New features: - 12 interactive visualizations (ietf viz): t-SNE landscape, similarity heatmap, score distributions, timeline, bubble explorer, radar charts, author network graph, category treemap, quality vs overlap, org bar chart, ideas chart, and interactive draft browser - Interactive draft browser (browser.html): filterable by category, keyword, score sliders with sortable table and expandable detail rows - arXiv paper (paper/main.tex): 13-page manuscript with all findings - Gap analysis: 12 identified under-addressed areas - Author network: collaboration graph, org contributions, cross-org analysis - Draft generation from gaps (ietf draft-gen) - Auto-load .env for API keys (python-dotenv) New modules: visualize.py, authors.py, draftgen.py New reports: timeline, overlap-matrix, authors, gaps New deps: plotly, matplotlib, seaborn, scipy, scikit-learn, networkx, python-dotenv Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
7 lines
69 KiB
HTML
7 lines
69 KiB
HTML
<html>
|
|
<head><meta charset="utf-8" /></head>
|
|
<body>
|
|
<div> <script type="text/javascript">window.PlotlyConfig = {MathJaxConfig: 'local'};</script>
|
|
<script charset="utf-8" src="https://cdn.plot.ly/plotly-3.3.1.min.js" integrity="sha256-4rD3fugVb/nVJYUv5Ky3v+fYXoouHaBSP20WIJuEiWg=" crossorigin="anonymous"></script> <div id="7f155c4a-0b13-4f04-a667-fbe6ae9a3aa3" class="plotly-graph-div" style="height:750px; width:1100px;"></div> <script type="text/javascript"> window.PLOTLYENV=window.PLOTLYENV || {}; if (document.getElementById("7f155c4a-0b13-4f04-a667-fbe6ae9a3aa3")) { Plotly.newPlot( "7f155c4a-0b13-4f04-a667-fbe6ae9a3aa3", [{"customdata":[[4.8,1,5,"2026-01-02","Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and"],[4.45,2,4,"2026-02-25","Defines CDDL-based data format for verifiable agent conversation records using COSE signing. Support"],[4.45,1,4,"2026-01-26","Comprehensive AI governance framework with tiered risk model, federated authority network, and econo"],[3.9,2,3,"2026-02-12","Introduces VERA, a zero-trust architecture for AI agent security with five enforcement pillars and c"],[3.65,3,4,"2025-11-02","Establishes security requirements for AI agents across their operational lifecycle. Covers provision"],[3.65,2,3,"2025-07-24","Proposes CHEQ protocol for human-in-the-loop confirmation of AI agent decisions before execution. Us"],[3.45,1,2,"2026-01-06","Establishes a framework for evaluating whether autonomous agent speech acts are admissible based on "],[3.1,1,1,"2025-12-19","Specifies protocol for immutable AGI system identification using Bitcoin blockchain anchoring. Defin"],[2.85,1,1,"2025-09-14","Proposes SRTA architecture and Trinity Configuration for safe AGI coordination using theological ana"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=AI safety\u002falignment\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-aylward-daap-v2","draft-birkholz-verifiable-agent-conversations","draft-aylward-aiga-2","draft-berlinai-vera","draft-ni-a2a-ai-agent-security-requirements","draft-rosenberg-cheq","draft-romanchuk-normative-admissibility","draft-architect-cittamarket","draft-takagi-srta-trinity"],"legendgroup":"AI safety\u002falignment","marker":{"color":"rgb(141,211,199)","size":{"dtype":"i1","bdata":"BQUFBQUEAwMC"},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"AI safety\u002falignment","orientation":"v","showlegend":true,"x":[5.185279567148317,3.802684584042504,5.192536005731664,3.84380592371251,2.948944427162489,4.152680869614027,5.09442142715411,4.816957636558197,4.839646427474002],"xaxis":"x","y":[4.144930607742828,5.073688368682694,3.0650161794304975,3.117923026819639,2.9653137537465257,3.1609704057899535,2.136267220885454,0.8593074927853455,0.8415962152755728],"yaxis":"y","type":"scatter"},{"customdata":[[4.65,1,4,"2025-11-03","Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou"],[4.65,1,4,"2026-02-20","Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb"],[4.55,2,4,"2026-01-01","Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Int"],[4.35,3,4,"2026-02-27","Adapts BRSKI secure device onboarding for constrained IoT environments using CBOR vouchers and CoAP\u002f"],[4.3,2,5,"2025-11-04","Comprehensive specification for hybrid public key encryption supporting arbitrary-sized plaintexts. "],[4.3,2,5,"2026-02-26","Defines WIMSE profile for cryptographically binding workload identities to their execution environme"],[4.25,2,4,"2025-11-24","Defines HTTP Agent Profile for authenticating agent traffic, separating human from agent traffic, an"],[4.25,2,4,"2026-02-04","Extends OAuth RAR with policy_context and lifecycle_binding members for AI agent environments. Enabl"],[4.25,2,4,"2026-02-07","Defines an OAuth 2.0 authorization profile specifically for autonomous AI agents, extending existing"],[4.15,3,4,"2026-02-11","Extends OAuth Transaction Tokens framework to support agent context propagation with actor and princ"],[4.15,3,4,"2026-01-08","Specifies an optimized KEM-based authentication variant for EDHOC protocol in scenarios where the in"],[4.05,2,4,"2025-11-25","Specifies framework for verifiable delegation of actions from humans to AI agents using JWT tokens. "],[4.05,2,4,"2026-02-26","Extends OAuth 2.0 Token Exchange with cryptographically verifiable actor chains to provide tamper-ev"],[4.05,2,4,"2025-10-20","Defines quantum-resistant cipher suites for EDHOC using ML-DSA signatures and ML-KEM key exchange. S"],[4.0,3,3,"2026-02-27","Extends OAuth 2.0 for AI agent authorization with human consent verification, revocation, and audit "],[4.0,3,3,"2026-02-25","Specifies Contextual Agent Authorization Mesh for runtime authorization of agents after discovery, p"],[4.0,2,4,"2026-02-25","Defines Execution Context Tokens as JWT extension to WIMSE for tracking task execution in distribute"],[3.9,3,4,"2025-11-21","Specifies lightweight authorization using EDHOC for zero-touch device onboarding. Enables secure enr"],[3.9,3,4,"2025-10-20","Specifies carrying EST certificate provisioning over CoAP using OSCORE protection instead of DTLS. B"],[3.9,2,3,"2025-10-20","Generic framework for Post-Quantum\u002fTraditional hybrid key encapsulation mechanisms. Provides concret"],[3.85,3,4,"2026-02-21","Specifies Clawdentity protocol for cryptographic identity and trust in AI agent communication. Provi"],[3.85,2,3,"2026-02-27","Defines Asynchronous Remote Key Generation algorithm enabling delegation of public key generation wi"],[3.8,2,4,"2026-02-26","Enhances EAP-AKA' with post-quantum cryptography to address quantum computing threats. Uses hybrid P"],[3.8,1,3,"2026-01-06","Identifies new authentication and authorization requirements for AI agents that go beyond traditiona"],[3.75,1,3,"2025-10-16","Extends SCIM 2.0 protocol to manage AI agents and agentic applications across domains. Adds new sche"],[3.7,2,4,"2025-10-11","Extends SCIM 2.0 specification to manage agents and agentic applications across domains. Builds on e"],[3.7,4,3,"2025-11-02","Defines comprehensive agent identity management for Internet of Agents systems. Covers agent registr"],[3.7,2,4,"2025-06-05","Updates SASL framework to support modern authentication requirements including multi-factor authenti"],[3.7,2,4,"2025-10-19","Outlines how nonces are supplied to end entities by RA\u002fCA for inclusion in attestation evidence with"],[3.7,2,4,"2025-11-21","Specifies remote attestation procedures integrated with EDHOC lightweight key exchange protocol. Ena"],[3.7,2,2,"2025-11-28","Authorization protocol supporting probabilistic decisions for agents and services. Enables uncertain"],[3.65,3,2,"2025-10-25","Extends EDHOC with KEM-based authentication for post-quantum resistance. Enables signature-free quan"],[3.65,2,3,"2025-10-20","Extends OAuth 2.1 for AI agents operating through PSTN\u002fSMS channels to obtain access tokens using PI"],[3.65,2,3,"2026-02-24","Defines an Entity Attestation Token profile for remote attestation of autonomous AI agents, specifyi"],[3.6,3,4,"2025-10-20","Defines ACE framework profile using EDHOC for mutual authentication and OSCORE for secure communicat"],[3.6,3,3,"2025-10-20","Specifies OAuth Transaction Token profile for Agent-to-Agent communication. Embeds call chain contex"],[3.55,3,3,"2025-11-06","Proposes OAuth 2.0 extension for multi-AI agent collaboration with applier-on-behalf-of authorizatio"],[3.5,2,4,"2026-02-10","Extends OAuth 2.0 with scope aggregation to reduce authorization round-trips in multi-step AI agent "],[3.5,2,4,"2026-02-26","This draft proposes enhancing EAP-AKA' Forward Secrecy with Post-Quantum Key Encapsulation Mechanism"],[3.45,4,3,"2025-07-10","Enhances EAP-AKA' with hybrid post-quantum cryptography combining traditional and quantum-resistant "],[3.45,2,3,"2025-12-16","Extends Entity Attestation Token (EAT) to support capability attestation for agentic AI systems. Ena"],[3.45,2,3,"2025-11-13","Defines dynamic attestation mechanisms for AI agents to convey runtime posture changes during long-l"],[3.35,2,2,"2026-01-02","Defines comprehensive badge-based identity and communication system with trust scoring, post-quantum"],[3.25,3,3,"2026-02-06","Addresses authorization challenges in distributed multi-agent systems across multiple domains. Cover"],[3.2,3,3,"2026-02-14","Defines EAP authentication method based on EDHOC for constrained environments. Integrates EDHOC's li"],[3.2,3,4,"2025-10-16","This draft extends the EDHOC protocol to provide quantum-resistant authentication using KEM-based me"],[3.2,2,2,"2025-10-20","Defines a JSON format for web bot signature agent cards to advertise identity, purpose, and cryptogr"],[3.15,4,3,"2025-07-10","Enhances EAP-AKA' with post-quantum key encapsulation mechanisms to protect against quantum computer"],[3.15,2,3,"2025-10-20","Extends OAuth model for AI agent authentication and authorization in Agent Communication Networks. P"],[3.15,3,2,"2025-11-22","Specifies EPHEMSEC algorithm for generating one-time passwords using public key cryptography instead"],[3.1,2,3,"2025-09-27","Extends TOTP enrollment to prevent key compromise through QR code capture or key persistence in exte"],[3.05,3,3,"2025-10-20","Applies WIMSE (Workload Identity in Multi System Environments) framework to AI agents for identity a"],[3.05,4,3,"2025-12-07","Defines security association negotiation protocol for Bundle Protocol agents in delay-tolerant netwo"],[3.05,3,3,"2025-10-20","Defines EDHOC-AKA authentication method combining AKA protocol with EDHOC for mobile network access "],[3.0,4,4,"2025-11-04","Formalizes framework for verifiable telephone number identity using delegate certificates and author"],[2.95,4,3,"2026-02-11","Defines comprehensive framework for cross-domain AI agent interoperability including identity federa"],[2.95,3,2,"2026-02-07","Specifies trust anchor bootstrap protocol for proof of process framework. Defines device enrollment,"],[2.95,4,3,"2026-01-20","This draft proposes a KEM-based authentication variant for EDHOC that optimizes for scenarios where "],[2.85,1,3,"2025-06-07","Enhances BRSKI for device bootstrapping where pledges act as servers in responder mode. Introduces r"],[2.85,1,2,"2026-01-02","Specifies method to bind OpenID Connect authentication to ASN agents using RPKI infrastructure. Addr"],[2.85,3,2,"2025-12-03","Improves HTTP Bearer authentication with automatic token fetching from STS. Eliminates need for PKCE"],[2.8,4,3,"2026-01-07","Provides implementation guidance for EDHOC authenticated key exchange protocol. Offers practical con"],[2.75,2,2,"2025-10-12","Defines deriving HMAC keys from public key information in JOSE using Diffie-Hellman key agreement. E"],[2.65,3,3,"2025-08-14","Describes method for generating semantically opaque IPv6 interface identifiers in DHCPv6. Adapts RFC"],[2.55,4,3,"2025-11-05","Extends OAuth 2.0 with a web message response mode using postMessage API for popup and iframe-based "],[2.4,2,2,"2026-01-09","This draft defines a mechanism for EDHOC peers to agree in-band on output lengths for the EDHOC_Expo"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Agent identity\u002fauth\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-guy-bary-stamp-protocol","draft-drake-email-tpm-attestation","draft-goswami-agentic-jwt","draft-ietf-anima-constrained-voucher","draft-ietf-hpke-hpke","draft-mw-wimse-transitive-attestation","draft-dhir-http-agent-profile","draft-chen-oauth-rar-agent-extensions","draft-aap-oauth-profile","draft-oauth-transaction-tokens-for-agents","draft-lake-pocero-authkem-ikr-edhoc","draft-liu-agent-operation-authorization","draft-mw-spice-actor-chain","draft-spm-lake-pqsuites","draft-mishra-oauth-agent-grants","draft-barney-caam","draft-nennemann-wimse-ect","draft-ietf-lake-authz","draft-ietf-ace-coap-est-oscore","draft-josefsson-chempat","draft-ravikiran-clawdentity-protocol","draft-bradleylundberg-cfrg-arkg","draft-ietf-emu-hybrid-pqc-eapaka","draft-chen-ai-agent-auth-new-requirements","draft-abbey-scim-agent-extension","draft-scim-agent-extension","draft-zheng-agent-identity-management","draft-melnikov-sasl2","draft-ietf-lamps-attestation-freshness","draft-ietf-lake-ra","draft-gaikwad-south-authorization","draft-pocero-authkem-edhoc","draft-rosenberg-oauth-aauth","draft-messous-eat-ai","draft-ietf-ace-edhoc-oscore-profile","draft-liu-oauth-a2a-profile","draft-song-oauth-ai-agent-collaborate-authz","draft-jia-oauth-scope-aggregation","draft-ietf-emu-pqc-eapaka","draft-ar-emu-hybrid-pqc-eapaka","draft-huang-rats-agentic-eat-cap-attest","draft-jiang-seat-dynamic-attestation","draft-cosmos-protocol-specification","draft-diaconu-agents-authz-info-sharing","draft-ietf-emu-eap-edhoc","draft-lake-pocero-authkem-edhoc","draft-meunier-webbotauth-registry","draft-ra-emu-pqc-eapaka","draft-yao-agent-auth-considerations","draft-mvieuille-kerpass-ephemsec","draft-contario-totp-secure-enrollment","draft-ni-wimse-ai-agent-identity","draft-sipos-dtn-bp-safe","draft-chen-lake-edhoc-aka","draft-wendt-stir-vesper","draft-cui-dmsc-agent-cdi","draft-condrey-rats-witnessd-enrollment","draft-pocero-authkem-ikr-edhoc","draft-ietf-anima-brski-prm","draft-blahaj-grow-rpki-oauth","draft-williams-http-bearer-extension","draft-ietf-lake-edhoc-impl-cons","draft-bastian-jose-dvs","draft-gont-dhcwg-dhcpv6-iids","draft-meyerzuselha-oauth-web-message-response-mode","draft-tiloca-lake-exporter-output-length"],"legendgroup":"Agent identity\u002fauth","marker":{"color":"rgb(255,255,179)","size":{"dtype":"i1","bdata":"BQUFBQUFBQUFBQUFBQUFBQQEBAUFBAQFBAQFBAQEBAUEBAQFBAQEBAQEAwQDBAQEBAMDBAIEAgQDBAIDAwMDAgIC"},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Agent identity\u002fauth","orientation":"v","showlegend":true,"x":[5.072862829948793,5.15757226951009,4.905769812041958,3.9629094976414034,2.914857147035823,4.960997148492145,4.026556424904622,3.8383942521403585,4.003636556057797,3.903507151091947,4.028769250166293,4.038327193963182,3.9787632270652824,4.171278371674498,3.9945953974458934,3.8013720974251224,4.106683808317888,3.9746439487588026,4.099095160353457,4.030229039907009,3.0079131119855007,4.006190682664295,4.015631055366191,4.1111802107064905,4.0846872648186565,2.8276888643148967,4.041914786567237,3.092121503883038,3.1912581820774624,3.1307017152520658,4.0768588679768305,3.8095011079935137,3.816995467796767,4.040840144040712,2.8878732959089985,3.879506352247414,4.141503070460206,3.0862418655991237,2.8125647216001135,3.8199780752054444,3.9916015573504593,4.118710216886837,5.098344085217012,2.978496238427784,2.9460358547510594,2.9162987730472314,2.8042313035820414,2.9868169735170227,3.108016101898926,3.9859444206902293,2.8021089076933023,2.9819042924052406,2.8177205098769873,2.884925196532331,2.868476281318465,3.0281994942757384,3.8133615946927195,3.0286998156133946,1.843159772283726,3.0802502415257598,3.135600461616962,1.9904010970151416,3.0561003032097784,1.8128064879720085,2.169729543153484,1.932977551529889],"xaxis":"x","y":[4.197287408992806,4.011272577356786,3.937533758989901,5.169767675471927,4.969762018173666,1.985871854643525,4.143597640629949,3.924148368408576,3.9885808155902382,4.069407318493051,4.028831265915372,2.8173952213776183,2.879846658564717,3.197373601808024,3.936034566288402,3.809709554336027,3.926220562364996,4.107577844824073,4.114034909404945,3.1439544768234025,4.171676786176299,3.944461573422803,2.9363616483001063,1.827387947347067,2.920246089442963,3.854475641625381,2.9296338067340937,4.026779211435953,3.806926494157981,4.091974973431693,4.009855030375847,2.9642685217923743,3.0400711217528245,3.044035709429148,3.8232159402504875,2.044974776201215,3.1985281783973556,2.9211055426832666,2.9359110777739486,3.134960335984682,2.079246270293794,1.9441764030312567,2.1112232913098152,3.1322111008803812,4.140881421241817,2.0996106143288142,3.0384025892892543,2.8954400873280437,2.1745398395630606,2.996690690014179,2.918364599926412,2.0095571624853616,4.95762929105563,1.8500620210108052,3.898199246436788,1.9390972370726103,2.187735055197413,2.19615381869134,3.8716451120763216,2.0963486355164775,3.1840527413588577,3.8687437454158484,2.1716164086932586,3.9385313214802866,3.9124312675577686,3.0347562457112596],"yaxis":"y","type":"scatter"},{"customdata":[[4.6,2,5,"2025-11-21","Defines canonical CBOR representation for EDHOC application profiles and coordination mechanisms for"],[4.25,2,4,"2026-02-26","Defines post-quantum hybrid key exchange combining ML-KEM with traditional ECDH for SSH transport la"],[4.25,2,4,"2026-02-19","Adds post-compromise security to TLS 1.3 through fresh Diffie-Hellman exchanges during active sessio"],[4.05,2,4,"2026-02-18","Defines ADL, a JSON-based standard for describing AI agents including their capabilities, tools, per"],[4.05,1,3,"2025-11-05","Defines guidelines for IETF specifications to support AI agent consumption and code generation. Intr"],[3.85,2,3,"2025-12-10","Defines Agentic State Transfer (AST) HTTP profile for managing canonical resource state across multi"],[3.7,2,4,"2026-01-06","Updates RFC7030 to clarify CSR Attributes Response encoding and adds template-based approach for EST"],[3.7,2,4,"2025-12-08","Specifies encryption techniques for firmware and software payloads in SUIT manifests. Uses ES-DH and"],[3.7,2,4,"2026-02-12","Extends EST protocol to provide server-side recommendations for certificate renewal timing. Addresse"],[3.6,1,2,"2025-11-30","Storage service profile for agent persistent state including embeddings, preferences, and audit logs"],[3.6,2,3,"2025-10-09","Describes using LISP to interconnect multiple independent network overlays through a transit overlay"],[3.55,2,3,"2025-11-21","Specifies pre-shared key authentication method for EDHOC key exchange protocol. Enhances efficiency "],[3.45,2,4,"2025-10-20","Provides trust and security recommendations for handling structured data in email messages. Addresse"],[3.4,1,3,"2025-10-13","Defines X.509 attribute for private key possession statements as alternative to cryptographic proof "],[3.4,2,3,"2025-09-15","Defines view and addressing mechanisms for secure asset transfer between DLT systems. Enables cross-"],[3.2,3,3,"2025-10-17","Proposes Events Query Protocol (EQP) built on HTTP for user agents to receive event notifications di"],[3.1,1,3,"2025-09-04","Updates RFC 3396 to make DHCP option concatenation requirements more flexible. Addresses real-world "],[3.1,1,3,"2026-02-26","Defines compliance requirements for Certificate Management Messages over CMS (CMC) enrollment protoc"],[3.0,3,4,"2025-08-23","Provides comprehensive guidance for implementing end-to-end email encryption securely. Addresses usa"],[2.95,2,2,"2025-08-30","Provides trust and security recommendations for handling structured data in email messages. Focuses "],[2.95,2,2,"2025-09-15","Defines a DLT-neutral protocol for sharing asset views and metadata across blockchain networks via g"],[2.95,2,2,"2025-11-04","Defines a method to derive symmetric MAC keys from public information in JSON Web Signatures using D"],[2.8,2,3,"2026-01-30","Proposes HTTP header for disclosing AI-generated content in web responses. Provides machine-readable"],[2.75,2,3,"2026-01-12","Specifies requirements for uniform HTML email rendering across mail clients, addressing inconsistenc"],[2.75,1,2,"2026-01-24","Extends EST protocol to provide certificate renewal timing recommendations from CA to end-entity dev"],[2.75,2,2,"2025-11-14","Defines an HTTP-based protocol for efficient delivery of web content to automated agents using bidir"],[2.65,2,2,"2025-08-20","This draft specifies ECDH-based Private Set Intersection (PSI) for two parties using elliptic curve "],[2.55,4,2,"2026-01-21","YAML-based format for sharing software project context with AI development tools. Addresses context "],[2.4,4,2,"2026-02-27","Specifies automatic configuration mechanism for email, calendar, and contact applications. Service p"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Data formats\u002finterop\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-ietf-lake-app-profiles","draft-ietf-sshm-mlkem-hybrid-kex","draft-ietf-tls-extended-key-update","draft-nederveld-adl","draft-steele-agent-considerations","draft-jurkovikj-httpapi-agentic-state","draft-ietf-lamps-rfc7030-csrattrs","draft-ietf-suit-firmware-encryption","draft-ietf-lamps-est-renewal-info","draft-gaikwad-aps-profile","draft-moreno-lisp-uberlay","draft-ietf-lake-edhoc-psk","draft-ietf-sml-trust","draft-ietf-lamps-private-key-stmt-attr","draft-ramakrishna-satp-views-addresses","draft-gupta-httpapi-events-query","draft-tojens-dhcp-option-concat-considerations","draft-ietf-lamps-rfc5274bis","draft-ietf-lamps-e2e-mail-guidance","draft-happel-structured-email-trust","draft-ramakrishna-satp-data-sharing","draft-bastian-jose-pkdh","draft-abaris-aicdh","draft-hackett-ures","draft-yusef-lamps-rfc7030-renewal-recommendation","draft-jurkovikj-collab-tunnel","draft-wang-ppm-ecdh-psi","draft-wolfe-faf-format","draft-ietf-mailmaint-pacc"],"legendgroup":"Data formats\u002finterop","marker":{"color":"rgb(190,186,218)","size":{"dtype":"i1","bdata":"BQUFBQQEBAQEBAMEAwMDAwMDAgMDAwMCAwMDAwI="},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Data formats\u002finterop","orientation":"v","showlegend":true,"x":[4.120653454407996,4.187936619819693,4.075009692628791,3.925700921729949,4.942240164046756,3.9263826321773347,2.8423971849882816,2.921887807413989,2.8033478520959796,4.0663649609221775,4.05910460453232,2.8754960447218827,3.1396855495797,3.06181309528912,4.097238265230894,3.0827693992106533,2.1108877613297765,2.007471012356867,2.1886148553869305,2.940225520029516,3.0328214807741873,3.1595402068183094,2.1080365775420846,1.8098314522777608,2.180808007276086,3.0963179224440576,2.169498124067001,2.898434557258852,2.1036337116816473],"xaxis":"x","y":[4.826681188093578,3.8971635342878272,3.8243608978129595,2.8209752033690405,3.1685140926786866,4.198050630231602,3.8386369568170484,3.8882688567752064,3.834920016203147,3.0090483237383903,3.8856106754310975,4.062476001111349,3.914019008492957,3.8918347734698426,3.169722887918949,3.8196158661512394,4.018240003774018,3.8177512055037353,4.965074363953738,2.96114982976267,3.188464076780318,2.852156232007203,3.007933416913805,3.9554531972454052,3.024660963896309,1.8413744094457543,3.147596045385791,2.02341596048894,4.0067497280408295],"yaxis":"y","type":"scatter"},{"customdata":[[4.55,2,4,"2026-01-12","Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco"],[4.25,2,4,"2026-01-17","Resource-efficient messaging protocol specifically designed for constrained IoT\u002fEdge devices with de"],[4.15,1,4,"2026-01-16","Analyzes security risks in multi-agent communication and limitations of existing protocols like TLS "],[4.15,3,4,"2026-02-26","Specifies a comprehensive multi-agent collaboration protocol suite using Agent Gateways for registra"],[3.95,1,2,"2025-11-24","Defines semantic communication protocol for AI agents using intent-based routing and negotiation. Re"],[3.9,2,3,"2026-02-16","Proposes an Intelligent Agent Communication Gateway for large-scale multi-agent collaboration. Featu"],[3.9,2,3,"2025-11-02","Proposes Data and Agent Aware-Inference and Training Network (DA-ITN) architecture. Comprehensive mu"],[3.9,2,3,"2025-11-06","Defines Agent-to-Tool (A2T) protocol for integrating third-party APIs into AI agent operations. Prov"],[3.85,2,3,"2026-02-20","Specifies SlimWire Protocol Core, a binary framing layer for agent\u002ftool messaging with profile-based"],[3.7,3,5,"2025-10-20","Provides framework and requirements for AI agent protocols on the Internet. Surveys existing approac"],[3.7,3,4,"2026-02-06","Defines framework for orchestrating In-Network Computing Functions in Cooperative Intelligent Transp"],[3.7,1,2,"2025-12-15","Defines architectural model for Artificial Intelligence Internet Protocol (AIIP) enabling stateless,"],[3.65,5,4,"2025-10-20","Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on e"],[3.65,5,4,"2025-10-20","Defines N-ACT protocol for AI agents to discover and invoke third-party tools and APIs. Focuses on e"],[3.65,2,3,"2025-10-20","Defines comprehensive framework for AI agent networks based on Agent Network Protocol (ANP). Provide"],[3.65,1,2,"2025-10-14","Defines a protocol for autonomous agents to file and resolve disputes through structured automated p"],[3.65,2,3,"2025-11-02","Analyzes gaps in existing networking and AI protocols for cross-device communication between AI agen"],[3.65,2,3,"2026-01-30","Defines framework for intercommunication between Agent Gateways in Agent Internet ecosystem. Address"],[3.65,2,3,"2025-07-20","Defines the Internet of Agents Protocol for distributed collaboration among heterogeneous AI agents."],[3.65,2,3,"2025-11-04","Introduces semantic routing architecture using intent vectors and trust scores for AI agent communic"],[3.65,2,3,"2026-01-18","Defines a comprehensive control-plane protocol for secure agent interactions with delegation, author"],[3.55,4,4,"2026-01-29","Proposes Agent Collaboration Protocols architecture for Internet of Agents, covering agent lifecycle"],[3.45,3,2,"2025-10-21","Proposes Real-Virtual Agent Protocol for coordinating physical entities with digital agents through "],[3.45,4,3,"2026-02-06","Defines a protocol suite using Agent Gateways as control-plane entities for multi-agent collaboratio"],[3.4,3,4,"2026-02-12","Discusses applying Agent-to-Agent (A2A) Protocol to network management for communication between Con"],[3.35,2,3,"2025-10-20","Examines AI agent communication protocols specifically for 6G systems based on 3GPP requirements. Ex"],[3.35,3,3,"2026-02-10","Defines Intent-based Agent Interconnection Protocol (IAIP) for dynamic agent discovery and routing a"],[3.25,3,3,"2025-11-28","Discusses requirements for Agent Gateways in agent-to-agent communications to improve scalability, e"],[3.15,4,3,"2026-02-27","Specifies a semantic layer for Internet of Agents using ontology models and JSON-LD serialization. D"],[3.15,4,3,"2026-02-05","Defines Intent-based Agent Interconnection Protocol for Agent Gateways, focusing on semantic intent "],[3.15,5,3,"2025-10-20","Specifies transport of Agent-to-Agent protocol over Media over QUIC Transport. Leverages MOQT's publ"],[3.0,5,2,"2025-10-20","Identical specification to draft-a2a-moqt-transport for transporting Agent-to-Agent protocol over MO"],[2.95,4,3,"2026-01-25","Proposes a multi-agent communication framework for network AIOps with AI gateway, Agent Name Service"],[2.95,4,3,"2026-01-29","Defines a protocol for distributed collaboration among heterogeneous AI agents, enabling dynamic tea"],[2.9,3,2,"2026-02-13","Defines procedures for distributing context among multiple agents in complex workflows. Aims to opti"],[2.85,3,2,"2026-02-16","Introduces Multilink Local Address (MLA) type for autonomous IPv6 addressing in ad hoc networks. Ena"],[2.8,3,3,"2026-01-02","Extends CATS framework to support AI-agent Communication Networks with reference architecture. Defin"],[2.75,4,2,"2026-02-24","Specifies SLIM protocol for real-time interactive AI applications, combining gRPC over HTTP\u002f2\u002f3 with"],[2.75,2,2,"2026-01-16","Defines requirements for gateways in multi-agent systems to improve scalability and security. Identi"],[2.75,2,2,"2026-02-12","Proposes using generative AI to create flexible communication protocols for agent-to-agent interacti"],[2.65,3,2,"2026-02-24","Analyzes messaging protocols for agentic AI systems, comparing AMQP, MQTT, NATS, Kafka and others ac"],[2.55,4,2,"2025-11-02","Describes digital banking scenarios evolving toward agentic service interconnection and proposes an "],[2.45,3,2,"2025-11-02","Proposes communication framework for AI agents deployed across different network devices. Focuses on"],[1.75,5,1,"2025-11-02","Describes digital banking digitalization trends toward agentic services and proposes agent networkin"],[1.65,4,1,"2025-10-17","Brief document exploring requirements for AI agent communication protocols in ubiquitous access coll"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=A2A protocols\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-chang-agent-token-efficient","draft-mallick-muacp","draft-zhang-dmsc-mas-communication","draft-li-dmsc-macp","draft-ainp-protocol","draft-agent-gw","draft-akhavain-moussa-ai-network","draft-rosenberg-aiproto-a2t","draft-tejido-swp-core","draft-rosenberg-aiproto-framework","draft-an-nmrg-i2icf-cits","draft-sogomonian-aiip-architecture","draft-rosenberg-aiproto","draft-rosenberg-aiproto-nact","draft-zyyhl-agent-networks-framework","draft-kotecha-agentic-dispute-protocol","draft-mao-rtgwg-agent-comm-protocol-gap-analysis","draft-han-rtgwg-agent-gateway-intercomm-framework","draft-yang-ioa-protocol","draft-li-semantic-routing-architecture","draft-vandoulas-aidp","draft-liu-dmsc-acps-arc","draft-zhang-rvp-problem-statement","draft-li-dmsc-mcps-agw","draft-yan-a2a-device-agent-applicability","draft-stephan-ai-agent-6g","draft-sz-dmsc-iaip","draft-liu-rtgwg-agent-gateway-requirements","draft-zhang-dmsc-ioa-semantic-interaction","draft-sun-zhang-iaip","draft-a2a-moqt-transport","draft-nandakumar-a2a-moqt-transport","draft-fu-nmop-agent-communication-framework","draft-yang-dmsc-ioa-task-protocol","draft-chang-agent-context-interaction","draft-templin-6man-mla","draft-jiang-cats-reference-acn","draft-mpsb-agntcy-slim","draft-liu-dmsc-gw-requirements","draft-verma-dmsc-nlip-notes","draft-mpsb-agntcy-messaging","draft-men-rtgwg-agent-networking-digibank-scenario","draft-mzsg-rtgwg-agent-cross-device-comm-framework","draft-men-rtgwg-agent-networking-in-digibank","draft-liu-access-collaboration-agent"],"legendgroup":"A2A protocols","marker":{"color":"rgb(251,128,114)","size":{"dtype":"i1","bdata":"BQUFBQUFBQUEBQQEBQUEAwQEBAQEBQUEBAQEBAQEBAQEBAQDAwMDAwMDAwIC"},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"A2A protocols","orientation":"v","showlegend":true,"x":[4.818155130795935,4.038536944429997,4.108820562131136,3.8667160277949404,5.199475395156069,4.119831059854202,4.110536915903331,3.8685971947363127,4.045766867884335,1.960582254573697,3.9466452590248866,4.805912879340331,2.998151198958732,3.1565488821499543,4.038588400181681,5.071400027369996,4.156456974962878,3.920800845815239,4.056108689492512,4.050947247236377,3.8798613920655374,3.0041512211509214,3.839890349169178,4.122343324565325,3.054451566278839,3.1901838570416294,4.067543776524666,2.8515776786445337,3.0050293176143947,2.8718617284971355,3.999760055832486,4.146304856620021,2.8513599683589135,2.858913656245752,2.827885543541923,2.926465687340232,3.154010078779691,2.8333125871097513,3.0531487873160392,2.8493431747881854,2.858366910447222,2.904792973906699,3.0825932012358974,2.198921959707671,2.032915061607558],"xaxis":"x","y":[4.193282554227822,3.808628253438765,3.102617353208507,4.040121315220043,1.8946196103862198,2.8779435414298167,2.987141948841953,2.928360800630017,3.8367134525289637,4.163210875238882,3.1504941288144948,1.8052077332441714,4.114472700892955,4.123279934425946,2.890302081425165,3.1741164758989386,2.905580504626548,3.035968044445157,3.1411745949309684,2.886310181514119,2.8023657075989687,2.9678124389635077,1.93389084569828,3.0978115844156604,3.0053607614700892,2.81005580857265,2.1106999871632564,3.1296325117895636,2.9662461049317743,2.9315017159699517,2.1889618367355217,2.1827997424863987,2.02787554965145,2.037687178384522,1.9194235251112481,3.008788839084839,2.018540682100478,2.967279709817064,1.8884974280405067,1.993863536752596,1.9267750503931973,1.8487559225497505,1.1227611890024494,1.8923610860181,0.8331289818798575],"yaxis":"y","type":"scatter"},{"customdata":[[4.4,2,5,"2026-02-17","Defines hybrid post-quantum key agreement mechanisms for TLS 1.3 that combine ML-KEM with traditiona"],[2.95,5,5,"2025-12-09","Updates HTTP Cookie specification to replace RFC 6265 with improved security and privacy. Addresses "],[2.85,1,3,"2026-02-12","Defines a DHCP relay agent suboption for broadband networks to include UP-specific information. Ensu"],[2.8,5,4,"2025-11-18","Updates HTTP cookie specification replacing RFC 6265. Maintains existing widely-deployed cookie func"],[2.75,1,4,"2026-02-27","Provides operational recommendations for automated DS parameter acceptance in DNS. Addresses technic"],[2.7,1,2,"2026-01-27","Defines a DHCP relay agent suboption for broadband networks to include UP-specific information. Ensu"],[2.6,1,1,"2026-02-11","Proposes ASL protocol using novel phi-ns-x arithmetic primitive instead of traditional crypto. Claim"],[2.0,4,2,"2026-01-12","Presents problem statement and gap analysis for MANET internetworking with fixed networks. Identifie"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Other AI\u002fagent\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-ietf-tls-ecdhe-mlkem","draft-ietf-httpbis-rfc6265bis","draft-zhul-intarea-bnc-up-specific-suboption","draft-ietf-httpbis-layered-cookies","draft-ietf-dnsop-ds-automation","draft-zhul-dhc-bnc-up-specific-suboption","draft-nsiangani-authenticatedsecuredlayer","draft-templin-manet-inet"],"legendgroup":"Other AI\u002fagent","marker":{"color":"rgb(128,177,211)","size":{"dtype":"i1","bdata":"BQICAgECAQI="},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Other AI\u002fagent","orientation":"v","showlegend":true,"x":[4.0048811435193965,1.884316680493069,2.037586869128263,1.9685226964710543,2.13662425374643,2.162393101743283,4.8320788457618296,1.896154625373722],"xaxis":"x","y":[4.131741639081545,4.922559708231505,3.8181026324025495,5.083494752848162,4.038539357102111,4.06797537761524,0.897416825328654,2.1885916333944593],"yaxis":"y","type":"scatter"},{"customdata":[[4.35,1,4,"2025-12-30","Provides comprehensive evaluation framework for LLM-based network configuration agents. Includes emu"],[4.25,2,4,"2026-02-24","Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o"],[4.05,2,4,"2026-02-06","Defines task-oriented multi-agent framework for fault recovery in converged mobile networks. Targets"],[4.0,2,4,"2025-09-23","Combines LISP with H3 spatial indexing to create geospatial intelligence network for physical-world "],[3.9,2,3,"2025-11-02","Analyzes gaps in existing network configuration protocols for LLM-driven intent-based networking. Id"],[3.8,2,4,"2026-02-25","Proposes symmetry-driven forwarding mechanism for LEO satellite networks to avoid routing loops and "],[3.75,3,4,"2026-02-27","Defines AI-driven Network Management Agent concept for Level 4 autonomous networks. Specifies integr"],[3.75,3,3,"2025-10-20","Describes lightweight variation of Autonomic Networking Infrastructure without expensive ACP impleme"],[3.7,2,4,"2025-11-03","Specifies a NETCONF mechanism to map configuration modifications to their originating NMS using exte"],[3.65,2,3,"2025-11-03","Introduces a comprehensive agents networking framework for enterprise and broadband environments. De"],[3.65,2,3,"2025-11-02","Proposes using Model Context Protocol (MCP) to enable LLM-based automated network troubleshooting. M"],[3.65,2,3,"2026-02-22","Framework for AI-assisted network protocol testing using LLMs and automated test generation. Defines"],[3.55,3,3,"2025-09-14","Defines framework for collaborative network management between LLMs and human operators with human-i"],[3.45,3,3,"2025-11-02","Analyzes NETCONF limitations for advanced scenarios and proposes MCP and A2A protocols as complement"],[3.45,2,3,"2025-11-02","Proposes AI Network Security Agents for routers to provide intelligent, adaptive security capabiliti"],[3.35,2,3,"2026-02-14","Presents problem statement for integrating Model Context Protocol into network management for AI age"],[3.3,2,2,"2025-12-12","Proposes intent-based management framework for Software-Defined Vehicles in ITS environments. Covers"],[3.25,3,3,"2025-10-20","Focuses on large language model-based agents for network operations and maintenance. Addresses pract"],[3.25,3,3,"2026-01-09","Proposes an integrated security framework for 5G edge networks using I2NSF architecture with Intent-"],[3.2,3,4,"2025-11-02","Introduces network AI agent use cases in 6G focusing on connectivity services and third-party applic"],[3.15,2,3,"2026-02-05","Proposes a network infrastructure architecture for large-scale multi-agent collaboration. Focuses on"],[3.15,2,3,"2025-10-20","Applies Model Context Protocol to network management for intent-based troubleshooting. Maps MCP role"],[3.05,3,3,"2026-01-05","Presents Integrated Sensing and Communications (ISAC) as a use case for CATS architecture. Explores "],[2.95,4,3,"2025-10-20","Presents problem statement and motivations for applying Agentic AI to network management. Emphasizes"],[2.95,3,2,"2025-10-20","Proposes AI agent architecture for Digital Twin Networks, integrating autonomous agents at each DTN "],[2.95,3,3,"2025-08-11","Defines distributed DNSSEC multi-signer architecture with multi-signer agents and combiners. Introdu"],[2.75,2,2,"2025-11-03","Defines use cases and requirements for communication protocols enabling measurement agents on networ"],[2.7,4,3,"2025-10-20","Integrates Network Management Agents into ACTN-based optical networks for autonomous operations. Ext"],[2.6,4,3,"2026-01-12","Introduces AI agent use cases in 6G networks based on 3GPP SA1 technical reports. Elaborates on oper"],[2.55,4,2,"2025-10-20","Defines core components and interactions for agent networking architecture in enterprise and broadba"],[2.55,3,2,"2026-02-20","Presents framework for connecting mobile ad-hoc networks to the Internet using AERO and OMNI technol"],[2.5,4,2,"2026-02-20","Specifies CONDUIT protocol for managing IPsec tunnel fabrics with automated lifecycle management and"],[2.5,3,3,"2025-08-31","Presents ISAC use case for GREEN Working Group discussions on joint sensing and communication optimi"],[2.35,3,2,"2025-10-20","Describes specific agent networking scenarios for enterprise and home broadband networks. Focuses on"],[2.35,3,2,"2025-11-06","Describes networking scenarios for agents in enterprise and broadband networks, distinguishing them "],[2.35,3,2,"2026-01-09","Discusses and analyzes the impact of AI agents on network infrastructure. Aims to facilitate IETF di"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Autonomous netops\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-cui-nmrg-llm-benchmark","draft-wmz-nmrg-agent-ndt-arch","draft-yue-anima-agent-recovery-networks","draft-ietf-lisp-nexagon","draft-zeng-opsawg-llm-netconf-gap","draft-luan-rtgwg-sdaf","draft-zhao-nmop-network-management-agent","draft-eckert-anima-acp-free-ani","draft-ietf-netconf-configuration-tracing","draft-zlgsgl-rtgwg-agents-networking-framework","draft-zm-rtgwg-mcp-troubleshooting","draft-cui-nmrg-auto-test","draft-irtf-nmrg-llm-nm","draft-zeng-opsawg-applicability-mcp-a2a","draft-yuan-rtgwg-security-agent-usecase","draft-zeng-nmrg-mcp-usecases-requirements","draft-jeong-opsawg-intent-based-sdv-framework","draft-chuyi-nmrg-ai-agent-network","draft-ahn-opsawg-5g-security-i2nsf-framework","draft-tong-network-agent-use-cases-in-6g","draft-li-dmsc-inf-architecture","draft-zeng-mcp-troubleshooting","draft-bernardos-cats-isac-uc","draft-hong-nmrg-agenticai-ps","draft-zhao-nmrg-ai-agent-for-dtn","draft-leon-distributed-multi-signer","draft-zhang-rtgwg-ai-agents-measurement","draft-zhao-ccamp-actn-optical-network-agent","draft-yu-dmsc-ai-agent-use-cases-in-6g","draft-zl-agents-networking-architecture","draft-templin-manet-inet-omni","draft-willman-rtgwg-conduit-tunnels","draft-bernardos-green-isac-uc","draft-zl-agents-networking-scenarios","draft-pang-agents-networking-scenarios","draft-han-ai-agent-impact-infra"],"legendgroup":"Autonomous netops","marker":{"color":"rgb(253,180,98)","size":{"dtype":"i1","bdata":"BQUFBAUEBQQEBAQEBAQEBAQEBAQEBAQEAwIDAwMDAwIDAwMD"},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Autonomous netops","orientation":"v","showlegend":true,"x":[3.9389733152513364,4.182937894452455,3.9666699132356484,4.196507297559899,4.067726856936951,4.105414016982739,3.8856519654266255,3.9879768361500463,3.1191251169002876,3.9231981385966868,3.9703392656820573,4.035730282660005,4.090562698242593,2.9598385061204935,3.936841297152163,3.0980271050666497,3.8614453014744834,2.9976605619792553,3.0500979346635133,2.9232636857863534,2.9620864696610596,2.8150344526291766,3.0281129571055327,3.048277279816464,3.9740796590713083,2.8281977157336944,3.1293418109034645,2.854522744844171,2.0922828408542467,2.9885219643134664,2.196906856586264,3.0947576772350143,2.0713446768326262,1.8887514078882732,1.9274230842135927,2.1432385012928536],"xaxis":"x","y":[3.9732713357457734,4.000816754909298,2.9717544685336685,3.9410007666841165,3.1601509831216634,2.9862015159654627,2.0920691208373716,3.9883086512193358,4.021833788783839,3.169014341903611,3.081792571235694,3.1995659778013645,2.9116636690174156,4.163197167870076,1.8334600010571478,2.8828603515659226,2.1678298988290376,2.8697079320507357,2.8957140702241984,2.0564746352189087,1.892330254108285,2.171033234718927,1.9487163635637035,1.9221809447920901,1.8794400597272662,4.047262720312515,2.105730013905111,2.1499824148331603,3.0856623799975296,1.991675744742073,3.168992206162659,3.1117584557813838,1.925819398707189,1.8219449008788258,2.06384193127555,2.1649782024822724],"yaxis":"y","type":"scatter"},{"customdata":[[4.25,2,4,"2025-11-03","Specifies AI Governance and Accountability Protocol with tiered risk-based governance model. Include"],[4.15,2,4,"2026-02-16","Defines AI Boundary Declaration Protocol for expressing content usage boundaries for AI systems. Pro"],[4.05,2,4,"2025-12-10","ECAP defines a cryptographically-verified protocol for web crawlers to obtain consent from hosts bef"],[3.75,1,4,"2026-01-23","Deprecates obsolete key exchange methods in TLS 1.2 including finite field DH and RSA. Updates multi"],[3.75,2,4,"2025-10-07","Specifies AGENTS.TXT protocol as strict plaintext policy file for automated clients, bots, and crawl"],[3.55,2,3,"2025-09-03","Defines best practices for managing Route Origin Authorizations (ROAs) for globally anycasted servic"],[3.55,1,3,"2026-02-21","Defines HJS accountability layer for AI agents using blockchain-anchored timestamps to create immuta"],[3.5,4,4,"2026-02-25","Presents integrated framework for automated 5G edge network security using I2NSF architecture and In"],[3.5,1,2,"2025-10-06","Introduces Meta-layer concept as coordination substrate for presence, annotation, and governance on "],[2.35,3,2,"2025-11-02","Identifies the need for standardized zero trust interoperability protocols in IETF. Proposes framewo"],[2.0,4,2,"2025-08-17","Proposes framework for user agents to restrict connections to authorized second and third-party reso"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Policy\u002fgovernance\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-aylward-aiga-1","draft-jewell-aibdp","draft-schulze-ecap","draft-ietf-tls-deprecate-obsolete-kex","draft-srijal-agents-policy","draft-pbs-sidrops-roaanycast","draft-wang-hjs-accountability","draft-ahn-nmrg-5g-security-i2nsf-framework","draft-meta-layer-overview","draft-liu-saag-zt-problem-statement","draft-steckbeck-ua-conn-sec"],"legendgroup":"Policy\u002fgovernance","marker":{"color":"rgb(179,222,105)","size":{"dtype":"i1","bdata":"BQUFBQUEBAQEAwI="},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Policy\u002fgovernance","orientation":"v","showlegend":true,"x":[3.9931636736104816,5.1878731136246605,3.8110444602119005,1.804521336046801,2.9421602705927463,3.108773315397605,3.804356107343099,3.1627293855908682,5.015986054540279,1.8321110190522185,2.099278616700544],"xaxis":"x","y":[3.843215214780936,2.0179187430758243,3.0596635251332067,4.071474527675335,2.8247440825324714,4.173471595022536,2.014016389761056,3.8387068639841946,1.1934093470259854,1.971477189674894,1.8142383048880537],"yaxis":"y","type":"scatter"},{"customdata":[[4.25,2,4,"2026-01-20","Defines comprehensive benchmarking methodologies for LLM inference serving systems including test pr"],[4.15,3,4,"2026-01-20","Defines performance benchmarking profiles binding terminology and methodology to concrete architectu"],[3.15,4,3,"2025-11-04","Analyzes system and network requirements for large-scale LLM inference services. Investigates mainst"],[3.15,2,3,"2026-02-06","Defines a URI scheme for identifying LLM endpoints with embedded configuration parameters. Creates a"],[2.7,3,3,"2026-01-20","Establishes standardized terminology for LLM serving performance metrics across different system typ"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Model serving\u002finference\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-gaikwad-llm-benchmarking-methodology","draft-gaikwad-llm-benchmarking-profiles","draft-liu-nmrg-ai-llm-inference-requirements","draft-levy-llm-uri-scheme","draft-gaikwad-llm-benchmarking-terminology"],"legendgroup":"Model serving\u002finference","marker":{"color":"rgb(252,205,229)","size":{"dtype":"i1","bdata":"BQUEBAM="},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Model serving\u002finference","orientation":"v","showlegend":true,"x":[4.123915738450541,3.9192287686986456,2.891996596610665,2.9284176181333135,2.031464662953952],"xaxis":"x","y":[4.123566725469136,4.135367048970296,2.933539489353773,2.1162055933793487,3.010037103907272],"yaxis":"y","type":"scatter"},{"customdata":[[4.2,2,3,"2025-11-18","Introduces Agent Name Service (ANS) as a DNS-based universal directory for AI agent discovery and ve"],[4.1,2,3,"2025-12-22","Specifies DNS-native naming and resolution for AI agents using FQDNs and SVCB records. Emphasizes DN"],[3.9,2,3,"2026-02-24","Describes Agent Directory Service for storing and discovering AI agent metadata based on skills. Fea"],[3.85,3,4,"2026-02-12","Proposes standardized protocol for AI agent discovery and invocation with common metadata format and"],[3.8,1,3,"2025-10-03","Defines experimental AI URI scheme for dedicated AI resource access. Enables native connectivity for"],[3.65,2,3,"2025-10-16","Proposes using DNS with SVCB records to enable AI agent discovery and capability advertisement. Leve"],[3.6,3,4,"2026-02-24","Uses existing DNS infrastructure for AI agent discovery through structured namespace and metadata ex"],[3.6,3,4,"2025-09-28","Specifies automatic configuration mechanism for email, calendar, and contact applications. Enables s"],[3.55,3,3,"2025-10-09","Proposes a DNS-inspired naming and service discovery system for LLM agents to enable autonomous disc"],[3.55,1,3,"2025-10-15","Defines requirements and considerations for AI agent-to-agent discovery mechanisms. Addresses the fu"],[3.55,1,3,"2025-11-02","Analyzes DNS challenges for Internet of Agents scenarios and identifies technical requirements. Expl"],[3.45,2,3,"2026-01-19","Defines architectural framework for discovering network resources based on physical location and con"],[3.25,3,3,"2026-02-24","Specifies ARDP, a lightweight protocol for agent registration and discovery in distributed environme"],[3.25,3,3,"2025-11-30","Specifies Web of Agents (WoA) format using JSON Schema to describe AI agent inputs\u002foutputs served fr"],[2.9,3,3,"2026-02-20","Provides mechanism for RPL Root to control enrollment announcements and adjust enrollment priorities"],[2.75,2,2,"2026-01-09","Identifies problems in designing DNS SVCB records for OSCORE endpoint discovery. Addresses challenge"],[2.65,3,2,"2025-09-11","Defines requirements for AI\u002fML agents in 6G mobile networks, covering different agent types and thei"],[2.55,4,2,"2026-01-05","Defines new DNS resource record type AGENT as SVCB-compatible RR for agent service resolution. Addre"],[2.45,3,3,"2026-02-26","Problem statement for multicast address allocation in zero-configuration environments. Identifies ch"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Agent discovery\u002freg\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-narajala-ans","draft-cui-dns-native-agent-naming-resolution","draft-mp-agntcy-ads","draft-cui-ai-agent-discovery-invocation","draft-sogomonian-ai-uri-scheme","draft-mozleywilliams-dnsop-bandaid","draft-mozleywilliams-dnsop-dnsaid","draft-eggert-mailmaint-uaautoconf","draft-liang-agentdns","draft-mozley-aidiscovery","draft-ye-problems-and-requirements-of-dns-for-ioa","draft-kartha-grd","draft-pioli-agent-discovery","draft-gaikwad-woa","draft-ietf-roll-enrollment-priority","draft-lenders-core-dnr","draft-sarischo-6gip-aiagent-requirements","draft-zhang-aiproto-svcb-mapping-for-agents","draft-ietf-pim-zeroconf-mcast-addr-alloc-ps"],"legendgroup":"Agent discovery\u002freg","marker":{"color":"rgb(217,217,217)","size":{"dtype":"i1","bdata":"BQUFBQUEBAQEBAQEBAQDAwMDAg=="},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Agent discovery\u002freg","orientation":"v","showlegend":true,"x":[5.164135261784767,4.12015351708426,3.851718633516994,3.0249037859465155,4.0433399224443916,3.8433333188844068,3.0595216898622324,2.850775202009372,3.8636122575879357,4.198444574871478,4.0955254150968345,4.0747322794326415,3.1396377767975,2.897055074279197,2.060407924611283,3.1261688196599966,3.0495150081788194,3.0614429647125796,2.0304455036841897],"xaxis":"x","y":[2.9137658088250866,3.902275210960189,3.023698024714005,4.1808008434499735,1.8750602353090664,3.1298208109110695,3.865631154328385,4.178579063752171,3.005336961076462,1.8425075447033166,2.1978709122638596,1.9553722903349198,3.0054860221705835,2.8556784068866947,3.874727271405874,1.9062153054507294,2.129049804312876,2.0299500283547447,3.1780247745180064],"yaxis":"y","type":"scatter"},{"customdata":[[4.05,2,4,"2025-10-19","Defines framework for collaborative network management between LLM agents and human operators. Intro"],[3.9,2,3,"2025-10-20","Proposes CHEQ protocol for human confirmation of AI agent decisions before execution. Protects again"],[3.1,2,3,"2025-11-02","Defines well-known URI and link relation for exposing website workflows to automated agents. Provide"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Human-agent interaction\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-cui-nmrg-llm-nm","draft-rosenberg-aiproto-cheq","draft-vinaysingh-awp-wellknown"],"legendgroup":"Human-agent interaction","marker":{"color":"rgb(188,128,189)","size":{"dtype":"i1","bdata":"BQUD"},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Human-agent interaction","orientation":"v","showlegend":true,"x":[4.181057140061769,3.948962740703879,2.868461674669719],"xaxis":"x","y":[3.050284003348118,2.947230809252292,2.8663603601201744],"yaxis":"y","type":"scatter"},{"customdata":[[3.9,2,3,"2025-10-20","This draft defines SD-Card, a Selective Disclosure JWT encoding of Agent Cards that enables privacy-"],[3.3,2,2,"2025-10-16","This draft defines the agent:\u002f\u002f URI scheme for addressing and interoperating with software agents ac"],[2.4,3,2,"2025-11-02","This draft proposes a networking framework for AI agents in enterprise and broadband environments, d"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Agent discovery \u002f registration\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-nandakumar-agent-sd-jwt","draft-narvaneni-agent-uri","draft-zl-agents-networking-framework"],"legendgroup":"Agent discovery \u002f registration","marker":{"color":"rgb(204,235,197)","size":{"dtype":"i1","bdata":"BQQE"},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Agent discovery \u002f registration","orientation":"v","showlegend":true,"x":[4.055206956431604,3.8093005312458557,2.012883468108497],"xaxis":"x","y":[2.855737238473978,1.8491775285927068,0.9519602358648116],"yaxis":"y","type":"scatter"},{"customdata":[[3.9,2,3,"2026-02-20","This draft extends the SCIM (System for Cross-domain Identity Management) protocol to support AI age"],[3.65,3,2,"2026-02-27","This draft extends OAuth 2.0 to enable AI agents to securely obtain access tokens for acting on beha"],[3.45,3,2,"2026-02-14","This draft proposes a decoupled authorization framework for AI agents that enables dynamic, intent-b"],[3.45,3,2,"2025-12-16","This draft proposes two scalable models for certificate enrollment of AI agents: one using Zero-Know"],[3.3,3,3,"2025-11-03","This draft proposes an identity management framework for agents in an Internet of Agents (IOA) syste"],[2.9,3,2,"2026-01-03","This draft proposes requirements for digital identity management in AI agent communication protocols"],[2.8,4,2,"2026-01-06","This draft proposes an extension to OAuth 2.0 that adds a 'target_id' field to enable granular autho"],[2.8,2,4,"2026-02-24","This draft specifies the SSH Agent Protocol for managing cryptographic keys used in SSH authenticati"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Identity \u002f authentication for AI agents\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-wahl-scim-agent-schema","draft-oauth-ai-agents-on-behalf-of-user","draft-chen-agent-decoupled-authorization-model","draft-huang-acme-scalable-agent-enrollment","draft-zheng-dispatch-agent-identity-management","draft-yl-agent-id-requirements","draft-song-oauth-ai-agent-authorization","draft-ietf-sshm-ssh-agent"],"legendgroup":"Identity \u002f authentication for AI agents","marker":{"color":"rgb(255,237,111)","size":{"dtype":"i1","bdata":"BQUFBQUEBAI="},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Identity \u002f authentication for AI agents","orientation":"v","showlegend":true,"x":[4.115958769530635,3.909158799214615,3.814691141437206,4.004061980517805,2.9962364405881345,3.106595570988111,2.991576506559184,0.8262410866939983],"xaxis":"x","y":[3.1170383924908083,2.9472404630524145,1.9852533581204896,2.031166502546554,2.0495494049898477,2.197296252438497,2.1685123823653814,5.133214491592906],"yaxis":"y","type":"scatter"},{"customdata":[[3.7,2,4,"2025-11-02","Presents use cases for AI agents optimizing network traffic through dynamic resource adjustment. Det"],[3.4,3,4,"2025-10-19","Proposes using Media Over QUIC (MOQ) to transport large-scale, real-time sensing data in 6G networks"],[3.15,4,3,"2026-01-08","Specifies architecture for privacy-preserving federated learning across multi-tenant AI agent system"],[3.15,4,3,"2025-11-02","Applies Application-aware Performance Network framework to Internet of Agents scenario. Addresses ne"],[2.85,4,4,"2026-02-27","Specifies flow-level load balancing for Computing-Aware Traffic Steering to reduce control overhead."],[2.75,2,2,"2025-10-20","Analyzes multicast use cases in Large Language Model Mixture of Experts architectures, particularly "],[2.35,1,2,"2026-02-12","Discusses multicast use cases for Large Language Model synchronization in inference cloud services. "],[2.2,4,2,"2026-01-09","Defines capabilities advertising for Multipath Traffic Engineering (MPTE) in IGP routing protocols. "]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=ML traffic mgmt\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-yuan-rtgwg-traffic-agent-usecase","draft-yue-moq-transporting-sensing-data","draft-kale-agntcy-federated-privacy","draft-mao-rtgwg-apn-framework-for-ioa","draft-fu-cats-flow-lb","draft-zhang-rtgwg-llmmoe-multicast","draft-liu-rtgwg-llmsync-multicast","draft-kompella-lsr-mptecap"],"legendgroup":"ML traffic mgmt","marker":{"color":"rgb(141,211,199)","size":{"dtype":"i1","bdata":"BAQEBAMDAwI="},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"ML traffic mgmt","orientation":"v","showlegend":true,"x":[2.912791831053802,2.8249309976457786,2.828785921741607,2.967377510177115,2.9314359924480415,2.964196874577532,2.0286136433704396,1.8760926389296948],"xaxis":"x","y":[3.8798082666675677,3.1209872966230683,3.0259615735388836,3.1168896293369075,2.0430143542970605,2.007338967942989,1.0244247819896517,3.188362819161991],"yaxis":"y","type":"scatter"},{"customdata":[[3.55,2,2,"2026-01-26","This draft proposes a standard protocol for AI agents to communicate context information to each oth"],[3.15,2,3,"2026-01-21","This draft analyzes requirements for agent protocols specifically tailored to 6G mobile networks, ex"],[3.0,2,2,"2026-01-09","This draft identifies problems and gaps in mobile core networks for supporting AI agent communicatio"],[3.0,2,2,"2026-01-09","This draft proposes requirements for standardized AI agent protocols to enable task-oriented coordin"],[2.9,3,2,"2025-11-03","This draft defines use cases and communication protocol requirements for troubleshooting agents depl"],[2.9,3,2,"2026-01-09","This draft proposes a protocol-agnostic data model for multi-agent communication in autonomous netwo"],[2.9,3,2,"2026-01-09","This draft outlines requirements for multimodal communication in AI agent protocols, enabling agents"],[2.9,3,2,"2026-02-09","This draft proposes a Best Current Practice for AI agent interactions over HTTP, standardizing tool "],[2.8,4,2,"2026-01-02","This draft proposes requirements and frameworks for AI Agent Communication Networks (ACN) in 6G syst"],[2.5,4,2,"2026-01-05","This draft catalogs use cases for AI agents in 6G networks, referencing 3GPP work to define how netw"]],"hovertemplate":"\u003cb\u003e%{hovertext}\u003c\u002fb\u003e\u003cbr\u003e\u003cbr\u003eCategory=Agent-to-agent communication protocols\u003cbr\u003eNovelty=%{x}\u003cbr\u003eMaturity=%{y}\u003cbr\u003eRelevance=%{marker.size}\u003cbr\u003eScore=%{customdata[0]}\u003cbr\u003eOverlap=%{customdata[1]}\u003cbr\u003eMomentum=%{customdata[2]}\u003cbr\u003eDate=%{customdata[3]}\u003cbr\u003eSummary=%{customdata[4]}\u003cextra\u003e\u003c\u002fextra\u003e","hovertext":["draft-liu-agent-context-protocol","draft-hw-ai-agent-6g","draft-zhang-agent-gap-network","draft-cui-ai-agent-task","draft-zhang-rtgwg-ai-agents-troubleshooting","draft-wang-nmrg-magent-im","draft-xie-ai-agent-multimodal","draft-campbell-agentic-http","draft-du-ai-agent-communication-6g-aspect","draft-yu-ai-agent-use-cases-in-6g"],"legendgroup":"Agent-to-agent communication protocols","marker":{"color":"rgb(255,255,179)","size":{"dtype":"i1","bdata":"BQQEBAQEBAQEBA=="},"sizemode":"area","sizeref":0.008,"symbol":"circle"},"mode":"markers","name":"Agent-to-agent communication protocols","orientation":"v","showlegend":true,"x":[4.09743417989826,2.9529286157194536,3.138496581118716,3.0491564631678667,3.0874475687829177,3.176916133806356,2.808713491252876,3.1237460109904323,2.9701109464111215,2.190743369299501],"xaxis":"x","y":[1.870481639326752,1.9611077232780956,2.0455596517179986,2.00669198851481,1.864351786093312,1.8729622785527118,2.0191421892559847,2.0077995405320985,1.8722804065390233,2.1778912891099123],"yaxis":"y","type":"scatter"}], {"template":{"data":{"barpolar":[{"marker":{"line":{"color":"white","width":0.5},"pattern":{"fillmode":"overlay","size":10,"solidity":0.2}},"type":"barpolar"}],"bar":[{"error_x":{"color":"#2a3f5f"},"error_y":{"color":"#2a3f5f"},"marker":{"line":{"color":"white","width":0.5},"pattern":{"fillmode":"overlay","size":10,"solidity":0.2}},"type":"bar"}],"carpet":[{"aaxis":{"endlinecolor":"#2a3f5f","gridcolor":"#C8D4E3","linecolor":"#C8D4E3","minorgridcolor":"#C8D4E3","startlinecolor":"#2a3f5f"},"baxis":{"endlinecolor":"#2a3f5f","gridcolor":"#C8D4E3","linecolor":"#C8D4E3","minorgridcolor":"#C8D4E3","startlinecolor":"#2a3f5f"},"type":"carpet"}],"choropleth":[{"colorbar":{"outlinewidth":0,"ticks":""},"type":"choropleth"}],"contourcarpet":[{"colorbar":{"outlinewidth":0,"ticks":""},"type":"contourcarpet"}],"contour":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"contour"}],"heatmap":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"heatmap"}],"histogram2dcontour":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"histogram2dcontour"}],"histogram2d":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"histogram2d"}],"histogram":[{"marker":{"pattern":{"fillmode":"overlay","size":10,"solidity":0.2}},"type":"histogram"}],"mesh3d":[{"colorbar":{"outlinewidth":0,"ticks":""},"type":"mesh3d"}],"parcoords":[{"line":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"parcoords"}],"pie":[{"automargin":true,"type":"pie"}],"scatter3d":[{"line":{"colorbar":{"outlinewidth":0,"ticks":""}},"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scatter3d"}],"scattercarpet":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattercarpet"}],"scattergeo":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattergeo"}],"scattergl":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattergl"}],"scattermapbox":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattermapbox"}],"scattermap":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scattermap"}],"scatterpolargl":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scatterpolargl"}],"scatterpolar":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scatterpolar"}],"scatter":[{"fillpattern":{"fillmode":"overlay","size":10,"solidity":0.2},"type":"scatter"}],"scatterternary":[{"marker":{"colorbar":{"outlinewidth":0,"ticks":""}},"type":"scatterternary"}],"surface":[{"colorbar":{"outlinewidth":0,"ticks":""},"colorscale":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"type":"surface"}],"table":[{"cells":{"fill":{"color":"#EBF0F8"},"line":{"color":"white"}},"header":{"fill":{"color":"#C8D4E3"},"line":{"color":"white"}},"type":"table"}]},"layout":{"annotationdefaults":{"arrowcolor":"#2a3f5f","arrowhead":0,"arrowwidth":1},"autotypenumbers":"strict","coloraxis":{"colorbar":{"outlinewidth":0,"ticks":""}},"colorscale":{"diverging":[[0,"#8e0152"],[0.1,"#c51b7d"],[0.2,"#de77ae"],[0.3,"#f1b6da"],[0.4,"#fde0ef"],[0.5,"#f7f7f7"],[0.6,"#e6f5d0"],[0.7,"#b8e186"],[0.8,"#7fbc41"],[0.9,"#4d9221"],[1,"#276419"]],"sequential":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]],"sequentialminus":[[0.0,"#0d0887"],[0.1111111111111111,"#46039f"],[0.2222222222222222,"#7201a8"],[0.3333333333333333,"#9c179e"],[0.4444444444444444,"#bd3786"],[0.5555555555555556,"#d8576b"],[0.6666666666666666,"#ed7953"],[0.7777777777777778,"#fb9f3a"],[0.8888888888888888,"#fdca26"],[1.0,"#f0f921"]]},"colorway":["#636efa","#EF553B","#00cc96","#ab63fa","#FFA15A","#19d3f3","#FF6692","#B6E880","#FF97FF","#FECB52"],"font":{"color":"#2a3f5f"},"geo":{"bgcolor":"white","lakecolor":"white","landcolor":"white","showlakes":true,"showland":true,"subunitcolor":"#C8D4E3"},"hoverlabel":{"align":"left"},"hovermode":"closest","mapbox":{"style":"light"},"paper_bgcolor":"white","plot_bgcolor":"white","polar":{"angularaxis":{"gridcolor":"#EBF0F8","linecolor":"#EBF0F8","ticks":""},"bgcolor":"white","radialaxis":{"gridcolor":"#EBF0F8","linecolor":"#EBF0F8","ticks":""}},"scene":{"xaxis":{"backgroundcolor":"white","gridcolor":"#DFE8F3","gridwidth":2,"linecolor":"#EBF0F8","showbackground":true,"ticks":"","zerolinecolor":"#EBF0F8"},"yaxis":{"backgroundcolor":"white","gridcolor":"#DFE8F3","gridwidth":2,"linecolor":"#EBF0F8","showbackground":true,"ticks":"","zerolinecolor":"#EBF0F8"},"zaxis":{"backgroundcolor":"white","gridcolor":"#DFE8F3","gridwidth":2,"linecolor":"#EBF0F8","showbackground":true,"ticks":"","zerolinecolor":"#EBF0F8"}},"shapedefaults":{"line":{"color":"#2a3f5f"}},"ternary":{"aaxis":{"gridcolor":"#DFE8F3","linecolor":"#A2B1C6","ticks":""},"baxis":{"gridcolor":"#DFE8F3","linecolor":"#A2B1C6","ticks":""},"bgcolor":"white","caxis":{"gridcolor":"#DFE8F3","linecolor":"#A2B1C6","ticks":""}},"title":{"x":0.05},"xaxis":{"automargin":true,"gridcolor":"#EBF0F8","linecolor":"#EBF0F8","ticks":"","title":{"standoff":15},"zerolinecolor":"#EBF0F8","zerolinewidth":2},"yaxis":{"automargin":true,"gridcolor":"#EBF0F8","linecolor":"#EBF0F8","ticks":"","title":{"standoff":15},"zerolinecolor":"#EBF0F8","zerolinewidth":2}}},"xaxis":{"anchor":"y","domain":[0.0,1.0],"title":{"text":"Novelty"},"dtick":1,"range":[0.5,5.5]},"yaxis":{"anchor":"x","domain":[0.0,1.0],"title":{"text":"Maturity"},"dtick":1,"range":[0.5,5.5]},"legend":{"title":{"text":"Category"},"tracegroupgap":0,"itemsizing":"constant"},"title":{"text":"Draft Explorer: Novelty vs Maturity (260 drafts)"},"font":{"family":"Inter, Arial, sans-serif"},"width":1100,"height":750}, {"responsive": true} ) }; </script> </div>
|
|
</body>
|
|
</html> |