Goto

Collaborating Authors

 management task



Social-Inverse: Inverse Decision-making of Social Contagion Management with Task Migrations

Neural Information Processing Systems

Our main contribution is a generic framework, called Social-Inverse, for handling migrations between tasks of diffusion enhancement and diffusion containment. For Social-Inverse, we present theoretical analysis to obtain insights regarding how different contagion management tasks can be subtly correlated in order for samples from one task to help the optimization of another task.


Cloud Infrastructure Management in the Age of AI Agents

Yang, Zhenning, Bhatnagar, Archit, Qiu, Yiming, Miao, Tongyuan, Kon, Patrick Tser Jern, Xiao, Yunming, Huang, Yibo, Casado, Martin, Chen, Ang

arXiv.org Artificial Intelligence

Cloud infrastructure is the cornerstone of the modern IT industry. However, managing this infrastructure effectively requires considerable manual effort from the DevOps engineering team. We make a case for developing AI agents powered by large language models (LLMs) to automate cloud infrastructure management tasks. In a preliminary study, we investigate the potential for AI agents to use different cloud/user interfaces such as software development kits (SDK), command line interfaces (CLI), Infrastructure-as-Code (IaC) platforms, and web portals. We report takeaways on their effectiveness on different management tasks, and identify research challenges and potential solutions.


To Patch or Not to Patch: Motivations, Challenges, and Implications for Cybersecurity

Nurse, Jason R. C.

arXiv.org Artificial Intelligence

As technology has become more embedded into our society, the security of modern-day systems is paramount. One topic which is constantly under discussion is that of patching, or more specifically, the installation of updates that remediate security vulnerabilities in software or hardware systems. This continued deliberation is motivated by complexities involved with patching; in particular, the various incentives and disincentives for organizations and their cybersecurity teams when deciding whether to patch. In this paper, we take a fresh look at the question of patching and critically explore why organizations and IT/security teams choose to patch or decide against it (either explicitly or due to inaction). We tackle this question by aggregating and synthesizing prominent research and industry literature on the incentives and disincentives for patching, specifically considering the human aspects in the context of these motives. Through this research, this study identifies key motivators such as organizational needs, the IT/security team's relationship with vendors, and legal and regulatory requirements placed on the business and its staff. There are also numerous significant reasons discovered for why the decision is taken not to patch, including limited resources (e.g., person-power), challenges with manual patch management tasks, human error, bad patches, unreliable patch management tools, and the perception that related vulnerabilities would not be exploited. These disincentives, in combination with the motivators above, highlight the difficult balance that organizations and their security teams need to maintain on a daily basis. Finally, we conclude by discussing implications of these findings and important future considerations.


Large Language Models for Knowledge-Free Network Management: Feasibility Study and Opportunities

Lee, Hoon, Kim, Mintae, Baek, Seunghwan, Lee, Namyoon, Debbah, Merouane, Lee, Inkyu

arXiv.org Artificial Intelligence

Traditional network management algorithms have relied on prior knowledge of system models and networking scenarios. In practice, a universal optimization framework is desirable where a sole optimization module can be readily applied to arbitrary network management tasks without any knowledge of the system. To this end, knowledge-free optimization techniques are necessary whose operations are independent of scenario-specific information including objective functions, system parameters, and network setups. The major challenge of this paradigm-shifting approach is the requirement of a hyperintelligent black-box optimizer that can establish efficient decision-making policies using its internal reasoning capabilities. This article presents a novel knowledge-free network management paradigm with the power of foundation models called large language models (LLMs). Trained on vast amounts of datasets, LLMs can understand important contexts from input prompts containing minimal system information, thereby offering remarkable inference performance even for entirely new tasks. Pretrained LLMs can be potentially leveraged as foundation models for versatile network optimization. By eliminating the dependency on prior knowledge, LLMs can be seamlessly applied for various network management tasks. The viability of this approach is demonstrated for resource management problems using GPT-3.5-Turbo. Numerical results validate that knowledge-free LLM optimizers are able to achieve comparable performance to existing knowledge-based optimization algorithms. H. Lee is with the Department of Electrical Engineering and the Artificial Intelligence Graduate School, Ulsan National Institute of Science and Technology (UNIST), Ulsan, 44919, Korea.


How ChatGPT is Solving Vulnerability Management Problem

Liu, Peiyu, Liu, Junming, Fu, Lirong, Lu, Kangjie, Xia, Yifan, Zhang, Xuhong, Chen, Wenzhi, Weng, Haiqin, Ji, Shouling, Wang, Wenhai

arXiv.org Artificial Intelligence

Recently, ChatGPT has attracted great attention from the code analysis domain. Prior works show that ChatGPT has the capabilities of processing foundational code analysis tasks, such as abstract syntax tree generation, which indicates the potential of using ChatGPT to comprehend code syntax and static behaviors. However, it is unclear whether ChatGPT can complete more complicated real-world vulnerability management tasks, such as the prediction of security relevance and patch correctness, which require an all-encompassing understanding of various aspects, including code syntax, program semantics, and related manual comments. In this paper, we explore ChatGPT's capabilities on 6 tasks involving the complete vulnerability management process with a large-scale dataset containing 78,445 samples. For each task, we compare ChatGPT against SOTA approaches, investigate the impact of different prompts, and explore the difficulties. The results suggest promising potential in leveraging ChatGPT to assist vulnerability management. One notable example is ChatGPT's proficiency in tasks like generating titles for software bug reports. Furthermore, our findings reveal the difficulties encountered by ChatGPT and shed light on promising future directions. For instance, directly providing random demonstration examples in the prompt cannot consistently guarantee good performance in vulnerability management. By contrast, leveraging ChatGPT in a self-heuristic way -- extracting expertise from demonstration examples itself and integrating the extracted expertise in the prompt is a promising research direction. Besides, ChatGPT may misunderstand and misuse the information in the prompt. Consequently, effectively guiding ChatGPT to focus on helpful information rather than the irrelevant content is still an open problem.


Enhancing Network Management Using Code Generated by Large Language Models

Mani, Sathiya Kumaran, Zhou, Yajie, Hsieh, Kevin, Segarra, Santiago, Chandra, Ranveer, Kandula, Srikanth

arXiv.org Artificial Intelligence

Analyzing network topologies and communication graphs plays a crucial role in contemporary network management. However, the absence of a cohesive approach leads to a challenging learning curve, heightened errors, and inefficiencies. In this paper, we introduce a novel approach to facilitate a natural-language-based network management experience, utilizing large language models (LLMs) to generate task-specific code from natural language queries. This method tackles the challenges of explainability, scalability, and privacy by allowing network operators to inspect the generated code, eliminating the need to share network data with LLMs, and concentrating on application-specific requests combined with general program synthesis techniques. We design and evaluate a prototype system using benchmark applications, showcasing high accuracy, cost-effectiveness, and the potential for further enhancements using complementary program synthesis techniques.


Social-Inverse: Inverse Decision-making of Social Contagion Management with Task Migrations

Tong, Guangmo

arXiv.org Artificial Intelligence

Considering two decision-making tasks $A$ and $B$, each of which wishes to compute an effective \textit{decision} $Y$ for a given \textit{query} $X$, {can we solve task $B$ by using query-decision pairs $(X, Y)$ of $A$ without knowing the latent decision-making model?} Such problems, called \textit{inverse decision-making with task migrations}, are of interest in that the complex and stochastic nature of real-world applications often prevents the agent from completely knowing the underlying system. In this paper, we introduce such a new problem with formal formulations and present a generic framework for addressing decision-making tasks in social contagion management. On the theory side, we present a generalization analysis for justifying the learning performance of our framework. In empirical studies, we perform a sanity check and compare the presented method with other possible learning-based and graph-based methods. We have acquired promising experimental results, confirming for the first time that it is possible to solve one decision-making task by using the solutions associated with another one.


AI to replace 69% of manager's workload by 2024: Gartner

#artificialintelligence

Mumbai: Artificial Intelligence (AI) and emerging technologies such as virtual personal assistants and chatbots will replace almost 69 per cent of the manager's workload by 2024, according to a prediction by research and advisory firm Gartner on Thursday. "The role of manager will see a complete overhaul in the next four years," Helen Poitevin, Research Vice-President at Gartner, said in a statement. "Currently, managers often need to spend time filling in forms, updating information and approving workflows. By using AI to automate these tasks, they can spend less time managing transactions and can invest more time on learning, performance management and goal setting," Poitevin said. AI and emerging technologies will undeniably change the role of the manager and will allow employees to extend their degree of responsibility and influence, without taking on management tasks.


Increased automation to open more doors to disabled people, says Gartner

#artificialintelligence

The Gartner report, 'Predicts 2020: AI and the Future of Work', predicted that 69% of routine work by managers will be replaced by AI and emerging automation technologies by 2024. That proportion of managerial admin is expected to be offloaded to technologies such as chatbots and virtual personal assistants. This shift in reliance on technology is expected to empower employees more, giving them more responsibility and scope for influence without needing to take on management tasks. Matt Weston, Managing Director of Robert Half UK, examines the future of the workplace as automation and artificial intelligence shift the landscape. "The role of manager will see a complete overhaul in the next four years," said Helen Poitevin, research vice president at Gartner.