Beware the evolving 'intelligent' web service! An integration
architecture tactic to guard AI-first components
- URL: http://arxiv.org/abs/2005.13186v1
- Date: Wed, 27 May 2020 06:15:18 GMT
- Title: Beware the evolving 'intelligent' web service! An integration
architecture tactic to guard AI-first components
- Authors: Alex Cummaudo, Scott Barnett, Rajesh Vasa, John Grundy, Mohamed
Abdelrazek
- Abstract summary: Our proposal is an architectural tactic designed to improve intelligent service-dependent software robustness.
The tactic involves creating an application-specific benchmark dataset baselined against an intelligent service.
A technical evaluation of our implementation of this architecture demonstrates how the tactic can identify 1,054 cases of substantial confidence evolution and 2,461 cases of substantial changes to response label sets.
- Score: 5.975695375814527
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Intelligent services provide the power of AI to developers via simple RESTful
API endpoints, abstracting away many complexities of machine learning. However,
most of these intelligent services-such as computer vision-continually learn
with time. When the internals within the abstracted 'black box' become hidden
and evolve, pitfalls emerge in the robustness of applications that depend on
these evolving services. Without adapting the way developers plan and construct
projects reliant on intelligent services, significant gaps and risks result in
both project planning and development. Therefore, how can software engineers
best mitigate software evolution risk moving forward, thereby ensuring that
their own applications maintain quality? Our proposal is an architectural
tactic designed to improve intelligent service-dependent software robustness.
The tactic involves creating an application-specific benchmark dataset
baselined against an intelligent service, enabling evolutionary behaviour
changes to be mitigated. A technical evaluation of our implementation of this
architecture demonstrates how the tactic can identify 1,054 cases of
substantial confidence evolution and 2,461 cases of substantial changes to
response label sets using a dataset consisting of 331 images that evolve when
sent to a service.
Related papers
- Intelligent Mobile AI-Generated Content Services via Interactive Prompt Engineering and Dynamic Service Provisioning [55.641299901038316]
AI-generated content can organize collaborative Mobile AIGC Service Providers (MASPs) at network edges to provide ubiquitous and customized content for resource-constrained users.
Such a paradigm faces two significant challenges: 1) raw prompts often lead to poor generation quality due to users' lack of experience with specific AIGC models, and 2) static service provisioning fails to efficiently utilize computational and communication resources.
We develop an interactive prompt engineering mechanism that leverages a Large Language Model (LLM) to generate customized prompt corpora and employs Inverse Reinforcement Learning (IRL) for policy imitation.
arXiv Detail & Related papers (2025-02-17T03:05:20Z) - Microservice-based edge platform for AI services [0.6291443816903802]
Two major evolutions are changing the way pervasive applications are developed.
The second is the massive use of machine learning techniques to build these applications.
We present a novel architecture and platform allowing the development of such applications in smart spaces.
arXiv Detail & Related papers (2024-12-02T09:50:51Z) - Lingma SWE-GPT: An Open Development-Process-Centric Language Model for Automated Software Improvement [62.94719119451089]
Lingma SWE-GPT series learns from and simulating real-world code submission activities.
Lingma SWE-GPT 72B resolves 30.20% of GitHub issues, marking a significant improvement in automatic issue resolution.
arXiv Detail & Related papers (2024-11-01T14:27:16Z) - An Intelligent Native Network Slicing Security Architecture Empowered by Federated Learning [0.0]
We propose an architecture-intelligent security mechanism to improve the Network Slicing solutions.
We identify Distributed Denial-of-Service (DDoS) and intrusion attacks within the slice using generic and non-native telemetry records.
arXiv Detail & Related papers (2024-10-04T21:12:23Z) - A microservice architecture for real-time IoT data processing: A
reusable Web of things approach for smart ports [4.612539452170667]
We propose a fully reusable microservice architecture, standardized through the use of the Web of things paradigm.
We present a fully reusable implementation of the architecture in the field of air quality monitoring and alerting smart ports.
arXiv Detail & Related papers (2024-01-27T11:40:38Z) - Kernel Based Cognitive Architecture for Autonomous Agents [91.3755431537592]
This paper considers an evolutionary approach to creating a cognitive functionality.
We consider a cognitive architecture which ensures the evolution of the agent on the basis of Symbol Emergence Problem solution.
arXiv Detail & Related papers (2022-07-02T12:41:32Z) - Enabling Automated Machine Learning for Model-Driven AI Engineering [60.09869520679979]
We propose a novel approach to enable Model-Driven Software Engineering and Model-Driven AI Engineering.
In particular, we support Automated ML, thus assisting software engineers without deep AI knowledge in developing AI-intensive systems.
arXiv Detail & Related papers (2022-03-06T10:12:56Z) - Empowered and Embedded: Ethics and Agile Processes [60.63670249088117]
We argue that ethical considerations need to be embedded into the (agile) software development process.
We put emphasis on the possibility to implement ethical deliberations in already existing and well established agile software development processes.
arXiv Detail & Related papers (2021-07-15T11:14:03Z) - Engineering an Intelligent Essay Scoring and Feedback System: An
Experience Report [1.5168188294440734]
We describe an exploratory system for assessing the quality of essays supplied by customers of a specialized recruitment support service.
The problem domain is challenging because the open-ended customer-supplied source text has considerable scope for ambiguity and error.
There is also a need to incorporate specialized business domain knowledge into the intelligent processing systems.
arXiv Detail & Related papers (2021-03-25T03:46:05Z) - Threshy: Supporting Safe Usage of Intelligent Web Services [4.346610687701405]
Threshy is a tool to help developers select a decision threshold suited to their problem domain.
Unlike existing tools, Threshy is designed for pre-development, pre-release, and support.
arXiv Detail & Related papers (2020-08-19T04:02:45Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.