<- Scope Go to ToC References ->
Terms beginning with a capital letter have the meaning defined in Table 1. Terms beginning with a small letter have the meaning commonly defined for the context in which they are used. For instance, Table 1 defines Object and Scene but does not define object and scene.
A dash “-” preceding a Term in Table 1 indicates the following readings according to the font:
- Normal font: the Term in the table without a dash and preceding the one with a dash should be read before that Term. For example, “Avatar” and “- Model” will yield “Avatar Model.”
- Italic font: the Term in the table without a dash and preceding the one with a dash should be read after that Term. For example, “Avatar” and “- Portable” will yield “Portable Avatar.”
All MPAI-defined Terms are accessible online.
Table 1 – General MPAI-AIF terms
Term | Definition |
Access | Static or slowly changing data that are required by an application such as domain knowledge data, data models, etc. |
AI Framework (AIF) | The environment where AIWs are executed. |
AI Module (AIM) | A processing element receiving AIM-specific Inputs and producing AIM-specific Outputs according to according to its Function. An AIM may be an aggregation of AIMs. AIMs operate in the Trusted Zone. |
AI Workflow (AIW) | A structured aggregation of AIMs implementing a Use Case receiving AIM-specific inputs and producing AIM-specific outputs according to its Function. AIWs operate in the Trusted Zone. |
AIF Metadata | The data set describing the capabilities of an AIF set by the AIF Implementer. |
AIM Metadata | The data set describing the capabilities of an AIM set by the AIM Implementer. |
AIM Storage | A Component to store data of individual AIMs. An AIM may only access its own data. The AIM Storage is part of the Trusted Zone. |
AIW Metadata | The data set describing the capabilities of an AIW set by the AIW Implementer. |
Channel | A physical or logical connection between an output Port of an AIM and an input Port of an AIM. The term “connection” is also used as synonymous. Channels are part of the Trusted Zone. |
Communication | The infrastructure that implements message passing between AIMs. Communication operates in the Trusted Zone. |
Component | One of the 9 AIF elements: Access, AI Module, AI Workflow, Communication, Controller, AIM Storage, Shared Storage, Store, and User Agent. |
Composite AIM | An AIM aggregating more than one AIM. |
Controller | A Component that manages and controls the AIMs in the AIWs, so that they execute in the correct order and at the time when they are needed. The Controller operates in the Trusted Zone. |
Data Type | An instance of the Data Types defined by 6.1.1. |
Device | A hardware and/or software entity running at least one instance of an AIF. |
Event | An occurrence acted on by an Implementation. |
External Port | An input or output Port simulating communication with an external Controller. |
Group Element | An AIF in a in a proximity-based scenario. |
Knowledge Base | Structured and/or unstructured information made accessible to AIMs via MPAI-specified interfaces. |
Message | A sequence of Records. |
MPAI Ontology | A dynamic collection of terms with a defined semantics managed by MPAI. |
MPAI Server | A remote machine executing one or more AIMs. |
Remote Port | A Port number associated with a specific remote AIM. |
Store | The repository of Implementations. |
Port | A physical or logical communication interface of an AIM. |
Record | Data with a specified Format. |
Resource policy | The set of conditions under which specific actions may be applied. |
Security Abstraction Layer | (SAL) The set of Trusted Services that provide security functionalities to AIF. |
Shared Storage | A Component to store data shared among AIMs. The Shared Storage is part of the Trusted Zone. |
Status | The set of parameters characterising a Component. |
Structure | A composition of Records |
Time Base | The protocol specifying how Components can access timing information. The Time Base is part of the Trusted Zone. |
Topology | The set of Channels connecting AIMs in an AIW. |
Trusted Zone | An environment that contains only trusted objects, i.e., object that do not require further authentication. |
User Agent | The Component interfacing the user with an AIF through the Controller |
Zero Trust | A cybersecurity model primarily focused on data and service protection that assumes no implicit trust [28]. |