15.1 Extracted features from sensor signals.Table 15.2 Energy consumption of various configurations, where computation is...Table 15.3 Accuracy of sensor localization.Table 15.4 The comparison between the accuracy of the regression on different...Table 15.5 Leave-one-subject-out cross validation test.Table 15.6 R2 values from linear regression on MET vs Ankle and Hip Accelerometer...Table 15.7 Comparing R2 values and error of linear regression on MET vs Ankle ...
12 Chapter 16Table 16.1 Comparison between centralized and distributed controller.
13 Chapter 17Table 17.1 Benchmarking of application classes.
14 Chapter 18Table 18.1 Results of the latency in the both architectures.Table 18.2 Log-transformed data for latency.Table 18.3 Results of the network usage in the both architectures.Table 18.4 Log-transformed data for network usage.
15 Chapter 20Table 20.1 Comparison of wireless technologies.Table 20.2 5G protocol stack.Table 20.3 Challenges of 5G.Table 20.4 Research projects on 5G.
16 Chapter 21Table 21.1 A summary of existing cloud computing based major bioinformatics a...Table 21.2 Comparison between the cloud computing and fog computing paradigms...
List of Illustrations
1 Chapter 1Figure 1.1 Land-vehicular fog computing examples. (See color plate section f...Figure 1.2 Maritime fog computing examples.Figure 1.3 UAV fog computing examples.Figure 1.4 UE fog computing examples. (See color plate section for the color...Figure 1.5 A taxonomy of non-functional requirements of mobile fog computing...Figure 1.6 Fog infrastructure service provider, fog service tenant, and tena...Figure 1.7 The three types of end-to-end networking.
2 Chapter 2Figure 2.1 Edge computing solution using an IoT and edge devices [12].Figure 2.2 An overview of edge computing architecture [16]. (See color plate...Figure 2.3 Fog computing a bridge between cloud and edge [20].Figure 2.4 Fog computing architecture [10]. (See color plate section for the...Figure 2.5 A wearable ECG sensor.Figure