<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-nmrg-llm-nm-00" category="info" submissionType="IRTF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="LLM4Net">A Framework for LLM-Assisted Network Management with Human-in-the-Loop</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-llm-nm-00"/>
    <author initials="Y." surname="Cui" fullname="Yong Cui">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>cuiyong@tsinghua.edu.cn</email>
        <uri>http://www.cuiyong.net/</uri>
      </address>
    </author>
    <author initials="M." surname="Xing" fullname="Mingzhe Xing">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>xingmz@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Zhang" fullname="Lei Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>zhanglei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>IRTF</area>
    <workgroup>Network Management Research Group</workgroup>
    <keyword>Large Language Model</keyword>
    <keyword>Network Management</keyword>
    <keyword>Human in The Loop</keyword>
    <abstract>
      <?line 153?>

<t>This document defines an interoperable framework that facilitates collaborative network management between Large Language Models (LLMs) and human operators. The proposed framework introduces enhanced telemetry module, LLM decision module and standardized interaction data models between human operators and LLM-driven systems, and workflows to enforce human oversight. The approach ensures compatibility with existing network management systems and protocols while improving automation and decision-making capabilities in network operations.</t>
    </abstract>
  </front>
  <middle>
    <?line 159?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>Traditional network automation systems struggle with handling unanticipated scenarios and managing complex multi-domain data dependencies. Large Language Models (LLMs) offer advanced multimodal data comprehension, adaptive reasoning, and generalization capabilities, making them a promising tool for network management and autonomous network<xref target="TM-IG1230"/>. However, full automation remains impractical due to risks such as model hallucination, operational errors, and the lack of accountability in decision-making<xref target="Huang25"/>. This document proposes a structured framework that integrates LLMs into network management through human-in-the-loop collaboration, leveraging their strengths while ensuring oversight, reliability, and operational safety.</t>
      </section>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t>Network management faces significant challenges, including the complexity of multi-vendor configurations, the real-time correlation of heterogeneous telemetry data, and the need for rapid responses to dynamic security threats. 
LLMs offer a promising approach to addressing these challenges through their advanced multimodal data understanding and adaptive reasoning capabilities. 
However, the direct application of LLMs in network management introduces several technical considerations. 
These include the need for semantic enrichment of network telemetry to enhance LLM comprehension, a dual-channel decision execution mechanism with confidence-based escalation, and auditability of LLM-generated decisions through provenance tracking. 
Addressing these requirements is critical to integrating LLMs effectively into network management workflows while maintaining reliability, transparency, and interoperability.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="acronyms-and-abbreviations">
        <name>Acronyms and Abbreviations</name>
        <ul spacing="normal">
          <li>
            <t>LLM: Large Language Model</t>
          </li>
          <li>
            <t>RAG: Retrieve Augmented Generation</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="framework-overview">
      <name>Framework Overview</name>
      <artwork><![CDATA[
+-------------------------------------------------------------+
|             LLM-Assisted Netwrok Management System          |
+-------------------------------------------------------------+
|+--------------------LLM Decision Module--------------------+|
||                                                           ||
||               +--Task Instance Module--+  +-------------+ ||
||               | +------+  +----------+ |  |Task Instance<-----+
||               | |Prompt|  |Fine-Tuned| <->| Mgt Module  | ||  |
||               | | Lib  |  |Weight Lib| |  +-------------+ ||  |
|| +----------+  | +------+  +----------+ |  +-------------+ ||  |
|| |RAG Module|<-> +--------------------+ |  |Config Verify| ||  |
|| +-----^----+  | |Foundation Model Lib| -->|    Module   | ||  |
||       |       | +--------------------+ |  +-------|-----+ ||  |
||       |       +----^---------------^---+  +-------v------+||  |
||       |            |               |      |Access Control|||  |
||       |            |               |      |    Module    |||  |
||       |            |               |      +-------|------+||  |
|+-------|------------|---------------|--------------|-------+|  |
|+-------v------------v----+ +--------v--------------v-------+|  |
||Enhanced Telemetry Module| |   Operator Audit Module       ||  |
|+-----------^-------------+ +--------------|-------------^--+|  |
+------------|------------------------------|-------------|---+  |
             |                              |       +-----v---+  |
             |                              |       |Operator <--+ 
             |                              |       +---------+
+------------v------------------------------v------------------+
|               Original Netwrok Management System             |
+------------------------------^-------------------------------+
                               |
+------------------------------v-------------------------------+
|                       Physical Network                       |
+--------------------------------------------------------------+

Figure 1: The LLM-Assisted Network Management Framework
]]></artwork>
      <t>The proposed framework is shown in Figure 1, highlighting the key components of LLM-assisted network management.
The human operator can generate a specific task instance, e.g., fault analysis or topology optimization, using the task instance management module.
According to the task type, the task instance module can instantiate a task instance with specific foundation model, prompt, and adaptation fine-tuned parameters<xref target="Hu22"/>.
The enahnced telemetry module improves the semantics of raw telemetry data from original network management system, providing supplementary information to the LLM decision module for more informed decision-making.
After the decision-making, the generated configuration parameters are validated against the YANG model and enforced with access control rules.
The operator audit module provides a structured mechanism for human oversight of LLM-generated configurations, and the configuration can be issued to the original network management system for deployment once the operator approves.</t>
      <section anchor="enhanced-telemetry-module">
        <name>Enhanced Telemetry Module</name>
        <t>The Enhanced Telemetry Module improves the semantics of raw telemetry data, providing supplementary information to the LLM decision module for more informed decision-making.
Telemetry data retrieved from network devices via NETCONF<xref target="RFC6241"/>, e.g., in XML format, often lacks field descriptions, structured metadata, and vendor-specific details. Since this information is not included in the pre-trained knowledge of LLMs, it can lead to misinterpretation and erroneous reasoning.
To address this limitation, an external knowledge base should be introduced to store YANG model schema, device manuals, and other relevant documentation.
The Enhanced Telemetry Module functions as middleware between the network management system and the external knowledge base. Through its southbound interface, it retrieves NETCONF data from the NETCONF client of existing network management system. Through its northbound interface, the module queries the external knowledge base for the corresponding YANG model or device manual.
To enhance semantic richness, the Enhanced Telemetry Module processes the retrieved data by simplifying formatted content (e.g., removing redundant or closing XML tags) and appending XML path and description information from the YANG tree to the relevant fields. This approach ensures that the LLM has access to structured, contextually enriched data, improving its ability to analyze and reason about network telemetry.</t>
      </section>
      <section anchor="llm-decision-module">
        <name>LLM Decision Module</name>
        <section anchor="rag-module">
          <name>RAG Module</name>
          <t>The pre-trained LLM may not encompass specific task requirements or vendor-specific knowledge. To address this kind of limitation, the Retrieve-Augmented Generation (RAG)<xref target="Lewis20"/> approach is widely used. This module retrieves relevant information from operator-defined sources, such as device documentation and expert knowledge, and integrates it with the Enhanced Telemetry Module to obtain YANG model schema.
The retrieved textual data is stored in a database, either as raw text or in a vectorized format for efficient search and retrieval. For a given task context, the module retrieves relevant knowledge from the database and incorporates it into the input context, improving the understanding and response accuracy of LLM.</t>
        </section>
        <section anchor="task-instance-module">
          <name>Task Instance Module</name>
          <t>To execute a specific task, such as traffic analysis, traffic optimization, or fault remediation, a corresponding task instance must be created. A task instance consists of a selected LLM foundation model, an associated prompt and fine-tuned weights.</t>
          <ul spacing="normal">
            <li>
              <t>Foundation Model Library. Operators must select an appropriate foundation model based on the specific task requirements. Examples include general-purpose models such as GPT-4, LLaMA, and DeepSeek, as well as domain-specific models fine-tuned on private datasets. Since foundation models are trained on different datasets using varying methodologies, their performance may differ across tasks.</t>
            </li>
            <li>
              <t>Fine-Tuned Weight Library. For domain-specific applications, fine-tuned weights can be applied on top of a foundation model to efficiently adapt it to private datasets. One commonly used approach is to store the fine-tuned weights as the difference between the original foundation model and the adapted model, which can largely reduce storage requirements.
The Fine-Tuned Weights Module supports the selection and loading of an appropriate foundation model along with the corresponding fine-tuned weights, based on the selection of operators. This ensures flexibility in leveraging both general-purpose and domain-specific knowledge while maintaining computational efficiency.</t>
            </li>
            <li>
              <t>Prompt Library. For each task, it is essential to accurately define the task description, the format of its inputs and outputs. These definitions are stored in a structured prompt library. When an operator instantiates a task, the corresponding prompt, including placeholders for contextual information, is automatically retrieved. operator inputs and device data are then incorporated into the prompt at the designated placeholders, ensuring a structured and consistent interaction with the language model.</t>
            </li>
          </ul>
        </section>
        <section anchor="task-instance-management-module">
          <name>Task Instance Management Module</name>
          <t>The Task Instance Management Module is responsible for the creation, update, and deletion of task instances. This module ensures that each instance is appropriately configured to align with the intended network management objective.</t>
        </section>
        <section anchor="config-verify-module">
          <name>Config Verify Module</name>
          <t>To ensure correctness and policy compliance, LLM-generated configurations MUST pass the YANG schema validation steps before being queued for human approval.
This module ensures that only syntactically correct configurations are presented for operator review, thereby reducing errors and enhancing network reliability.</t>
        </section>
        <section anchor="access-control-module">
          <name>Access Control Module</name>
          <t>Although the Configuration Verify Module can guarantee the syntactic correction, LLMs may generate unintended or potentially harmful operations on critical network devices, it is essential for operators to enforce clear permission boundaries for LLM task instance to ensure security and operational integrity.
The Network Configuration Access Control Model defined in <xref target="RFC8341"/> provides a framework for specifying access permissions, which can be used to grant access to LLM task instances. This data model includes the concepts of users, groups, access operation types, and action types, which can be applied as follows:</t>
          <ul spacing="normal">
            <li>
              <t>User and Group: Each task instance should be registered as a specific user, representing an entity with defined access permissions for particular devices. These permissions control the types of operations the LLM is authorized to perform. A task instance (i.e., user) is identified by a unique string within the system. Access control can also be applied at the group level, where a group consists of zero or more members, and a task instance can belong to multiple groups.</t>
            </li>
            <li>
              <t>Access Operation Types: These define the types of operations permitted, including create, read, update, delete, and execute. Each task instance may support different sets of operations depending on its assigned permissions.</t>
            </li>
            <li>
              <t>Action Types: These specify whether a given operation is permitted or denied. This mechanism determines whether an LLM request to perform an operation is allowed based on predefined access control rules.</t>
            </li>
            <li>
              <t>Rule List: A rule governs access control by specifying the content and operations a task instance is authorized to handle within the system.</t>
            </li>
          </ul>
          <t>This module must enforce explicit restrictions on the actions an LLM is permitted to perform, ensuring that network configurations remain secure and compliant with operational policies.</t>
        </section>
      </section>
      <section anchor="operator-audit-module">
        <name>Operator Audit Module</name>
        <t>The Operator Audit Module provides a structured mechanism for human oversight of LLM-generated configurations before deployment. 
The output from the LLM Decision Module should include both the generated configuration parameters and an associated confidence score.
The configuration parameters are validated for compliance with the YANG model and are subject to Access Control Rules enforcement. 
The confidence score, e.g., ranging from 0 to 100, serves as a reference for operators to assess the reliability of the generated configuration.
Each audit process must track the input context (e.g., input data, RAG query content, model selection, configuration files) and the corresponding output results. The auditing steps are as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Result Verification: The operator verifies the LLM-generated output to ensure alignment with business objectives and policy requirements.</t>
          </li>
          <li>
            <t>Compliance Check: The operator ensures that the LLM output adheres to regulatory standards and legal requirements.</t>
          </li>
          <li>
            <t>Security Verification: The operator examines the output for potential security risks, such as misconfigurations or vulnerabilities.</t>
          </li>
          <li>
            <t>Suggestions and Corrections: If issues are identified, the operator documents the findings and proposes corrective actions.</t>
          </li>
        </ul>
        <t>Upon completing the audit, the system maintains an audit decision record to ensure traceability of operator actions. The audit record includes the following information:</t>
        <ul spacing="normal">
          <li>
            <t>Timestamp of the audit action</t>
          </li>
          <li>
            <t>LLM Task Instance ID associated with the action</t>
          </li>
          <li>
            <t>Operator decisions, including approval, rejection, modification, or pending status</t>
          </li>
          <li>
            <t>Executed command reflecting the final action taken</t>
          </li>
          <li>
            <t>Operation type (e.g., configuration update, deletion, or execution)</t>
          </li>
        </ul>
        <t>This structured approach ensures that all LLM-generated configurations undergo rigorous human review, maintaining operational accountability and security.</t>
      </section>
    </section>
    <section anchor="data-model">
      <name>Data Model</name>
      <t>This section defines the essential data models for LLM-assisted network management, including the LLM decision response and human audit records.</t>
      <section anchor="llm-response-data-model">
        <name>LLM Response Data Model</name>
        <t>The LLM decision module should respond with the generated configuration parameters along with an associated confidence score. If the LLM is unable to generate a valid configuration, it should return an error message accompanied by an explanation of the issue.</t>
        <sourcecode type="yang"><![CDATA[
module: llm-response-module
  +--rw llm-response
     +--rw config?         string
     +--rw confidence?     uint64
     +--rw error-reason?   enumeration
]]></sourcecode>
        <t>The LLM response YANG model is structured as follows:</t>
        <sourcecode type="yang"><![CDATA[
module llm-response-module {
  namespace "urn:ietf:params:xml:ns:yang:ietf-nmrg-llmn4et";
  prefix llmresponse;
  container llm-response {
    leaf config {  
      type string;
    }
    leaf confidence { 
      type uint64;
    }
    leaf error-reason {  
      type enumeration {
        enum unsupported-task;
        enum unsupported-vendor;
      }
    }
  }
}
]]></sourcecode>
      </section>
      <section anchor="human-audit-data-model">
        <name>Human Audit Data Model</name>
        <t>This data model defines the structure for human audit operations and record-keeping. It facilitates collaborative decision-making by allowing LLMs to generate actionable insights while ensuring that human operators retain final operational authority.</t>
        <sourcecode type="yang"><![CDATA[
module: human-audit-module
  +--rw human-audit
     +--rw task-id?      string
     +--rw generated-config?   string
     +--rw confidence?         int64
     +--rw human-actions
        +--rw operator?          string
        +--rw action?            enumeration
        +--rw modified-config?   string
        +--rw timestamp?         yang:date-and-time
]]></sourcecode>
        <t>The human audit YANG model is structured as follows:</t>
        <sourcecode type="yang"><![CDATA[
module human-audit-module {
  namespace "urn:ietf:params:xml:ns:yang:ietf-nmrg-llmn4et";
  prefix llmaudit;
  import ietf-yang-types { prefix yang; }

  container human-audit {
    leaf task-id { 
      type string; 
      }
    leaf generated-config { 
      type string; 
      }  
    leaf confidence { 
      type int64; 
      }
    container human-actions {                  
      leaf operator { 
        type string; 
        } 
      leaf action { 
        type enumeration { 
          enum approve; 
          enum modify; 
          enum reject; 
          } 
        }
      leaf modified-config { 
        type string; 
        }
      leaf timestamp { 
        type yang:date-and-time; 
        }
    }
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <ul spacing="normal">
        <li>
          <t>Model Hallucination: A key challenge is that, without proper constraints, the LLM may produce malformed or invalid configurations. This issue can be mitigated using techniques such as Constrained Decoding, which enforces syntactic correctness by modeling the configuration syntax and restricting the output to conform to predefined rules during the generation process.</t>
        </li>
        <li>
          <t>Training Data Poisoning: LLMs can be trained on malicious or biased data, potentially leading to unintended behavior or security vulnerabilities. To mitigate this risk, LLMs should be trained on curated, high-quality datasets with rigorous validation and filtering processes. Periodic retraining and adversarial testing should also be conducted to detect and correct anomalies before deployment.</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="TM-IG1230">
          <front>
            <title>Autonomous Networks Technical Architecture</title>
            <author initials="K." surname="McDonnell" fullname="Kevin McDonnell">
              <organization/>
            </author>
            <author initials="A." surname="Machwe" fullname="Azahar Machwe">
              <organization/>
            </author>
            <author initials="D." surname="Milham" fullname="Dave Milham">
              <organization/>
            </author>
            <author initials="J." surname="O’Sullivan" fullname="James O’Sullivan">
              <organization/>
            </author>
            <author initials="J." surname="Niemöller" fullname="Jörg Niemöller">
              <organization/>
            </author>
            <author initials="L. F." surname="Varvello" fullname="Luca Franco Varvello">
              <organization/>
            </author>
            <author initials="V." surname="Devadatta" fullname="Vinay Devadatta">
              <organization/>
            </author>
            <author initials="W." surname="Lei" fullname="Wang Lei">
              <organization/>
            </author>
            <author initials="W." surname="Xu" fullname="Wang Xu">
              <organization/>
            </author>
            <author initials="X." surname="Yuan" fullname="Xie Yuan">
              <organization/>
            </author>
            <author initials="Y." surname="Stein" fullname="Yuval Stein">
              <organization/>
            </author>
            <date year="2023" month="February"/>
          </front>
        </reference>
        <reference anchor="Huang25">
          <front>
            <title>A Survey on Hallucination in Large Language Models Principles, Taxonomy, Challenges, and Open Questions</title>
            <author initials="L." surname="Huang," fullname="Lei Huang,">
              <organization/>
            </author>
            <author initials="W." surname="Yu" fullname="Weijiang Yu">
              <organization/>
            </author>
            <author initials="W." surname="Ma" fullname="Weitao Ma">
              <organization/>
            </author>
            <author initials="W." surname="Zhong" fullname="Weihong Zhong">
              <organization/>
            </author>
            <author initials="Z." surname="Feng" fullname="Zhangyin Feng">
              <organization/>
            </author>
            <author initials="H." surname="Wang" fullname="Haotian Wang">
              <organization/>
            </author>
            <author initials="Q." surname="Chen" fullname="Qianglong Chen">
              <organization/>
            </author>
            <author initials="W." surname="Peng" fullname="Weihua Peng">
              <organization/>
            </author>
            <author initials="X." surname="Feng" fullname="Xiaocheng Feng">
              <organization/>
            </author>
            <author initials="B." surname="Qin" fullname="Bing Qin">
              <organization/>
            </author>
            <author initials="T." surname="Liu" fullname="Ting Liu">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Hu22">
          <front>
            <title>LoRA Low-Rank Adaptation of Large Language Models</title>
            <author initials="E. J." surname="Hu" fullname="Edward J Hu">
              <organization/>
            </author>
            <author initials="Y." surname="Shen" fullname="Yelong Shen">
              <organization/>
            </author>
            <author initials="P." surname="Wallis" fullname="Phillip Wallis">
              <organization/>
            </author>
            <author initials="Z." surname="Allen-Zhu" fullname="Zeyuan Allen-Zhu">
              <organization/>
            </author>
            <author initials="Y." surname="Li" fullname="Yuanzhi Li">
              <organization/>
            </author>
            <author initials="S." surname="Wang" fullname="Shean Wang">
              <organization/>
            </author>
            <author initials="L." surname="Wang" fullname="Lu Wang">
              <organization/>
            </author>
            <author initials="W." surname="Chen" fullname="Weizhu Chen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Lewis20">
          <front>
            <title>Retrieval-augmented generation for knowledge-intensive NLP tasks</title>
            <author initials="P." surname="Lewis" fullname="Patrick Lewis">
              <organization/>
            </author>
            <author initials="E." surname="Perez" fullname="Ethan Perez">
              <organization/>
            </author>
            <author initials="A." surname="Piktus" fullname="Aleksandra Piktus">
              <organization/>
            </author>
            <author initials="F." surname="Petroni" fullname="Fabio Petroni">
              <organization/>
            </author>
            <author initials="V." surname="Karpukhin" fullname="Vladimir Karpukhin">
              <organization/>
            </author>
            <author initials="N." surname="Goyal" fullname="Naman Goyal">
              <organization/>
            </author>
            <author initials="H." surname="Küttler" fullname="Heinrich Küttler">
              <organization/>
            </author>
            <author initials="M." surname="Lewis" fullname="Mike Lewis">
              <organization/>
            </author>
            <author initials="W.-t." surname="Yih" fullname="Wen-tau Yih">
              <organization/>
            </author>
            <author initials="T." surname="Rocktäschel" fullname="Tim Rocktäschel">
              <organization/>
            </author>
            <author initials="S." surname="Riede" fullname="Sebastian Riede">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 399?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
