<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cui-nmrg-llm-nm-00" category="info" submissionType="IRTF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="LLM4Net">A Framework for LLM-Assisted Network Management with Human-in-the-Loop</title>
    <seriesInfo name="Internet-Draft" value="draft-cui-nmrg-llm-nm-00"/>
    <author initials="Y." surname="Cui" fullname="Yong Cui">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>cuiyong@tsinghua.edu.cn</email>
        <uri>http://www.cuiyong.net/</uri>
      </address>
    </author>
    <author initials="M." surname="Xing" fullname="Mingzhe Xing">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>xingmz@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Zhang" fullname="Lei Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>zhanglei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>IRTF</area>
    <workgroup>Network Management Research Group</workgroup>
    <keyword>Large Language Model</keyword>
    <keyword>Network Management</keyword>
    <keyword>Human in The Loop</keyword>
    <abstract>
      <?line 153?>

<t>This document defines an interoperable framework that facilitates collaborative network management between Large Language Models (LLMs) and human operators. The proposed framework introduces enhanced telemetry module, LLM decision module and standardized interaction data models between human operators and LLM-driven systems, and workflows to enforce human oversight. The approach ensures compatibility with existing network management systems and protocols while improving automation and decision-making capabilities in network operations.</t>
    </abstract>
  </front>
  <middle>
    <?line 159?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>Traditional network automation systems struggle with handling unanticipated scenarios and managing complex multi-domain data dependencies. Large Language Models (LLMs) offer advanced multimodal data comprehension, adaptive reasoning, and generalization capabilities, making them a promising tool for network management and autonomous network<xref target="TM-IG1230"/>. However, full automation remains impractical due to risks such as model hallucination, operational errors, and the lack of accountability in decision-making<xref target="Huang25"/>. This document proposes a structured framework that integrates LLMs into network management through human-in-the-loop collaboration, leveraging their strengths while ensuring oversight, reliability, and operational safety.</t>
      </section>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t>Network management faces significant challenges, including the complexity of multi-vendor configurations, the real-time correlation of heterogeneous telemetry data, and the need for rapid responses to dynamic security threats. 
LLMs offer a promising approach to addressing these challenges through their advanced multimodal data understanding and adaptive reasoning capabilities. 
However, the direct application of LLMs in network management introduces several technical considerations. 
These include the need for semantic enrichment of network telemetry to enhance LLM comprehension, a dual-channel decision execution mechanism with confidence-based escalation, and auditability of LLM-generated decisions through provenance tracking. 
Addressing these requirements is critical to integrating LLMs effectively into network management workflows while maintaining reliability, transparency, and interoperability.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="acronyms-and-abbreviations">
        <name>Acronyms and Abbreviations</name>
        <ul spacing="normal">
          <li>
            <t>LLM: Large Language Model</t>
          </li>
          <li>
            <t>RAG: Retrieve Augmented Generation</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="framework-overview">
      <name>Framework Overview</name>
      <artwork><![CDATA[
+-------------------------------------------------------------+
|             LLM-Assisted Netwrok Management System          |
+-------------------------------------------------------------+
|+--------------------LLM Decision Module--------------------+|
||                                                           ||
||               +--Task Instance Module--+  +-------------+ ||
||               | +------+  +----------+ |  |Task Instance<-----+
||               | |Prompt|  |Fine-Tuned| <->| Mgt Module  | ||  |
||               | | Lib  |  |Weight Lib| |  +-------------+ ||  |
|| +----------+  | +------+  +----------+ |  +-------------+ ||  |
|| |RAG Module|<-> +--------------------+ |  |Config Verify| ||  |
|| +-----^----+  | |Foundation Model Lib| -->|    Module   | ||  |
||       |       | +--------------------+ |  +-------|-----+ ||  |
||       |       +----^---------------^---+  +-------v------+||  |
||       |            |               |      |Access Control|||  |
||       |            |               |      |    Module    |||  |
||       |            |               |      +-------|------+||  |
|+-------|------------|---------------|--------------|-------+|  |
|+-------v------------v----+ +--------v--------------v-------+|  |
||Enhanced Telemetry Module| |   Operator Audit Module       ||  |
|+-----------^-------------+ +--------------|-------------^--+|  |
+------------|------------------------------|-------------|---+  |
             |                              |       +-----v---+  |
             |                              |       |Operator <--+ 
             |                              |       +---------+
+------------v------------------------------v------------------+
|               Original Netwrok Management System             |
+------------------------------^-------------------------------+
                               |
+------------------------------v-------------------------------+
|                       Physical Network                       |
+--------------------------------------------------------------+

Figure 1: The LLM-Assisted Network Management Framework
]]></artwork>
      <t>The proposed framework is shown in Figure 1, highlighting the key components of LLM-assisted network management.
The human operator can generate a specific task instance, e.g., fault analysis or topology optimization, using the task instance management module.
According to the task type, the task instance module can instantiate a task instance with specific foundation model, prompt, and adaptation fine-tuned parameters<xref target="Hu22"/>.
The enahnced telemetry module improves the semantics of raw telemetry data from original network management system, providing supplementary information to the LLM decision module for more informed decision-making.
After the decision-making, the generated configuration parameters are validated against the YANG model and enforced with access control rules.
The operator audit module provides a structured mechanism for human oversight of LLM-generated configurations, and the configuration can be issued to the original network management system for deployment once the operator approves.</t>
      <section anchor="enhanced-telemetry-module">
        <name>Enhanced Telemetry Module</name>
        <t>The Enhanced Telemetry Module improves the semantics of raw telemetry data, providing supplementary information to the LLM decision module for more informed decision-making.
Telemetry data retrieved from network devices via NETCONF<xref target="RFC6241"/>, e.g., in XML format, often lacks field descriptions, structured metadata, and vendor-specific details. Since this information is not included in the pre-trained knowledge of LLMs, it can lead to misinterpretation and erroneous reasoning.
To address this limitation, an external knowledge base should be introduced to store YANG model schema, device manuals, and other relevant documentation.
The Enhanced Telemetry Module functions as middleware between the network management system and the external knowledge base. Through its southbound interface, it retrieves NETCONF data from the NETCONF client of existing network management system. Through its northbound interface, the module queries the external knowledge base for the corresponding YANG model or device manual.
To enhance semantic richness, the Enhanced Telemetry Module processes the retrieved data by simplifying formatted content (e.g., removing redundant or closing XML tags) and appending XML path and description information from the YANG tree to the relevant fields. This approach ensures that the LLM has access to structured, contextually enriched data, improving its ability to analyze and reason about network telemetry.</t>
      </section>
      <section anchor="llm-decision-module">
        <name>LLM Decision Module</name>
        <section anchor="rag-module">
          <name>RAG Module</name>
          <t>The pre-trained LLM may not encompass specific task requirements or vendor-specific knowledge. To address this kind of limitation, the Retrieve-Augmented Generation (RAG)<xref target="Lewis20"/> approach is widely used. This module retrieves relevant information from operator-defined sources, such as device documentation and expert knowledge, and integrates it with the Enhanced Telemetry Module to obtain YANG model schema.
The retrieved textual data is stored in a database, either as raw text or in a vectorized format for efficient search and retrieval. For a given task context, the module retrieves relevant knowledge from the database and incorporates it into the input context, improving the understanding and response accuracy of LLM.</t>
        </section>
        <section anchor="task-instance-module">
          <name>Task Instance Module</name>
          <t>To execute a specific task, such as traffic analysis, traffic optimization, or fault remediation, a corresponding task instance must be created. A task instance consists of a selected LLM foundation model, an associated prompt and fine-tuned weights.</t>
          <ul spacing="normal">
            <li>
              <t>Foundation Model Library. Operators must select an appropriate foundation model based on the specific task requirements. Examples include general-purpose models such as GPT-4, LLaMA, and DeepSeek, as well as domain-specific models fine-tuned on private datasets. Since foundation models are trained on different datasets using varying methodologies, their performance may differ across tasks.</t>
            </li>
            <li>
              <t>Fine-Tuned Weight Library. For domain-specific applications, fine-tuned weights can be applied on top of a foundation model to efficiently adapt it to private datasets. One commonly used approach is to store the fine-tuned weights as the difference between the original foundation model and the adapted model, which can largely reduce storage requirements.
The Fine-Tuned Weights Module supports the selection and loading of an appropriate foundation model along with the corresponding fine-tuned weights, based on the selection of operators. This ensures flexibility in leveraging both general-purpose and domain-specific knowledge while maintaining computational efficiency.</t>
            </li>
            <li>
              <t>Prompt Library. For each task, it is essential to accurately define the task description, the format of its inputs and outputs. These definitions are stored in a structured prompt library. When an operator instantiates a task, the corresponding prompt, including placeholders for contextual information, is automatically retrieved. operator inputs and device data are then incorporated into the prompt at the designated placeholders, ensuring a structured and consistent interaction with the language model.</t>
            </li>
          </ul>
        </section>
        <section anchor="task-instance-management-module">
          <name>Task Instance Management Module</name>
          <t>The Task Instance Management Module is responsible for the creation, update, and deletion of task instances. This module ensures that each instance is appropriately configured to align with the intended network management objective.</t>
        </section>
        <section anchor="config-verify-module">
          <name>Config Verify Module</name>
          <t>To ensure correctness and policy compliance, LLM-generated configurations MUST pass the YANG schema validation steps before being queued for human approval.
This module ensures that only syntactically correct configurations are presented for operator review, thereby reducing errors and enhancing network reliability.</t>
        </section>
        <section anchor="access-control-module">
          <name>Access Control Module</name>
          <t>Although the Configuration Verify Module can guarantee the syntactic correction, LLMs may generate unintended or potentially harmful operations on critical network devices, it is essential for operators to enforce clear permission boundaries for LLM task instance to ensure security and operational integrity.
The Network Configuration Access Control Model defined in <xref target="RFC8341"/> provides a framework for specifying access permissions, which can be used to grant access to LLM task instances. This data model includes the concepts of users, groups, access operation types, and action types, which can be applied as follows:</t>
          <ul spacing="normal">
            <li>
              <t>User and Group: Each task instance should be registered as a specific user, representing an entity with defined access permissions for particular devices. These permissions control the types of operations the LLM is authorized to perform. A task instance (i.e., user) is identified by a unique string within the system. Access control can also be applied at the group level, where a group consists of zero or more members, and a task instance can belong to multiple groups.</t>
            </li>
            <li>
              <t>Access Operation Types: These define the types of operations permitted, including create, read, update, delete, and execute. Each task instance may support different sets of operations depending on its assigned permissions.</t>
            </li>
            <li>
              <t>Action Types: These specify whether a given operation is permitted or denied. This mechanism determines whether an LLM request to perform an operation is allowed based on predefined access control rules.</t>
            </li>
            <li>
              <t>Rule List: A rule governs access control by specifying the content and operations a task instance is authorized to handle within the system.</t>
            </li>
          </ul>
          <t>This module must enforce explicit restrictions on the actions an LLM is permitted to perform, ensuring that network configurations remain secure and compliant with operational policies.</t>
        </section>
      </section>
      <section anchor="operator-audit-module">
        <name>Operator Audit Module</name>
        <t>The Operator Audit Module provides a structured mechanism for human oversight of LLM-generated configurations before deployment. 
The output from the LLM Decision Module should include both the generated configuration parameters and an associated confidence score.
The configuration parameters are validated for compliance with the YANG model and are subject to Access Control Rules enforcement. 
The confidence score, e.g., ranging from 0 to 100, serves as a reference for operators to assess the reliability of the generated configuration.
Each audit process must track the input context (e.g., input data, RAG query content, model selection, configuration files) and the corresponding output results. The auditing steps are as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Result Verification: The operator verifies the LLM-generated output to ensure alignment with business objectives and policy requirements.</t>
          </li>
          <li>
            <t>Compliance Check: The operator ensures that the LLM output adheres to regulatory standards and legal requirements.</t>
          </li>
          <li>
            <t>Security Verification: The operator examines the output for potential security risks, such as misconfigurations or vulnerabilities.</t>
          </li>
          <li>
            <t>Suggestions and Corrections: If issues are identified, the operator documents the findings and proposes corrective actions.</t>
          </li>
        </ul>
        <t>Upon completing the audit, the system maintains an audit decision record to ensure traceability of operator actions. The audit record includes the following information:</t>
        <ul spacing="normal">
          <li>
            <t>Timestamp of the audit action</t>
          </li>
          <li>
            <t>LLM Task Instance ID associated with the action</t>
          </li>
          <li>
            <t>Operator decisions, including approval, rejection, modification, or pending status</t>
          </li>
          <li>
            <t>Executed command reflecting the final action taken</t>
          </li>
          <li>
            <t>Operation type (e.g., configuration update, deletion, or execution)</t>
          </li>
        </ul>
        <t>This structured approach ensures that all LLM-generated configurations undergo rigorous human review, maintaining operational accountability and security.</t>
      </section>
    </section>
    <section anchor="data-model">
      <name>Data Model</name>
      <t>This section defines the essential data models for LLM-assisted network management, including the LLM decision response and human audit records.</t>
      <section anchor="llm-response-data-model">
        <name>LLM Response Data Model</name>
        <t>The LLM decision module should respond with the generated configuration parameters along with an associated confidence score. If the LLM is unable to generate a valid configuration, it should return an error message accompanied by an explanation of the issue.</t>
        <sourcecode type="yang"><![CDATA[
module: llm-response-module
  +--rw llm-response
     +--rw config?         string
     +--rw confidence?     uint64
     +--rw error-reason?   enumeration
]]></sourcecode>
        <t>The LLM response YANG model is structured as follows:</t>
        <sourcecode type="yang"><![CDATA[
module llm-response-module {
  namespace "urn:ietf:params:xml:ns:yang:ietf-nmrg-llmn4et";
  prefix llmresponse;
  container llm-response {
    leaf config {  
      type string;
    }
    leaf confidence { 
      type uint64;
    }
    leaf error-reason {  
      type enumeration {
        enum unsupported-task;
        enum unsupported-vendor;
      }
    }
  }
}
]]></sourcecode>
      </section>
      <section anchor="human-audit-data-model">
        <name>Human Audit Data Model</name>
        <t>This data model defines the structure for human audit operations and record-keeping. It facilitates collaborative decision-making by allowing LLMs to generate actionable insights while ensuring that human operators retain final operational authority.</t>
        <sourcecode type="yang"><![CDATA[
module: human-audit-module
  +--rw human-audit
     +--rw task-id?      string
     +--rw generated-config?   string
     +--rw confidence?         int64
     +--rw human-actions
        +--rw operator?          string
        +--rw action?            enumeration
        +--rw modified-config?   string
        +--rw timestamp?         yang:date-and-time
]]></sourcecode>
        <t>The human audit YANG model is structured as follows:</t>
        <sourcecode type="yang"><![CDATA[
module human-audit-module {
  namespace "urn:ietf:params:xml:ns:yang:ietf-nmrg-llmn4et";
  prefix llmaudit;
  import ietf-yang-types { prefix yang; }

  container human-audit {
    leaf task-id { 
      type string; 
      }
    leaf generated-config { 
      type string; 
      }  
    leaf confidence { 
      type int64; 
      }
    container human-actions {                  
      leaf operator { 
        type string; 
        } 
      leaf action { 
        type enumeration { 
          enum approve; 
          enum modify; 
          enum reject; 
          } 
        }
      leaf modified-config { 
        type string; 
        }
      leaf timestamp { 
        type yang:date-and-time; 
        }
    }
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <ul spacing="normal">
        <li>
          <t>Model Hallucination: A key challenge is that, without proper constraints, the LLM may produce malformed or invalid configurations. This issue can be mitigated using techniques such as Constrained Decoding, which enforces syntactic correctness by modeling the configuration syntax and restricting the output to conform to predefined rules during the generation process.</t>
        </li>
        <li>
          <t>Training Data Poisoning: LLMs can be trained on malicious or biased data, potentially leading to unintended behavior or security vulnerabilities. To mitigate this risk, LLMs should be trained on curated, high-quality datasets with rigorous validation and filtering processes. Periodic retraining and adversarial testing should also be conducted to detect and correct anomalies before deployment.</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="TM-IG1230">
          <front>
            <title>Autonomous Networks Technical Architecture</title>
            <author initials="K." surname="McDonnell" fullname="Kevin McDonnell">
              <organization/>
            </author>
            <author initials="A." surname="Machwe" fullname="Azahar Machwe">
              <organization/>
            </author>
            <author initials="D." surname="Milham" fullname="Dave Milham">
              <organization/>
            </author>
            <author initials="J." surname="O’Sullivan" fullname="James O’Sullivan">
              <organization/>
            </author>
            <author initials="J." surname="Niemöller" fullname="Jörg Niemöller">
              <organization/>
            </author>
            <author initials="L. F." surname="Varvello" fullname="Luca Franco Varvello">
              <organization/>
            </author>
            <author initials="V." surname="Devadatta" fullname="Vinay Devadatta">
              <organization/>
            </author>
            <author initials="W." surname="Lei" fullname="Wang Lei">
              <organization/>
            </author>
            <author initials="W." surname="Xu" fullname="Wang Xu">
              <organization/>
            </author>
            <author initials="X." surname="Yuan" fullname="Xie Yuan">
              <organization/>
            </author>
            <author initials="Y." surname="Stein" fullname="Yuval Stein">
              <organization/>
            </author>
            <date year="2023" month="February"/>
          </front>
        </reference>
        <reference anchor="Huang25">
          <front>
            <title>A Survey on Hallucination in Large Language Models Principles, Taxonomy, Challenges, and Open Questions</title>
            <author initials="L." surname="Huang," fullname="Lei Huang,">
              <organization/>
            </author>
            <author initials="W." surname="Yu" fullname="Weijiang Yu">
              <organization/>
            </author>
            <author initials="W." surname="Ma" fullname="Weitao Ma">
              <organization/>
            </author>
            <author initials="W." surname="Zhong" fullname="Weihong Zhong">
              <organization/>
            </author>
            <author initials="Z." surname="Feng" fullname="Zhangyin Feng">
              <organization/>
            </author>
            <author initials="H." surname="Wang" fullname="Haotian Wang">
              <organization/>
            </author>
            <author initials="Q." surname="Chen" fullname="Qianglong Chen">
              <organization/>
            </author>
            <author initials="W." surname="Peng" fullname="Weihua Peng">
              <organization/>
            </author>
            <author initials="X." surname="Feng" fullname="Xiaocheng Feng">
              <organization/>
            </author>
            <author initials="B." surname="Qin" fullname="Bing Qin">
              <organization/>
            </author>
            <author initials="T." surname="Liu" fullname="Ting Liu">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Hu22">
          <front>
            <title>LoRA Low-Rank Adaptation of Large Language Models</title>
            <author initials="E. J." surname="Hu" fullname="Edward J Hu">
              <organization/>
            </author>
            <author initials="Y." surname="Shen" fullname="Yelong Shen">
              <organization/>
            </author>
            <author initials="P." surname="Wallis" fullname="Phillip Wallis">
              <organization/>
            </author>
            <author initials="Z." surname="Allen-Zhu" fullname="Zeyuan Allen-Zhu">
              <organization/>
            </author>
            <author initials="Y." surname="Li" fullname="Yuanzhi Li">
              <organization/>
            </author>
            <author initials="S." surname="Wang" fullname="Shean Wang">
              <organization/>
            </author>
            <author initials="L." surname="Wang" fullname="Lu Wang">
              <organization/>
            </author>
            <author initials="W." surname="Chen" fullname="Weizhu Chen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Lewis20">
          <front>
            <title>Retrieval-augmented generation for knowledge-intensive NLP tasks</title>
            <author initials="P." surname="Lewis" fullname="Patrick Lewis">
              <organization/>
            </author>
            <author initials="E." surname="Perez" fullname="Ethan Perez">
              <organization/>
            </author>
            <author initials="A." surname="Piktus" fullname="Aleksandra Piktus">
              <organization/>
            </author>
            <author initials="F." surname="Petroni" fullname="Fabio Petroni">
              <organization/>
            </author>
            <author initials="V." surname="Karpukhin" fullname="Vladimir Karpukhin">
              <organization/>
            </author>
            <author initials="N." surname="Goyal" fullname="Naman Goyal">
              <organization/>
            </author>
            <author initials="H." surname="Küttler" fullname="Heinrich Küttler">
              <organization/>
            </author>
            <author initials="M." surname="Lewis" fullname="Mike Lewis">
              <organization/>
            </author>
            <author initials="W.-t." surname="Yih" fullname="Wen-tau Yih">
              <organization/>
            </author>
            <author initials="T." surname="Rocktäschel" fullname="Tim Rocktäschel">
              <organization/>
            </author>
            <author initials="S." surname="Riede" fullname="Sebastian Riede">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 399?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
