New features: - 12 interactive visualizations (ietf viz): t-SNE landscape, similarity heatmap, score distributions, timeline, bubble explorer, radar charts, author network graph, category treemap, quality vs overlap, org bar chart, ideas chart, and interactive draft browser - Interactive draft browser (browser.html): filterable by category, keyword, score sliders with sortable table and expandable detail rows - arXiv paper (paper/main.tex): 13-page manuscript with all findings - Gap analysis: 12 identified under-addressed areas - Author network: collaboration graph, org contributions, cross-org analysis - Draft generation from gaps (ietf draft-gen) - Auto-load .env for API keys (python-dotenv) New modules: visualize.py, authors.py, draftgen.py New reports: timeline, overlap-matrix, authors, gaps New deps: plotly, matplotlib, seaborn, scipy, scikit-learn, networkx, python-dotenv Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
7 lines
62 KiB
HTML
7 lines
62 KiB
HTML
<html>
|
|
<head><meta charset="utf-8" /></head>
|
|
<body>
|
|
<div> <script type="text/javascript">window.PlotlyConfig = {MathJaxConfig: 'local'};</script>
|
|
<script charset="utf-8" src="https://cdn.plot.ly/plotly-3.3.1.min.js" integrity="sha256-4rD3fugVb/nVJYUv5Ky3v+fYXoouHaBSP20WIJuEiWg=" crossorigin="anonymous"></script> <div id="77bade88-bc60-4bb9-9817-6275b646ee20" class="plotly-graph-div" style="height:800px; width:1200px;"></div> <script type="text/javascript"> window.PLOTLYENV=window.PLOTLYENV || {}; if (document.getElementById("77bade88-bc60-4bb9-9817-6275b646ee20")) { Plotly.newPlot( "77bade88-bc60-4bb9-9817-6275b646ee20", [{"customdata":[["Specifies transport of Agent-to-Agent protocol over Media over QUIC Transport. L",3.15,"A2A protocols"],["Proposes an Intelligent Agent Communication Gateway for large-scale multi-agent ",3.9,"A2A protocols"],["Defines semantic communication protocol for AI agents using intent-based routing",3.9499999999999997,"A2A protocols"],["Proposes Data and Agent Aware-Inference and Training Network (DA-ITN) architectu",3.9,"A2A protocols"],["Defines framework for orchestrating In-Network Computing Functions in Cooperativ",3.7,"A2A protocols"],["Defines procedures for distributing context among multiple agents in complex wor",2.8999999999999995,"A2A protocols"],["Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent c",4.55,"A2A protocols"],["Proposes a multi-agent communication framework for network AIOps with AI gateway",2.95,"A2A protocols"],["Defines framework for intercommunication between Agent Gateways in Agent Interne",3.65,"A2A protocols"],["Extends CATS framework to support AI-agent Communication Networks with reference",2.8,"A2A protocols"],["Defines a protocol for autonomous agents to file and resolve disputes through st",3.65,"A2A protocols"],["Specifies a comprehensive multi-agent collaboration protocol suite using Agent G",4.15,"A2A protocols"],["Defines a protocol suite using Agent Gateways as control-plane entities for mult",3.45,"A2A protocols"],["Introduces semantic routing architecture using intent vectors and trust scores f",3.65,"A2A protocols"],["Brief document exploring requirements for AI agent communication protocols in ub",1.65,"A2A protocols"],["Proposes Agent Collaboration Protocols architecture for Internet of Agents, cove",3.5500000000000003,"A2A protocols"],["Defines requirements for gateways in multi-agent systems to improve scalability ",2.7499999999999996,"A2A protocols"],["Discusses requirements for Agent Gateways in agent-to-agent communications to im",3.25,"A2A protocols"],["Resource-efficient messaging protocol specifically designed for constrained IoT\u002f",4.25,"A2A protocols"],["Analyzes gaps in existing networking and AI protocols for cross-device communica",3.65,"A2A protocols"],["Describes digital banking scenarios evolving toward agentic service interconnect",2.55,"A2A protocols"],["Describes digital banking digitalization trends toward agentic services and prop",1.75,"A2A protocols"],["Analyzes messaging protocols for agentic AI systems, comparing AMQP, MQTT, NATS,",2.6499999999999995,"A2A protocols"],["Specifies SLIM protocol for real-time interactive AI applications, combining gRP",2.75,"A2A protocols"],["Proposes communication framework for AI agents deployed across different network",2.45,"A2A protocols"],["Identical specification to draft-a2a-moqt-transport for transporting Agent-to-Ag",3.0,"A2A protocols"],["Defines N-ACT protocol for AI agents to discover and invoke third-party tools an",3.6500000000000004,"A2A protocols"],["Defines Agent-to-Tool (A2T) protocol for integrating third-party APIs into AI ag",3.9,"A2A protocols"],["Provides framework and requirements for AI agent protocols on the Internet. Surv",3.7,"A2A protocols"],["Defines N-ACT protocol for AI agents to discover and invoke third-party tools an",3.6500000000000004,"A2A protocols"],["Defines architectural model for Artificial Intelligence Internet Protocol (AIIP)",3.6999999999999997,"A2A protocols"],["Examines AI agent communication protocols specifically for 6G systems based on 3",3.35,"A2A protocols"],["Defines Intent-based Agent Interconnection Protocol for Agent Gateways, focusing",3.1500000000000004,"A2A protocols"],["Defines Intent-based Agent Interconnection Protocol (IAIP) for dynamic agent dis",3.3499999999999996,"A2A protocols"],["Specifies SlimWire Protocol Core, a binary framing layer for agent\u002ftool messagin",3.85,"A2A protocols"],["Introduces Multilink Local Address (MLA) type for autonomous IPv6 addressing in ",2.8499999999999996,"A2A protocols"],["Defines a comprehensive control-plane protocol for secure agent interactions wit",3.65,"A2A protocols"],["Proposes using generative AI to create flexible communication protocols for agen",2.7499999999999996,"A2A protocols"],["Discusses applying Agent-to-Agent (A2A) Protocol to network management for commu",3.4000000000000004,"A2A protocols"],["Defines a protocol for distributed collaboration among heterogeneous AI agents, ",2.95,"A2A protocols"],["Defines the Internet of Agents Protocol for distributed collaboration among hete",3.65,"A2A protocols"],["Specifies a semantic layer for Internet of Agents using ontology models and JSON",3.1500000000000004,"A2A protocols"],["Analyzes security risks in multi-agent communication and limitations of existing",4.15,"A2A protocols"],["Proposes Real-Virtual Agent Protocol for coordinating physical entities with dig",3.45,"A2A protocols"],["Defines comprehensive framework for AI agent networks based on Agent Network Pro",3.65,"A2A protocols"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-a2a-moqt-transport","draft-agent-gw","draft-ainp-protocol","draft-akhavain-moussa-ai-network","draft-an-nmrg-i2icf-cits","draft-chang-agent-context-interaction","draft-chang-agent-token-efficient","draft-fu-nmop-agent-communication-framework","draft-han-rtgwg-agent-gateway-intercomm-framework","draft-jiang-cats-reference-acn","draft-kotecha-agentic-dispute-protocol","draft-li-dmsc-macp","draft-li-dmsc-mcps-agw","draft-li-semantic-routing-architecture","draft-liu-access-collaboration-agent","draft-liu-dmsc-acps-arc","draft-liu-dmsc-gw-requirements","draft-liu-rtgwg-agent-gateway-requirements","draft-mallick-muacp","draft-mao-rtgwg-agent-comm-protocol-gap-analysis","draft-men-rtgwg-agent-networking-digibank-scenario","draft-men-rtgwg-agent-networking-in-digibank","draft-mpsb-agntcy-messaging","draft-mpsb-agntcy-slim","draft-mzsg-rtgwg-agent-cross-device-comm-framework","draft-nandakumar-a2a-moqt-transport","draft-rosenberg-aiproto","draft-rosenberg-aiproto-a2t","draft-rosenberg-aiproto-framework","draft-rosenberg-aiproto-nact","draft-sogomonian-aiip-architecture","draft-stephan-ai-agent-6g","draft-sun-zhang-iaip","draft-sz-dmsc-iaip","draft-tejido-swp-core","draft-templin-6man-mla","draft-vandoulas-aidp","draft-verma-dmsc-nlip-notes","draft-yan-a2a-device-agent-applicability","draft-yang-dmsc-ioa-task-protocol","draft-yang-ioa-protocol","draft-zhang-dmsc-ioa-semantic-interaction","draft-zhang-dmsc-mas-communication","draft-zhang-rvp-problem-statement","draft-zyyhl-agent-networks-framework"],"legendgroup":"A2A protocols","marker":{"color":"rgb(141,211,199)","size":{"dtype":"f8","bdata":"MzMzMzMzCUAzMzMzMzMPQJmZmZmZmQ9AMzMzMzMzD0CamZmZmZkNQDIzMzMzMwdAMzMzMzMzEkCamZmZmZkHQDMzMzMzMw1AZmZmZmZmBkAzMzMzMzMNQJqZmZmZmRBAmpmZmZmZC0AzMzMzMzMNQAAAAAAAAARAZ2ZmZmZmDED\u002f\u002f\u002f\u002f\u002f\u002f\u002f8FQAAAAAAAAApAAAAAAAAAEUAzMzMzMzMNQGZmZmZmZgRAAAAAAAAABEAyMzMzMzMFQAAAAAAAAAZAAAAAAAAABEAAAAAAAAAIQDQzMzMzMw1AMzMzMzMzD0CamZmZmZkNQDQzMzMzMw1AmZmZmZmZDUDNzMzMzMwKQDQzMzMzMwlAzMzMzMzMCkDNzMzMzMwOQMzMzMzMzAZAMzMzMzMzDUD\u002f\u002f\u002f\u002f\u002f\u002f\u002f8FQDQzMzMzMwtAmpmZmZmZB0AzMzMzMzMNQDQzMzMzMwlAmpmZmZmZEECamZmZmZkLQDMzMzMzMw1A"},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"A2A protocols","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"Zw8eQJM130BLOelA2os8QbJNiUGv9E5AX+4rQCi1B0F99eRAiyqLQH3LhMBtk1tAuKNhQKKk\u002fECAEFdA7gnLQFMPqkBfTsBAjhABQIzzTUGG6A5BKbAOQdDvUz\u002f8WFo\u002ffhJOQXibHkDDS3hAl46QQNo7cD+Cx3pAmvgawX5GtT+yO7ZAhgO0QFH+AMD8ULJBQ6vuv5vyDkDJP2tBBYrXQGrJ1kD7VJBAx8qyP+dvBUH\u002fm65A"},"xaxis":"x","y":{"dtype":"f4","bdata":"6jWjQB9n7cAqyAS\u002f9gGKwMj6KsDxd4nBqbEIwSeP2MDvpxLBmKEGwQKUfcDxMbzARzy5wJdlJb84Gy7B7rXAwOgFMsHwEjXBcbH0wFUvw7\u002f8kV3B13tdwW3gYz\u002fw7bQ\u002fSnnMvyAfo0B6eRtBheYWQRDMYsB68RxBdB5CQDBVmsButca\u002fDh7Mv2EyVj9o8hjBkdthwIxelL+7H5zAi1iSwLVelcBwkxnAfou0wL4JncAkRAjB"},"yaxis":"y","type":"scatter"},{"customdata":[["Defines an OAuth 2.0 authorization profile specifically for autonomous AI agents",4.25,"Agent identity\u002fauth"],["Extends SCIM 2.0 protocol to manage AI agents and agentic applications across do",3.75,"Agent identity\u002fauth"],["Enhances EAP-AKA' with hybrid post-quantum cryptography combining traditional an",3.45,"Agent identity\u002fauth"],["Specifies Contextual Agent Authorization Mesh for runtime authorization of agent",4.0,"Agent identity\u002fauth"],["Defines deriving HMAC keys from public key information in JOSE using Diffie-Hell",2.7499999999999996,"Agent identity\u002fauth"],["Specifies method to bind OpenID Connect authentication to ASN agents using RPKI ",2.8499999999999996,"Agent identity\u002fauth"],["Defines Asynchronous Remote Key Generation algorithm enabling delegation of publ",3.85,"Agent identity\u002fauth"],["Identifies new authentication and authorization requirements for AI agents that ",3.8,"Agent identity\u002fauth"],["Defines EDHOC-AKA authentication method combining AKA protocol with EDHOC for mo",3.05,"Agent identity\u002fauth"],["Extends OAuth RAR with policy_context and lifecycle_binding members for AI agent",4.25,"Agent identity\u002fauth"],["Specifies trust anchor bootstrap protocol for proof of process framework. Define",2.95,"Agent identity\u002fauth"],["Extends TOTP enrollment to prevent key compromise through QR code capture or key",3.1,"Agent identity\u002fauth"],["Defines comprehensive badge-based identity and communication system with trust s",3.3499999999999996,"Agent identity\u002fauth"],["Defines comprehensive framework for cross-domain AI agent interoperability inclu",2.95,"Agent identity\u002fauth"],["Defines HTTP Agent Profile for authenticating agent traffic, separating human fr",4.25,"Agent identity\u002fauth"],["Addresses authorization challenges in distributed multi-agent systems across mul",3.25,"Agent identity\u002fauth"],["Defines hardware attestation for email using TPM verification chains to prevent ",4.6499999999999995,"Agent identity\u002fauth"],["Authorization protocol supporting probabilistic decisions for agents and service",3.6999999999999997,"Agent identity\u002fauth"],["Describes method for generating semantically opaque IPv6 interface identifiers i",2.6500000000000004,"Agent identity\u002fauth"],["Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autono",4.55,"Agent identity\u002fauth"],["Defines STAMP protocol for cryptographic delegation and proof in AI agent system",4.6499999999999995,"Agent identity\u002fauth"],["Extends Entity Attestation Token (EAT) to support capability attestation for age",3.4499999999999997,"Agent identity\u002fauth"],["Specifies carrying EST certificate provisioning over CoAP using OSCORE protectio",3.9000000000000004,"Agent identity\u002fauth"],["Defines ACE framework profile using EDHOC for mutual authentication and OSCORE f",3.6000000000000005,"Agent identity\u002fauth"],["Enhances BRSKI for device bootstrapping where pledges act as servers in responde",2.85,"Agent identity\u002fauth"],["Adapts BRSKI secure device onboarding for constrained IoT environments using CBO",4.35,"Agent identity\u002fauth"],["Defines EAP authentication method based on EDHOC for constrained environments. I",3.2,"Agent identity\u002fauth"],["Enhances EAP-AKA' with post-quantum cryptography to address quantum computing th",3.8000000000000003,"Agent identity\u002fauth"],["This draft proposes enhancing EAP-AKA' Forward Secrecy with Post-Quantum Key Enc",3.5,"Agent identity\u002fauth"],["Comprehensive specification for hybrid public key encryption supporting arbitrar",4.3,"Agent identity\u002fauth"],["Specifies lightweight authorization using EDHOC for zero-touch device onboarding",3.9000000000000004,"Agent identity\u002fauth"],["Provides implementation guidance for EDHOC authenticated key exchange protocol. ",2.8000000000000007,"Agent identity\u002fauth"],["Specifies remote attestation procedures integrated with EDHOC lightweight key ex",3.7,"Agent identity\u002fauth"],["Outlines how nonces are supplied to end entities by RA\u002fCA for inclusion in attes",3.7,"Agent identity\u002fauth"],["Extends OAuth 2.0 with scope aggregation to reduce authorization round-trips in ",3.5,"Agent identity\u002fauth"],["Defines dynamic attestation mechanisms for AI agents to convey runtime posture c",3.4499999999999997,"Agent identity\u002fauth"],["Generic framework for Post-Quantum\u002fTraditional hybrid key encapsulation mechanis",3.9,"Agent identity\u002fauth"],["This draft extends the EDHOC protocol to provide quantum-resistant authenticatio",3.2,"Agent identity\u002fauth"],["Specifies an optimized KEM-based authentication variant for EDHOC protocol in sc",4.15,"Agent identity\u002fauth"],["Specifies framework for verifiable delegation of actions from humans to AI agent",4.050000000000001,"Agent identity\u002fauth"],["Specifies OAuth Transaction Token profile for Agent-to-Agent communication. Embe",3.5999999999999996,"Agent identity\u002fauth"],["Updates SASL framework to support modern authentication requirements including m",3.7,"Agent identity\u002fauth"],["Defines an Entity Attestation Token profile for remote attestation of autonomous",3.65,"Agent identity\u002fauth"],["Defines a JSON format for web bot signature agent cards to advertise identity, p",3.1999999999999997,"Agent identity\u002fauth"],["Extends OAuth 2.0 with a web message response mode using postMessage API for pop",2.5500000000000003,"Agent identity\u002fauth"],["Extends OAuth 2.0 for AI agent authorization with human consent verification, re",4.0,"Agent identity\u002fauth"],["Specifies EPHEMSEC algorithm for generating one-time passwords using public key ",3.1499999999999995,"Agent identity\u002fauth"],["Extends OAuth 2.0 Token Exchange with cryptographically verifiable actor chains ",4.050000000000001,"Agent identity\u002fauth"],["Defines WIMSE profile for cryptographically binding workload identities to their",4.3,"Agent identity\u002fauth"],["Defines Execution Context Tokens as JWT extension to WIMSE for tracking task exe",4.0,"Agent identity\u002fauth"],["Applies WIMSE (Workload Identity in Multi System Environments) framework to AI a",3.05,"Agent identity\u002fauth"],["Extends OAuth Transaction Tokens framework to support agent context propagation ",4.15,"Agent identity\u002fauth"],["Extends EDHOC with KEM-based authentication for post-quantum resistance. Enables",3.6500000000000004,"Agent identity\u002fauth"],["This draft proposes a KEM-based authentication variant for EDHOC that optimizes ",2.95,"Agent identity\u002fauth"],["Enhances EAP-AKA' with post-quantum key encapsulation mechanisms to protect agai",3.1500000000000004,"Agent identity\u002fauth"],["Specifies Clawdentity protocol for cryptographic identity and trust in AI agent ",3.8500000000000005,"Agent identity\u002fauth"],["Extends OAuth 2.1 for AI agents operating through PSTN\u002fSMS channels to obtain ac",3.65,"Agent identity\u002fauth"],["Extends SCIM 2.0 specification to manage agents and agentic applications across ",3.7,"Agent identity\u002fauth"],["Defines security association negotiation protocol for Bundle Protocol agents in ",3.05,"Agent identity\u002fauth"],["Proposes OAuth 2.0 extension for multi-AI agent collaboration with applier-on-be",3.55,"Agent identity\u002fauth"],["Defines quantum-resistant cipher suites for EDHOC using ML-DSA signatures and ML",4.050000000000001,"Agent identity\u002fauth"],["This draft defines a mechanism for EDHOC peers to agree in-band on output length",2.4,"Agent identity\u002fauth"],["Formalizes framework for verifiable telephone number identity using delegate cer",3.0000000000000004,"Agent identity\u002fauth"],["Improves HTTP Bearer authentication with automatic token fetching from STS. Elim",2.8499999999999996,"Agent identity\u002fauth"],["Extends OAuth model for AI agent authentication and authorization in Agent Commu",3.15,"Agent identity\u002fauth"],["Defines comprehensive agent identity management for Internet of Agents systems. ",3.7,"Agent identity\u002fauth"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-aap-oauth-profile","draft-abbey-scim-agent-extension","draft-ar-emu-hybrid-pqc-eapaka","draft-barney-caam","draft-bastian-jose-dvs","draft-blahaj-grow-rpki-oauth","draft-bradleylundberg-cfrg-arkg","draft-chen-ai-agent-auth-new-requirements","draft-chen-lake-edhoc-aka","draft-chen-oauth-rar-agent-extensions","draft-condrey-rats-witnessd-enrollment","draft-contario-totp-secure-enrollment","draft-cosmos-protocol-specification","draft-cui-dmsc-agent-cdi","draft-dhir-http-agent-profile","draft-diaconu-agents-authz-info-sharing","draft-drake-email-tpm-attestation","draft-gaikwad-south-authorization","draft-gont-dhcwg-dhcpv6-iids","draft-goswami-agentic-jwt","draft-guy-bary-stamp-protocol","draft-huang-rats-agentic-eat-cap-attest","draft-ietf-ace-coap-est-oscore","draft-ietf-ace-edhoc-oscore-profile","draft-ietf-anima-brski-prm","draft-ietf-anima-constrained-voucher","draft-ietf-emu-eap-edhoc","draft-ietf-emu-hybrid-pqc-eapaka","draft-ietf-emu-pqc-eapaka","draft-ietf-hpke-hpke","draft-ietf-lake-authz","draft-ietf-lake-edhoc-impl-cons","draft-ietf-lake-ra","draft-ietf-lamps-attestation-freshness","draft-jia-oauth-scope-aggregation","draft-jiang-seat-dynamic-attestation","draft-josefsson-chempat","draft-lake-pocero-authkem-edhoc","draft-lake-pocero-authkem-ikr-edhoc","draft-liu-agent-operation-authorization","draft-liu-oauth-a2a-profile","draft-melnikov-sasl2","draft-messous-eat-ai","draft-meunier-webbotauth-registry","draft-meyerzuselha-oauth-web-message-response-mode","draft-mishra-oauth-agent-grants","draft-mvieuille-kerpass-ephemsec","draft-mw-spice-actor-chain","draft-mw-wimse-transitive-attestation","draft-nennemann-wimse-ect","draft-ni-wimse-ai-agent-identity","draft-oauth-transaction-tokens-for-agents","draft-pocero-authkem-edhoc","draft-pocero-authkem-ikr-edhoc","draft-ra-emu-pqc-eapaka","draft-ravikiran-clawdentity-protocol","draft-rosenberg-oauth-aauth","draft-scim-agent-extension","draft-sipos-dtn-bp-safe","draft-song-oauth-ai-agent-collaborate-authz","draft-spm-lake-pqsuites","draft-tiloca-lake-exporter-output-length","draft-wendt-stir-vesper","draft-williams-http-bearer-extension","draft-yao-agent-auth-considerations","draft-zheng-agent-identity-management"],"legendgroup":"Agent identity\u002fauth","marker":{"color":"rgb(255,255,179)","size":{"dtype":"f8","bdata":"AAAAAAAAEUAAAAAAAAAOQJqZmZmZmQtAAAAAAAAAEED\u002f\u002f\u002f\u002f\u002f\u002f\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"},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Agent identity\u002fauth","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"e3lSwcvleMCrJqHBDqQowVIvhMEIEUTBcXSfwTvxd8Fln4bBCJFkwTYnNsHZ4HPBlLaXwfJXpEBgR8jAieOHwbFy+cBALYLB3Y3IQVPFMcGM3QPBpjntwFVnG8FAAXnBfBZTwc4tUcEf\u002fobByk+fwWy7qMF9w5PBmSBXwVkdTsEKxTvBne8iwbTvTcHFhfzAtri5wViFn8FWa5HBuJ8bwRrnT8ElC1XBXWb9wID198ArqYLB32oQwYXLnsGtWjLBA0R0wXbFhUAEYfPA1+BCwfJzncGMvZHBPR+pwazjDcHr4FLBpKd6wPuxJr\u002fnhkPB5C6nwcasbcG9OWrBdP1nwWlpbMFSo+TA"},"xaxis":"x","y":{"dtype":"f4","bdata":"As88wPu9XMEPc1FBKZWNvwD3jEFFN3JAVA+FQXyjhb+YCjFB0Oc\u002fwDb9skAlZUpBbTw8QI1n0cAfRtTAQuKEv2RVBkGRo2bApd01wfqgN8AEA4+\u002fZX2bQCRhe0GULudAIHW\u002fQGhyBUGlUCFBM3xWQUodUkFfSoBBP4MWQQjAIkEfXCpBxo82Qd\u002fhDsB2a8NA3OUsQeWrE0FdYwlBTkEFwASbMj\u002fQplNBQLiqQKVKsMBnzZrATroiwBU6fkG\u002fqp7AJyLCQC+sYT9W2UvBZFjVvoItGEFZVgpBQ09ZQURE+j2N8sLAcY1cwVLTMkA5ClLAMwEZQTfjIkG6PhVAIDzcwN8nUb+TIGHB"},"yaxis":"y","type":"scatter"},{"customdata":[["Proposes HTTP header for disclosing AI-generated content in web responses. Provi",2.8000000000000003,"Data formats\u002finterop"],["Defines a method to derive symmetric MAC keys from public information in JSON We",2.9499999999999997,"Data formats\u002finterop"],["Storage service profile for agent persistent state including embeddings, prefere",3.6,"Data formats\u002finterop"],["Proposes Events Query Protocol (EQP) built on HTTP for user agents to receive ev",3.2,"Data formats\u002finterop"],["Specifies requirements for uniform HTML email rendering across mail clients, add",2.75,"Data formats\u002finterop"],["Provides trust and security recommendations for handling structured data in emai",2.9499999999999997,"Data formats\u002finterop"],["Defines canonical CBOR representation for EDHOC application profiles and coordin",4.6000000000000005,"Data formats\u002finterop"],["Specifies pre-shared key authentication method for EDHOC key exchange protocol. ",3.5500000000000003,"Data formats\u002finterop"],["Provides comprehensive guidance for implementing end-to-end email encryption sec",3.0,"Data formats\u002finterop"],["Extends EST protocol to provide server-side recommendations for certificate rene",3.7,"Data formats\u002finterop"],["Defines X.509 attribute for private key possession statements as alternative to ",3.4000000000000004,"Data formats\u002finterop"],["Defines compliance requirements for Certificate Management Messages over CMS (CM",3.1000000000000005,"Data formats\u002finterop"],["Updates RFC7030 to clarify CSR Attributes Response encoding and adds template-ba",3.7,"Data formats\u002finterop"],["Specifies automatic configuration mechanism for email, calendar, and contact app",2.4000000000000004,"Data formats\u002finterop"],["Provides trust and security recommendations for handling structured data in emai",3.45,"Data formats\u002finterop"],["Defines post-quantum hybrid key exchange combining ML-KEM with traditional ECDH ",4.25,"Data formats\u002finterop"],["Specifies encryption techniques for firmware and software payloads in SUIT manif",3.7,"Data formats\u002finterop"],["Adds post-compromise security to TLS 1.3 through fresh Diffie-Hellman exchanges ",4.25,"Data formats\u002finterop"],["Defines an HTTP-based protocol for efficient delivery of web content to automate",2.7499999999999996,"Data formats\u002finterop"],["Defines Agentic State Transfer (AST) HTTP profile for managing canonical resourc",3.85,"Data formats\u002finterop"],["Describes using LISP to interconnect multiple independent network overlays throu",3.6,"Data formats\u002finterop"],["Defines ADL, a JSON-based standard for describing AI agents including their capa",4.050000000000001,"Data formats\u002finterop"],["Defines a DLT-neutral protocol for sharing asset views and metadata across block",2.9499999999999997,"Data formats\u002finterop"],["Defines view and addressing mechanisms for secure asset transfer between DLT sys",3.4,"Data formats\u002finterop"],["Defines guidelines for IETF specifications to support AI agent consumption and c",4.05,"Data formats\u002finterop"],["Updates RFC 3396 to make DHCP option concatenation requirements more flexible. A",3.1000000000000005,"Data formats\u002finterop"],["This draft specifies ECDH-based Private Set Intersection (PSI) for two parties u",2.65,"Data formats\u002finterop"],["YAML-based format for sharing software project context with AI development tools",2.55,"Data formats\u002finterop"],["Extends EST protocol to provide certificate renewal timing recommendations from ",2.75,"Data formats\u002finterop"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-abaris-aicdh","draft-bastian-jose-pkdh","draft-gaikwad-aps-profile","draft-gupta-httpapi-events-query","draft-hackett-ures","draft-happel-structured-email-trust","draft-ietf-lake-app-profiles","draft-ietf-lake-edhoc-psk","draft-ietf-lamps-e2e-mail-guidance","draft-ietf-lamps-est-renewal-info","draft-ietf-lamps-private-key-stmt-attr","draft-ietf-lamps-rfc5274bis","draft-ietf-lamps-rfc7030-csrattrs","draft-ietf-mailmaint-pacc","draft-ietf-sml-trust","draft-ietf-sshm-mlkem-hybrid-kex","draft-ietf-suit-firmware-encryption","draft-ietf-tls-extended-key-update","draft-jurkovikj-collab-tunnel","draft-jurkovikj-httpapi-agentic-state","draft-moreno-lisp-uberlay","draft-nederveld-adl","draft-ramakrishna-satp-data-sharing","draft-ramakrishna-satp-views-addresses","draft-steele-agent-considerations","draft-tojens-dhcp-option-concat-considerations","draft-wang-ppm-ecdh-psi","draft-wolfe-faf-format","draft-yusef-lamps-rfc7030-renewal-recommendation"],"legendgroup":"Data formats\u002finterop","marker":{"color":"rgb(190,186,218)","size":{"dtype":"f8","bdata":"Z2ZmZmZmBkCZmZmZmZkHQM3MzMzMzAxAmpmZmZmZCUAAAAAAAAAGQJmZmZmZmQdAZ2ZmZmZmEkBnZmZmZmYMQAAAAAAAAAhAmpmZmZmZDUA0MzMzMzMLQM7MzMzMzAhAmpmZmZmZDUAAAAAAAAAEQJqZmZmZmQtAAAAAAAAAEUCamZmZmZkNQAAAAAAAABFA\u002f\u002f\u002f\u002f\u002f\u002f\u002f\u002fBUDNzMzMzMwOQM3MzMzMzAxANDMzMzMzEECZmZmZmZkHQDMzMzMzMwtAMzMzMzMzEEDOzMzMzMwIQDMzMzMzMwVAZmZmZmZmBEAAAAAAAAAGQA=="},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Data formats\u002finterop","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"b8cCwKl8hMFnzpDASW9hwFuR778tMpfAKA5pwdhqjcGRrMvAUv8LwUcif8HwDAPBHhTxwG5iAb9bfp3AwhOtwR9uk8GFkZvBe2UAwRLNBL+nda5BbOXjv4V8eUBoX3hA3NhhP2JSv0Dxnr3BWplMQPifDME="},"xaxis":"x","y":{"dtype":"f4","bdata":"gatNQRrtjEGX0AHBLaMyQNRaCEFHIRRBlXUTQUoHMkEbWBlBerJkQZhYoUC+j3xBbd9TQYkZAkG2zhRBecctQafyZ0HPPUJBGVcBwaINq7\u002f2AWa\u002fguvIwKPQdEH0zXRBnIklwO3snUCiClBBSjuNwS++YkE="},"yaxis":"y","type":"scatter"},{"customdata":[["Presents integrated framework for automated 5G edge network security using I2NSF",3.5000000000000004,"Policy\u002fgovernance"],["Specifies AI Governance and Accountability Protocol with tiered risk-based gover",4.25,"Policy\u002fgovernance"],["Deprecates obsolete key exchange methods in TLS 1.2 including finite field DH an",3.7500000000000004,"Policy\u002fgovernance"],["Defines AI Boundary Declaration Protocol for expressing content usage boundaries",4.15,"Policy\u002fgovernance"],["Identifies the need for standardized zero trust interoperability protocols in IE",2.3499999999999996,"Policy\u002fgovernance"],["Introduces Meta-layer concept as coordination substrate for presence, annotation",3.5,"Policy\u002fgovernance"],["Defines best practices for managing Route Origin Authorizations (ROAs) for globa",3.5500000000000003,"Policy\u002fgovernance"],["ECAP defines a cryptographically-verified protocol for web crawlers to obtain co",4.050000000000001,"Policy\u002fgovernance"],["Specifies AGENTS.TXT protocol as strict plaintext policy file for automated clie",3.75,"Policy\u002fgovernance"],["Proposes framework for user agents to restrict connections to authorized second ",2.0,"Policy\u002fgovernance"],["Defines HJS accountability layer for AI agents using blockchain-anchored timesta",3.55,"Policy\u002fgovernance"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-ahn-nmrg-5g-security-i2nsf-framework","draft-aylward-aiga-1","draft-ietf-tls-deprecate-obsolete-kex","draft-jewell-aibdp","draft-liu-saag-zt-problem-statement","draft-meta-layer-overview","draft-pbs-sidrops-roaanycast","draft-schulze-ecap","draft-srijal-agents-policy","draft-steckbeck-ua-conn-sec","draft-wang-hjs-accountability"],"legendgroup":"Policy\u002fgovernance","marker":{"color":"rgb(251,128,114)","size":{"dtype":"f8","bdata":"AQAAAAAADEAAAAAAAAARQAEAAAAAAA5AmpmZmZmZEEAAAAAAAAAEQAAAAAAAAAxAZ2ZmZmZmDEA0MzMzMzMQQAAAAAAAAA5AAAAAAAAABEBmZmZmZmYMQA=="},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Policy\u002fgovernance","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"bf6vQbs0gMCkl4XBklMXwU9HtMCFLcw\u002fZ9Y5QTTiGsG49xbB1BRDwSj96sA="},"xaxis":"x","y":{"dtype":"f4","bdata":"QHVTQMm9EMBfM2tBwLLowC1GUT4X0y5AN+OhQADY\u002fcCm3gzBuR0mwTDNpD8="},"yaxis":"y","type":"scatter"},{"customdata":[["Proposes an integrated security framework for 5G edge networks using I2NSF archi",3.25,"Autonomous netops"],["Presents Integrated Sensing and Communications (ISAC) as a use case for CATS arc",3.05,"Autonomous netops"],["Presents ISAC use case for GREEN Working Group discussions on joint sensing and ",2.5,"Autonomous netops"],["Focuses on large language model-based agents for network operations and maintena",3.25,"Autonomous netops"],["Framework for AI-assisted network protocol testing using LLMs and automated test",3.65,"Autonomous netops"],["Provides comprehensive evaluation framework for LLM-based network configuration ",4.35,"Autonomous netops"],["Describes lightweight variation of Autonomic Networking Infrastructure without e",3.75,"Autonomous netops"],["Discusses and analyzes the impact of AI agents on network infrastructure. Aims t",2.3499999999999996,"Autonomous netops"],["Presents problem statement and motivations for applying Agentic AI to network ma",2.95,"Autonomous netops"],["Combines LISP with H3 spatial indexing to create geospatial intelligence network",4.0,"Autonomous netops"],["Specifies a NETCONF mechanism to map configuration modifications to their origin",3.7,"Autonomous netops"],["Defines framework for collaborative network management between LLMs and human op",3.55,"Autonomous netops"],["Proposes intent-based management framework for Software-Defined Vehicles in ITS ",3.3,"Autonomous netops"],["Defines distributed DNSSEC multi-signer architecture with multi-signer agents an",2.95,"Autonomous netops"],["Proposes a network infrastructure architecture for large-scale multi-agent colla",3.15,"Autonomous netops"],["Proposes symmetry-driven forwarding mechanism for LEO satellite networks to avoi",3.8000000000000003,"Autonomous netops"],["Describes networking scenarios for agents in enterprise and broadband networks, ",2.3499999999999996,"Autonomous netops"],["Presents framework for connecting mobile ad-hoc networks to the Internet using A",2.55,"Autonomous netops"],["Introduces network AI agent use cases in 6G focusing on connectivity services an",3.2,"Autonomous netops"],["Specifies CONDUIT protocol for managing IPsec tunnel fabrics with automated life",2.5,"Autonomous netops"],["Comprehensive architecture combining Network Digital Twin with Agentic AI for in",4.25,"Autonomous netops"],["Introduces AI agent use cases in 6G networks based on 3GPP SA1 technical reports",2.6000000000000005,"Autonomous netops"],["Proposes AI Network Security Agents for routers to provide intelligent, adaptive",3.4499999999999997,"Autonomous netops"],["Defines task-oriented multi-agent framework for fault recovery in converged mobi",4.050000000000001,"Autonomous netops"],["Applies Model Context Protocol to network management for intent-based troublesho",3.15,"Autonomous netops"],["Presents problem statement for integrating Model Context Protocol into network m",3.35,"Autonomous netops"],["Analyzes NETCONF limitations for advanced scenarios and proposes MCP and A2A pro",3.45,"Autonomous netops"],["Analyzes gaps in existing network configuration protocols for LLM-driven intent-",3.9,"Autonomous netops"],["Defines use cases and requirements for communication protocols enabling measurem",2.7499999999999996,"Autonomous netops"],["Integrates Network Management Agents into ACTN-based optical networks for autono",2.7,"Autonomous netops"],["Defines AI-driven Network Management Agent concept for Level 4 autonomous networ",3.75,"Autonomous netops"],["Proposes AI agent architecture for Digital Twin Networks, integrating autonomous",2.95,"Autonomous netops"],["Defines core components and interactions for agent networking architecture in en",2.55,"Autonomous netops"],["Describes specific agent networking scenarios for enterprise and home broadband ",2.3499999999999996,"Autonomous netops"],["Introduces a comprehensive agents networking framework for enterprise and broadb",3.65,"Autonomous netops"],["Proposes using Model Context Protocol (MCP) to enable LLM-based automated networ",3.65,"Autonomous netops"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-ahn-opsawg-5g-security-i2nsf-framework","draft-bernardos-cats-isac-uc","draft-bernardos-green-isac-uc","draft-chuyi-nmrg-ai-agent-network","draft-cui-nmrg-auto-test","draft-cui-nmrg-llm-benchmark","draft-eckert-anima-acp-free-ani","draft-han-ai-agent-impact-infra","draft-hong-nmrg-agenticai-ps","draft-ietf-lisp-nexagon","draft-ietf-netconf-configuration-tracing","draft-irtf-nmrg-llm-nm","draft-jeong-opsawg-intent-based-sdv-framework","draft-leon-distributed-multi-signer","draft-li-dmsc-inf-architecture","draft-luan-rtgwg-sdaf","draft-pang-agents-networking-scenarios","draft-templin-manet-inet-omni","draft-tong-network-agent-use-cases-in-6g","draft-willman-rtgwg-conduit-tunnels","draft-wmz-nmrg-agent-ndt-arch","draft-yu-dmsc-ai-agent-use-cases-in-6g","draft-yuan-rtgwg-security-agent-usecase","draft-yue-anima-agent-recovery-networks","draft-zeng-mcp-troubleshooting","draft-zeng-nmrg-mcp-usecases-requirements","draft-zeng-opsawg-applicability-mcp-a2a","draft-zeng-opsawg-llm-netconf-gap","draft-zhang-rtgwg-ai-agents-measurement","draft-zhao-ccamp-actn-optical-network-agent","draft-zhao-nmop-network-management-agent","draft-zhao-nmrg-ai-agent-for-dtn","draft-zl-agents-networking-architecture","draft-zl-agents-networking-scenarios","draft-zlgsgl-rtgwg-agents-networking-framework","draft-zm-rtgwg-mcp-troubleshooting"],"legendgroup":"Autonomous netops","marker":{"color":"rgb(128,177,211)","size":{"dtype":"f8","bdata":"AAAAAAAACkBmZmZmZmYIQAAAAAAAAARAAAAAAAAACkAzMzMzMzMNQGZmZmZmZhFAAAAAAAAADkAAAAAAAAAEQJqZmZmZmQdAAAAAAAAAEECamZmZmZkNQGZmZmZmZgxAZmZmZmZmCkCamZmZmZkHQDMzMzMzMwlAZ2ZmZmZmDkAAAAAAAAAEQGZmZmZmZgRAmpmZmZmZCUAAAAAAAAAEQAAAAAAAABFAzszMzMzMBECZmZmZmZkLQDQzMzMzMxBAMzMzMzMzCUDNzMzMzMwKQJqZmZmZmQtAMzMzMzMzD0D\u002f\u002f\u002f\u002f\u002f\u002f\u002f8FQJqZmZmZmQVAAAAAAAAADkCamZmZmZkHQGZmZmZmZgRAAAAAAAAABEAzMzMzMzMNQDMzMzMzMw1A"},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Autonomous netops","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"4QSwQdT9x0G3dMhBOLVFQVacgEETr3ZBqzqaQamvNUGts3BBYNunQXDVnEFkwH9BsDOVQTJbkkB6a\u002fJA4zauQai5UUEhy6hBkTA7Qa9GsEEPPIlBl4MhQawjikEz31ZBIUicQWlMWkEezNRAzB8aQTdlTUExsnVBiUiFQa4JHkGdpRJBDCpQQeRyD0GUZJxB"},"xaxis":"x","y":{"dtype":"f4","bdata":"LfpTQF21xMCmnL\u002fAgRGIwD4paz9nBOy96lPIPjemQUAukI3Aa0FFwb78NMC4ne2\u002fX4O\u002fwBSi4D8aYurAlQfJwAX3DcEOcv\u002fA8o7rwPLOMMBVUZXArQxfQBGvGcHPUcbAgWivv0dAVsAS24NAp3+cvmBfbz+IO8zABH+8wEdKAcETphPBt08NwfQrKMG6o7q\u002f"},"yaxis":"y","type":"scatter"},{"customdata":[["Specifies protocol for immutable AGI system identification using Bitcoin blockch",3.1,"AI safety\u002falignment"],["Comprehensive AI governance framework with tiered risk model, federated authorit",4.45,"AI safety\u002falignment"],["Defines comprehensive protocol for AI agent accountability including authenticat",4.8,"AI safety\u002falignment"],["Introduces VERA, a zero-trust architecture for AI agent security with five enfor",3.9,"AI safety\u002falignment"],["Defines CDDL-based data format for verifiable agent conversation records using C",4.45,"AI safety\u002falignment"],["Establishes security requirements for AI agents across their operational lifecyc",3.6500000000000004,"AI safety\u002falignment"],["Establishes a framework for evaluating whether autonomous agent speech acts are ",3.4499999999999997,"AI safety\u002falignment"],["Proposes CHEQ protocol for human-in-the-loop confirmation of AI agent decisions ",3.65,"AI safety\u002falignment"],["Proposes SRTA architecture and Trinity Configuration for safe AGI coordination u",2.85,"AI safety\u002falignment"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-architect-cittamarket","draft-aylward-aiga-2","draft-aylward-daap-v2","draft-berlinai-vera","draft-birkholz-verifiable-agent-conversations","draft-ni-a2a-ai-agent-security-requirements","draft-romanchuk-normative-admissibility","draft-rosenberg-cheq","draft-takagi-srta-trinity"],"legendgroup":"AI safety\u002falignment","marker":{"color":"rgb(253,180,98)","size":{"dtype":"f8","bdata":"zczMzMzMCEDNzMzMzMwRQDMzMzMzMxNAMzMzMzMzD0DNzMzMzMwRQDQzMzMzMw1AmZmZmZmZC0AzMzMzMzMNQM3MzMzMzAZA"},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"AI safety\u002falignment","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"gToQwcOoeMCAqiHBSAzKwKbFXsDMndk\u002fqGCywGnktMDjYi7A"},"xaxis":"x","y":{"dtype":"f4","bdata":"TPQdQAjsEMCuP4PA8dYWvwCOwsCVw0\u002fBRdsdwBw8NkBfzL2\u002f"},"yaxis":"y","type":"scatter"},{"customdata":[["This draft proposes a Best Current Practice for AI agent interactions over HTTP,",2.8999999999999995,"Agent-to-agent communication protocols"],["This draft proposes requirements for standardized AI agent protocols to enable t",2.9999999999999996,"Agent-to-agent communication protocols"],["This draft proposes requirements and frameworks for AI Agent Communication Netwo",2.8,"Agent-to-agent communication protocols"],["This draft analyzes requirements for agent protocols specifically tailored to 6G",3.15,"Agent-to-agent communication protocols"],["This draft proposes a standard protocol for AI agents to communicate context inf",3.55,"Agent-to-agent communication protocols"],["This draft proposes a protocol-agnostic data model for multi-agent communication",2.8999999999999995,"Agent-to-agent communication protocols"],["This draft outlines requirements for multimodal communication in AI agent protoc",2.8999999999999995,"Agent-to-agent communication protocols"],["This draft catalogs use cases for AI agents in 6G networks, referencing 3GPP wor",2.5,"Agent-to-agent communication protocols"],["This draft identifies problems and gaps in mobile core networks for supporting A",2.9999999999999996,"Agent-to-agent communication protocols"],["This draft defines use cases and communication protocol requirements for trouble",2.8999999999999995,"Agent-to-agent communication protocols"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-campbell-agentic-http","draft-cui-ai-agent-task","draft-du-ai-agent-communication-6g-aspect","draft-hw-ai-agent-6g","draft-liu-agent-context-protocol","draft-wang-nmrg-magent-im","draft-xie-ai-agent-multimodal","draft-yu-ai-agent-use-cases-in-6g","draft-zhang-agent-gap-network","draft-zhang-rtgwg-ai-agents-troubleshooting"],"legendgroup":"Agent-to-agent communication protocols","marker":{"color":"rgb(179,222,105)","size":{"dtype":"f8","bdata":"MjMzMzMzB0D\u002f\u002f\u002f\u002f\u002f\u002f\u002f8HQGZmZmZmZgZAMzMzMzMzCUBmZmZmZmYMQDIzMzMzMwdAMjMzMzMzB0AAAAAAAAAEQP\u002f\u002f\u002f\u002f\u002f\u002f\u002fwdAMjMzMzMzB0A="},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Agent-to-agent communication protocols","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"z2wAPuZY60CmBBlB0R49QTpvMUD2AoZBLlqGQLyxIUEP5mFBIudMQQ=="},"xaxis":"x","y":{"dtype":"f4","bdata":"5upywO5QScD3Sl3AHiA0waxNK8EJYuPAIgxHwXRuWUBDGi\u002fBGURFPw=="},"yaxis":"y","type":"scatter"},{"customdata":[["This draft proposes a decoupled authorization framework for AI agents that enabl",3.45,"Identity \u002f authentication for AI agents"],["This draft proposes two scalable models for certificate enrollment of AI agents:",3.45,"Identity \u002f authentication for AI agents"],["This draft specifies the SSH Agent Protocol for managing cryptographic keys used",2.8,"Identity \u002f authentication for AI agents"],["This draft extends OAuth 2.0 to enable AI agents to securely obtain access token",3.6500000000000004,"Identity \u002f authentication for AI agents"],["This draft proposes an extension to OAuth 2.0 that adds a 'target_id' field to e",2.8,"Identity \u002f authentication for AI agents"],["This draft extends the SCIM (System for Cross-domain Identity Management) protoc",3.9,"Identity \u002f authentication for AI agents"],["This draft proposes requirements for digital identity management in AI agent com",2.8999999999999995,"Identity \u002f authentication for AI agents"],["This draft proposes an identity management framework for agents in an Internet o",3.3,"Identity \u002f authentication for AI agents"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-chen-agent-decoupled-authorization-model","draft-huang-acme-scalable-agent-enrollment","draft-ietf-sshm-ssh-agent","draft-oauth-ai-agents-on-behalf-of-user","draft-song-oauth-ai-agent-authorization","draft-wahl-scim-agent-schema","draft-yl-agent-id-requirements","draft-zheng-dispatch-agent-identity-management"],"legendgroup":"Identity \u002f authentication for AI agents","marker":{"color":"rgb(252,205,229)","size":{"dtype":"f8","bdata":"mpmZmZmZC0CamZmZmZkLQGZmZmZmZgZANDMzMzMzDUBmZmZmZmYGQDMzMzMzMw9AMjMzMzMzB0BmZmZmZmYKQA=="},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Identity \u002f authentication for AI agents","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"AxNywTZxFMHZGS3AnmtPwa0paMEmvZjA9E8gP7Xq5MA="},"xaxis":"x","y":{"dtype":"f4","bdata":"2GAtwBNhwkBY+p9AKRCRwMFNdsDO81PBzMTZwDFUYcE="},"yaxis":"y","type":"scatter"},{"customdata":[["Proposes standardized protocol for AI agent discovery and invocation with common",3.8500000000000005,"Agent discovery\u002freg"],["Specifies DNS-native naming and resolution for AI agents using FQDNs and SVCB re",4.1000000000000005,"Agent discovery\u002freg"],["Specifies automatic configuration mechanism for email, calendar, and contact app",3.6000000000000005,"Agent discovery\u002freg"],["Specifies Web of Agents (WoA) format using JSON Schema to describe AI agent inpu",3.25,"Agent discovery\u002freg"],["Problem statement for multicast address allocation in zero-configuration environ",2.45,"Agent discovery\u002freg"],["Provides mechanism for RPL Root to control enrollment announcements and adjust e",2.9000000000000004,"Agent discovery\u002freg"],["Defines architectural framework for discovering network resources based on physi",3.4499999999999997,"Agent discovery\u002freg"],["Identifies problems in designing DNS SVCB records for OSCORE endpoint discovery.",2.7499999999999996,"Agent discovery\u002freg"],["Proposes a DNS-inspired naming and service discovery system for LLM agents to en",3.55,"Agent discovery\u002freg"],["Defines requirements and considerations for AI agent-to-agent discovery mechanis",3.55,"Agent discovery\u002freg"],["Proposes using DNS with SVCB records to enable AI agent discovery and capability",3.65,"Agent discovery\u002freg"],["Uses existing DNS infrastructure for AI agent discovery through structured names",3.6000000000000005,"Agent discovery\u002freg"],["Describes Agent Directory Service for storing and discovering AI agent metadata ",3.9,"Agent discovery\u002freg"],["Introduces Agent Name Service (ANS) as a DNS-based universal directory for AI ag",4.2,"Agent discovery\u002freg"],["Specifies ARDP, a lightweight protocol for agent registration and discovery in d",3.25,"Agent discovery\u002freg"],["Defines requirements for AI\u002fML agents in 6G mobile networks, covering different ",2.6499999999999995,"Agent discovery\u002freg"],["Defines experimental AI URI scheme for dedicated AI resource access. Enables nat",3.8,"Agent discovery\u002freg"],["Analyzes DNS challenges for Internet of Agents scenarios and identifies technica",3.55,"Agent discovery\u002freg"],["Defines new DNS resource record type AGENT as SVCB-compatible RR for agent servi",2.55,"Agent discovery\u002freg"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-cui-ai-agent-discovery-invocation","draft-cui-dns-native-agent-naming-resolution","draft-eggert-mailmaint-uaautoconf","draft-gaikwad-woa","draft-ietf-pim-zeroconf-mcast-addr-alloc-ps","draft-ietf-roll-enrollment-priority","draft-kartha-grd","draft-lenders-core-dnr","draft-liang-agentdns","draft-mozley-aidiscovery","draft-mozleywilliams-dnsop-bandaid","draft-mozleywilliams-dnsop-dnsaid","draft-mp-agntcy-ads","draft-narajala-ans","draft-pioli-agent-discovery","draft-sarischo-6gip-aiagent-requirements","draft-sogomonian-ai-uri-scheme","draft-ye-problems-and-requirements-of-dns-for-ioa","draft-zhang-aiproto-svcb-mapping-for-agents"],"legendgroup":"Agent discovery\u002freg","marker":{"color":"rgb(217,217,217)","size":{"dtype":"f8","bdata":"zszMzMzMDkBnZmZmZmYQQM7MzMzMzAxAAAAAAAAACkAAAAAAAAAEQDQzMzMzMwdAmZmZmZmZC0D\u002f\u002f\u002f\u002f\u002f\u002f\u002f8FQGZmZmZmZgxAZmZmZmZmDEAzMzMzMzMNQM7MzMzMzAxAMzMzMzMzD0DNzMzMzMwQQAAAAAAAAApAMjMzMzMzBUBmZmZmZmYOQGZmZmZmZgxAZmZmZmZmBEA="},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Agent discovery\u002freg","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"oCnSv\u002fNiPMCCOQ6\u002flJXov6ZxvUFP0+TAk2ypQZZlNMHfgjTAU2PIvoRbzr\u002fEkeW\u002fSE4tv7psUcAHeOC+SZdJQWkWDz5PdABBHgA0Pw=="},"xaxis":"x","y":{"dtype":"f4","bdata":"fX\u002f5wIb1KsF1LwJBFsOrwBMNI8FohoVByfQ9wQTcDkEznUTBW5\u002f9wBn\u002fF8EPbx\u002fBT0Q4wWHwA8G3T8vA0zk3wb8sdMEyZ3tADBoUwQ=="},"yaxis":"y","type":"scatter"},{"customdata":[["Defines framework for collaborative network management between LLM agents and hu",4.050000000000001,"Human-agent interaction"],["Proposes CHEQ protocol for human confirmation of AI agent decisions before execu",3.9,"Human-agent interaction"],["Defines well-known URI and link relation for exposing website workflows to autom",3.1,"Human-agent interaction"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-cui-nmrg-llm-nm","draft-rosenberg-aiproto-cheq","draft-vinaysingh-awp-wellknown"],"legendgroup":"Human-agent interaction","marker":{"color":"rgb(188,128,189)","size":{"dtype":"f8","bdata":"NDMzMzMzEEAzMzMzMzMPQM3MzMzMzAhA"},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Human-agent interaction","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"zax7QfL2ssBfqu\u002fA"},"xaxis":"x","y":{"dtype":"f4","bdata":"ugHsv6z4NUBG3xbB"},"yaxis":"y","type":"scatter"},{"customdata":[["Specifies flow-level load balancing for Computing-Aware Traffic Steering to redu",2.85,"ML traffic mgmt"],["Specifies architecture for privacy-preserving federated learning across multi-te",3.1500000000000004,"ML traffic mgmt"],["Defines capabilities advertising for Multipath Traffic Engineering (MPTE) in IGP",2.2,"ML traffic mgmt"],["Discusses multicast use cases for Large Language Model synchronization in infere",2.35,"ML traffic mgmt"],["Applies Application-aware Performance Network framework to Internet of Agents sc",3.1500000000000004,"ML traffic mgmt"],["Presents use cases for AI agents optimizing network traffic through dynamic reso",3.7,"ML traffic mgmt"],["Proposes using Media Over QUIC (MOQ) to transport large-scale, real-time sensing",3.4000000000000004,"ML traffic mgmt"],["Analyzes multicast use cases in Large Language Model Mixture of Experts architec",2.7499999999999996,"ML traffic mgmt"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-fu-cats-flow-lb","draft-kale-agntcy-federated-privacy","draft-kompella-lsr-mptecap","draft-liu-rtgwg-llmsync-multicast","draft-mao-rtgwg-apn-framework-for-ioa","draft-yuan-rtgwg-traffic-agent-usecase","draft-yue-moq-transporting-sensing-data","draft-zhang-rtgwg-llmmoe-multicast"],"legendgroup":"ML traffic mgmt","marker":{"color":"rgb(204,235,197)","size":{"dtype":"f8","bdata":"zczMzMzMBkA0MzMzMzMJQAAAAAAAAARAAAAAAAAABEA0MzMzMzMJQJqZmZmZmQ1ANDMzMzMzC0D\u002f\u002f\u002f\u002f\u002f\u002f\u002f8FQA=="},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"ML traffic mgmt","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"23SHQX7\u002f1MCXHbJBcsc9QYCcIkH0RHdB24HLQVXwPkE="},"xaxis":"x","y":{"dtype":"f4","bdata":"IN9BwQqRg8Dpel\u002fA3B0BQcriZsC9XRPBwNvewIA060A="},"yaxis":"y","type":"scatter"},{"customdata":[["Defines comprehensive benchmarking methodologies for LLM inference serving syste",4.25,"Model serving\u002finference"],["Defines performance benchmarking profiles binding terminology and methodology to",4.15,"Model serving\u002finference"],["Establishes standardized terminology for LLM serving performance metrics across ",2.7,"Model serving\u002finference"],["Defines a URI scheme for identifying LLM endpoints with embedded configuration p",3.15,"Model serving\u002finference"],["Analyzes system and network requirements for large-scale LLM inference services.",3.1500000000000004,"Model serving\u002finference"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-gaikwad-llm-benchmarking-methodology","draft-gaikwad-llm-benchmarking-profiles","draft-gaikwad-llm-benchmarking-terminology","draft-levy-llm-uri-scheme","draft-liu-nmrg-ai-llm-inference-requirements"],"legendgroup":"Model serving\u002finference","marker":{"color":"rgb(255,237,111)","size":{"dtype":"f8","bdata":"AAAAAAAAEUCamZmZmZkQQJqZmZmZmQVAMzMzMzMzCUA0MzMzMzMJQA=="},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Model serving\u002finference","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"ZtMoQdnIIkHzXCpB6haZwVPyPEE="},"xaxis":"x","y":{"dtype":"f4","bdata":"\u002ftg0QUuMQkEq0DFByFm3QCjRC0E="},"yaxis":"y","type":"scatter"},{"customdata":[["Provides operational recommendations for automated DS parameter acceptance in DN",2.75,"Other AI\u002fagent"],["Updates HTTP cookie specification replacing RFC 6265. Maintains existing widely-",2.8000000000000003,"Other AI\u002fagent"],["Updates HTTP Cookie specification to replace RFC 6265 with improved security and",2.95,"Other AI\u002fagent"],["Defines hybrid post-quantum key agreement mechanisms for TLS 1.3 that combine ML",4.4,"Other AI\u002fagent"],["Proposes ASL protocol using novel phi-ns-x arithmetic primitive instead of tradi",2.6,"Other AI\u002fagent"],["Presents problem statement and gap analysis for MANET internetworking with fixed",2.0,"Other AI\u002fagent"],["Defines a DHCP relay agent suboption for broadband networks to include UP-specif",2.7,"Other AI\u002fagent"],["Defines a DHCP relay agent suboption for broadband networks to include UP-specif",2.85,"Other AI\u002fagent"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-ietf-dnsop-ds-automation","draft-ietf-httpbis-layered-cookies","draft-ietf-httpbis-rfc6265bis","draft-ietf-tls-ecdhe-mlkem","draft-nsiangani-authenticatedsecuredlayer","draft-templin-manet-inet","draft-zhul-dhc-bnc-up-specific-suboption","draft-zhul-intarea-bnc-up-specific-suboption"],"legendgroup":"Other AI\u002fagent","marker":{"color":"rgb(141,211,199)","size":{"dtype":"f8","bdata":"AAAAAAAABkBnZmZmZmYGQJqZmZmZmQdAmpmZmZmZEUDNzMzMzMwEQAAAAAAAAARAmpmZmZmZBUDNzMzMzMwGQA=="},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Other AI\u002fagent","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"+\u002foEQdA3YcC2pmDAXUKxwSTfjMFPOahBTM+JQeHgiUE="},"xaxis":"x","y":{"dtype":"f4","bdata":"6YGrQCgUW0H1slpBR6cSQUmNTkFwzADBGZMMQXmdDEE="},"yaxis":"y","type":"scatter"},{"customdata":[["This draft defines SD-Card, a Selective Disclosure JWT encoding of Agent Cards t",3.9,"Agent discovery \u002f registration"],["This draft defines the agent:\u002f\u002f URI scheme for addressing and interoperating wit",3.3,"Agent discovery \u002f registration"],["This draft proposes a networking framework for AI agents in enterprise and broad",2.4000000000000004,"Agent discovery \u002f registration"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003eScore: %{customdata[0]}\u003cbr\u003eCategory: %{marker.color}\u003cbr\u003e\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-nandakumar-agent-sd-jwt","draft-narvaneni-agent-uri","draft-zl-agents-networking-framework"],"legendgroup":"Agent discovery \u002f registration","marker":{"color":"rgb(255,255,179)","size":{"dtype":"f8","bdata":"MzMzMzMzD0BmZmZmZmYKQAAAAAAAAARA"},"sizemode":"area","sizeref":0.012,"symbol":"circle","line":{"color":"white","width":0.5},"opacity":0.8},"mode":"markers","name":"Agent discovery \u002f registration","orientation":"v","showlegend":true,"x":{"dtype":"f4","bdata":"fJH3wA5DF0BBThBB"},"xaxis":"x","y":{"dtype":"f4","bdata":"l+l2wEnPesAd6iLB"},"yaxis":"y","type":"scatter"}], {"template":{"data":{"barpolar":[{"marker":{"line":{"color":"white","width":0.5},"pattern":{"fillmode":"overlay","size":10,"solidity":0.2}},"type":"barpolar"}],"bar":[{"error_x":{"color":"#2a3f5f"},"error_y":{"color":"#2a3f5f"},"marker":{"line":{"color":"white","width":0.5},"pattern":{"fillmode":"overlay","size":10,"solidity":0.2}},"type":"bar"}],"carpet":[{"aaxis":{"endlinecolor":"#2a3f5f","gridcolor":"#C8D4E3","linecolor":"#C8D4E3","minorgridcolor":"#C8D4E3","startlinecolor":"#2a3f5f"},"baxis":{"endlinecolor":"#2a3f5f","gridcolor":"#C8D4E3","linecolor":"#C8D4E3","minorgridcolor":"#C8D4E3","startlinecolor":"#2a3f5f"},"type":"carpet"}],"choropleth":[{"colorbar":{"outlinewidth":0,"ticks":""},"type":"choropleth"}],"contourcarpet":[{"colorbar":{"outlinewidth":0,"ticks":""},"type":"contourcarpet"}],"contour":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"contour"}],"heatmap":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"heatmap"}],"histogram2dcontour":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"histogram2dcontour"}],"histogram2d":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"histogram2d"}],"histogram":[{"marker":{"pattern":{"fillmode":"overlay","size":10,"solidity":0.2}},"type":"histogram"}],"mesh3d":[{"colorbar":{"outlinewidth":0,"ticks":""},"type":"mesh3d"}],"parcoords":[{"line":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"parcoords"}],"pie":[{"automargin":true,"type":"pie"}],"scatter3d":[{"line":{"colorbar":{"outlinewidth":0,"ticks":""}},"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scatter3d"}],"scattercarpet":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattercarpet"}],"scattergeo":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattergeo"}],"scattergl":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattergl"}],"scattermapbox":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattermapbox"}],"scattermap":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattermap"}],"scatterpolargl":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scatterpolargl"}],"scatterpolar":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scatterpolar"}],"scatter":[{"fillpattern":{"fillmode":"overlay","size":10,"solidity":0.2},"type":"scatter"}],"scatterternary":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scatterternary"}],"surface":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"surface"}],"table":[{"cells":{"fill":{"color":"#EBF0F8"},"line":{"color":"white"}},"header":{"fill":{"color":"#C8D4E3"},"line":{"color":"white"}},"type":"table"}]},"layout":{"annotationdefaults":{"arrowcolor":"#2a3f5f","arrowhead":0,"arrowwidth":1},"autotypenumbers":"strict","coloraxis":{"colorbar":{"outlinewidth":0,"ticks":""}},"colorscale":{"diverging":[[0,"#8e0152"],[0.1,"#c51b7d"],[0.2,"#de77ae"],[0.3,"#f1b6da"],[0.4,"#fde0ef"],[0.5,"#f7f7f7"],[0.6,"#e6f5d0"],[0.7,"#b8e186"],[0.8,"#7fbc41"],[0.9,"#4d9221"],[1,"#276419"]],"sequential":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"sequentialminus":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]]},"colorway":["#636efa","#EF553B","#00cc96","#ab63fa","#FFA15A","#19d3f3","#FF6692","#B6E880","#FF97FF","#FECB52"],"font":{"color":"#2a3f5f"},"geo":{"bgcolor":"white","lakecolor":"white","landcolor":"white","showlakes":true,"showland":true,"subunitcolor":"#C8D4E3"},"hoverlabel":{"align":"left"},"hovermode":"closest","mapbox":{"style":"light"},"paper_bgcolor":"white","plot_bgcolor":"white","polar":{"angularaxis":{"gridcolor":"#EBF0F8","linecolor":"#EBF0F8","ticks":""},"bgcolor":"white","radialaxis":{"gridcolor":"#EBF0F8","linecolor":"#EBF0F8","ticks":""}},"scene":{"xaxis":{"backgroundcolor":"white","gridcolor":"#DFE8F3","gridwidth":2,"linecolor":"#EBF0F8","showbackground":true,"ticks":"","zerolinecolor":"#EBF0F8"},"yaxis":{"backgroundcolor":"white","gridcolor":"#DFE8F3","gridwidth":2,"linecolor":"#EBF0F8","showbackground":true,"ticks":"","zerolinecolor":"#EBF0F8"},"zaxis":{"backgroundcolor":"white","gridcolor":"#DFE8F3","gridwidth":2,"linecolor":"#EBF0F8","showbackground":true,"ticks":"","zerolinecolor":"#EBF0F8"}},"shapedefaults":{"line":{"color":"#2a3f5f"}},"ternary":{"aaxis":{"gridcolor":"#DFE8F3","linecolor":"#A2B1C6","ticks":""},"baxis":{"gridcolor":"#DFE8F3","linecolor":"#A2B1C6","ticks":""},"bgcolor":"white","caxis":{"gridcolor":"#DFE8F3","linecolor":"#A2B1C6","ticks":""}},"title":{"x":0.05},"xaxis":{"automargin":true,"gridcolor":"#EBF0F8","linecolor":"#EBF0F8","ticks":"","title":{"standoff":15},"zerolinecolor":"#EBF0F8","zerolinewidth":2},"yaxis":{"automargin":true,"gridcolor":"#EBF0F8","linecolor":"#EBF0F8","ticks":"","title":{"standoff":15},"zerolinecolor":"#EBF0F8","zerolinewidth":2}}},"xaxis":{"anchor":"y","domain":[0.0,1.0],"title":{"text":"TSNE 1"}},"yaxis":{"anchor":"x","domain":[0.0,1.0],"title":{"text":"TSNE 2"}},"legend":{"title":{"text":"Primary Category"},"tracegroupgap":0,"itemsizing":"constant","font":{"size":10}},"title":{"text":"IETF AI\u002fAgent Draft Landscape (260 drafts)"},"font":{"family":"Inter, Arial, sans-serif"},"width":1200,"height":800}, {"responsive": true} ) }; </script> </div>
|
|
</body>
|
|
</html> |