<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>October</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Verification of Best Practices in Digital Public Infrastructures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Milan Markovic</string-name>
          <email>milan.markovic@abdn.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Somayajulu Sripada</string-name>
          <email>yaji.sripada@abdn.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sujit Kumar Chakrabarti</string-name>
          <email>sujitkc@iiitb.ac.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Raghuram Bharadwaj Diddigi</string-name>
          <email>raghuram.bharadwaj@iiitb.ac.in</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Digital Public Infrastructures, Infrastructure Analysis, Large Language Model, Formal Verification</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, International Institute of Information Technology - Bangalore</institution>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computing Science, University of Aberdeen</institution>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Data Science and Artificial Intelligence, International Institute of Information Technology - Bangalore</institution>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>17</volume>
      <issue>2024</issue>
      <abstract>
        <p>In this position paper, we discuss three distinct approaches for assessing risks associated with Digital Public Infrastructures (DPI) and how Large Language Models could provide automated knowledge extraction to support such analyses at scale. We further outline future research directions inspired by the domain of collective intelligence and formal verification methods.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Digital Public Infrastructure Analysis</title>
      <p>DPIs are complex systems that may be a subject of analysis from various perspectives and organisations.
We will discuss three diferent analyses of DPIs that could benefit from usage of LLMs. These analyses
share some common requirements such as the need for consistent and reproducible results and additional
domain information either providing the context (e.g. information about the target deployment region)
or restricting the knowledge space for question answering (e.g., code, system documentation, specific</p>
      <sec id="sec-2-1">
        <title>2.1. High-level Socio-Technical Analysis</title>
        <p>DPIs are often reviewed and monitored by external organisations without access to detailed inner
workings of these systems. In this “black-box” approach the main focus is to analyse whether the
system meets the socio-technical requirements (e.g., fairness of access, security, etc.). The analysis may</p>
        <p>CEUR</p>
        <p>ceur-ws.org</p>
        <p>System
Specification</p>
        <p>System
 Evaluation</p>
        <p>Reports</p>
        <p>System
Documentation
System Code</p>
        <p>LLM
A)</p>
        <p>DPI
Assessment Framework</p>
        <p>Answer
be performed by non-technical experts who focus, for example, on social science aspects. We have
worked with DVARA Research1 who have developed an assessment framework consisting of a series of
questions for which answers are sought through a comprehensive search of available evidence. This
may include interviews with end users, external audit reports, documentation of the deployed system,
news reports, etc. LLMs could help to speed up the review of the external documents against specific
assessment frameworks (Fig. 1 A). Example questions inspired by the DVARA assessment framework
include: What financial details (e.g., bank details) does the system collect from citizens? ; Where does the
system obtain data about citizens? ; and Is the system available in other languages?. This type of analysis is
especially challenging as the questions are posed by a non-technical expert who may lack the in-depth
understanding of the generated answers. Quality and consistency of the results is therefore critical to
elicit trust from the user.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. In-depth Technical Analysis &amp; Testing</title>
        <p>High-level socio-technical analysis can highlight areas that might require expanding the system design
or verifying whether the system meets key criteria. These analyses demand a ”white box” approach
and hence the LLM would need to deal with diferent forms of inputs such as code, diagrams, etc.</p>
        <sec id="sec-2-2-1">
          <title>2.2.1. Expansion of System Requirements</title>
          <p>
            System requirements may be formalised using variety of languages e.g. B-method [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ] and notations
such as SysML [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ], UML [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ] etc. These models may have missing details that do not take into account
issues related to the environment where the system will be deployed. For example, a DPI that relies
on live internet connections to validate identity of a person using large payloads may be unusable in
areas with intermittent internet connection or insuficient bandwidth. Another example might involve
people living in rural areas for whom DPI contact centres might be far away. If a DPI requires, for
example, a multistage in-person registration process this might prove dificult, especially for the elderly
and those who cannot aford to travel. An LLM module could be used to analyse the system design
requirements within the context of the desired deployment scenario and suggest expansion or tweaks
to system specification (Fig 1 B). However, to do so it is likely to require an up to date local information
about the deployment area which is not present in the core model (e.g., local Internet speeds, planned
locations of the contact centers, etc.).
          </p>
          <p>PROMT
You are an assistant that uses the information from the</p>
          <p>provided documents to answer the question
([answer]). Further you provide a list of direct quotes
from the document backing your answer without
altering the original text ([evidence]). If you are
unable to locate an answer in the document, you say
that the document does not contain the answer. If
additional answers can be inferred from the document
you provide inferred answer ([inf answer]) and
rationale how you inferred it ([rationale]). Use this
template to format your resposnefor each answer:
answer:[answer] \n evidence:[evidence] \n inf:[inf
answer] \n rationale:[rationale]</p>
        </sec>
        <sec id="sec-2-2-2">
          <title>2.2.2. Formal Verification</title>
          <p>DPIs pose a novel challenge to system designers due to their population scale deployment. Many
non-functional requirements (NFRs) such as inclusivity, accessibility, availability, security, privacy
and trustworthiness assume primary importance in case of DPIs. Such properties are hard to specify
in simple natural language primarily due to their dependence on environmental factors, and their
violation may be exceptionally hard to detect, as it may be caused due to the interaction of a multitude
of components and agents. We believe that formal methods2 may prove useful in ensuring that best
practices are indeed followed in the design and implementation of DPIs. LLMs may play role in
supporting the generation of formal specifications of best practices (Fig. 1 C) - i.e, in the form of
properties or predicates using a mathematically rigorous notation with formal semantics describing
an unambiguous interpretation of these best practices. This would then allow application of formal
methods which have proved invaluable in domains of engineering where the cost of errors is high (e.g.
safety critical and business critical software). We believe that formal verification techniques can be
applied to automatically analyse design models and software implementations to discover bugs.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Discussion &amp; Future Work</title>
      <p>Below we will discuss two potential avenues of our future research focus stemming from a series of
early experiments.</p>
      <sec id="sec-3-1">
        <title>3.1. Application of Collective Intelligence Techniques to Control Quality of Results</title>
        <p>
          The research community has previously spent a significant efort on exploring hybrid man-machine
systems operating on the principles of collective intelligence - i.e. “groups of individuals doing things
collectively that seem intelligent” [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Diverse concepts such as crowdsourcing [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], human computation
[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], social machines [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], and social computation [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] have emerged and with them a range of system
designs and techniques for managing the quality of results of such computations [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. The issues
related to the use of LLMs such as the influence of the task design (i.e., prompts), the characteristics of
entities performing the task (i.e., diferent LLM models have diferent capabilities), and varying outputs
generated by diferent workers are shared with the collective intelligence systems.
        </p>
        <p>
          In our early experiments, we were inspired by the task decomposition and role separation [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]
implemented by, for example, the Create-Verify pattern [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] which splits the workers’ tasks into two
groups. The first group of tasks is used to create some new data and these are then validated by the
second group of worker tasks based on majority voting. We have reversed the task order by performing
multiple create steps followed by a summarisation step where the LLM was asked to summarise the
results of the create steps and use majority voting in case of conflicting facts (Fig 2). In our experiments,
we asked the LLM to answer a question from the DVARA assessment framework (see Section 2.1) based
2By formal methods, we mean both formal verification and automated software testing under formal methods
on information from a pdf report on the Samagra system [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. The question was answered in three
separate GPT 4 conversations and the summarisation was also performed in a separate conversation.
        </p>
        <p>
          For example, for a question “Can citizens, government oficials and last mile delivery agents login to the
portal?” the LLM produced two correct answers, however, one of the answers stated that the document
did not contain the required information. The summarisation step resulted in a correct output listing
the identified functionalities. Other examples include all three answers agreeing but also cases where
the answers provided a wide spread information. This is similar to the parameters such as subjectivity
and dificulty of a crowdsourcing task which may be correlated with the high variation in the produced
answers [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. We aim to investigate how other techniques from the collective intelligence domain may
be applied or inspire quality assurance mechanisms in the LLM-based pipelines.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Using LLMs to Enable Formal Method Analysis at Scale</title>
        <p>Specifications entailing non-functional requirements (NFRs) often appear as abstract specifications .
For example, a security requiremenment might be expressed as “Resources once deleted should not be
available for viewing anymore”. In order to be applicable for specific application, abstract specifications
must be translated into concrete specifications . For example, when a candidate revokes or cancels an
application in an academic admission system, it should no longer be accessible for viewing by anyone.</p>
        <p>
          Finally, such concrete, but informal, specifications can be translated into formal specifications. For
example, consider a formal specification, written in a notation that borrows from Z [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] and design by
contract [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] notations, of an API functionality of the deleteApplication and viewApplication methods:
DeleteApplicationOK
        </p>
        <p>Precondition ( ↦ ) ∈  ,  ∈  ∨  ∈ []
API deleteApplication(, )</p>
        <p>Postcondition ∄ ∈  ∶  ∈ []</p>
        <p>ViewApplicationErr1</p>
        <p>Precondition
API
Postcondition
∄ ∈  ∶  ∈ []
viewApplication(_, )
    
_
→
→</p>
        <p>The delete application API action is associated with precondition of presenting an active session
token  belonging to user  with admin privileges ( ∈  ) and an application ID belonging to the same
user ( ∈ [] ). The postcondition of the delete action states that there should be no candidates in the
database such that  is among its application IDs (∄ ∈  ∶  ∈ [] ). The action of attempting to view
previously deleted application is described with the precondition stating if ID  does not belong to any
current candidate  (∄ ∈  ∶  ∈ [] ), the API call should return error      . Postcondition
specifies there is no important change in the application state (shown as _). While such specifications
are dificult to read by humans, they are ideal for formal verification and test generation. We are
currently working on a platform that can generate automated tests from such specifications.</p>
        <p>For example, consider a test to check whether a deleted application can be viewed:
r1 := deleteApplication('t1', 'a1')
assert(r1 = HttpOK)
r2 := viewApplication('t1', 'a1')
assert(r1 = HttpNotFound)</p>
        <p>
          We argue that an LLM pipeline with access to contextual information about the application (e.g., source
code, technical documentation) could help with creation of both concrete and formal specifications.
This could be achieved through the utilization of Retrieval-Augmented Generation (RAG) mechanism
[
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] which allows LLMs to intelligently retrieve information from external databases to generate
contextually relevant output. Furthermore, we also aim to investigate how the logical properties of the
target specification language could be exploited to verify the validity of the generated LLM results.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Acknowledgments</title>
      <p>This work was funded by the seed funding award made by the Royal Academy of Engineering (RaENG)
as part of their Frontiers programme. We thank Aishwarya Narayan (Dvara Research) for her support.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>United</given-names>
            <surname>Nations Development</surname>
          </string-name>
          <article-title>Programme (UNDP), Accelerating the sdgs through digital public infrastructure</article-title>
          ,
          <year>2023</year>
          . URL: https://www.undp.org/sites/g/files/zskgke326/files/2023-08/ undp-g20
          <article-title>-accelerating-the_sdgs-through-digital-public-infrastructure</article-title>
          .pdf, accessed:
          <fpage>2024</fpage>
          -08-28.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Narayan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Chugh</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Ghosh</surname>
          </string-name>
          , L. Narang,
          <article-title>State of open digital ecosystems for social protection (sp-odes</article-title>
          ) in india,
          <year>2023</year>
          . URL: https://dvararesearch.com
          <article-title>/ state-of-open-digital-ecosystems-for-social-protection-sp-odes-in-india/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>L.</given-names>
            <surname>Floridi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Chiriatti</surname>
          </string-name>
          , Gpt-3
          <article-title>: Its nature, scope, limits, and consequences</article-title>
          ,
          <source>Minds and Machines</source>
          <volume>30</volume>
          (
          <year>2020</year>
          )
          <fpage>681</fpage>
          -
          <lpage>694</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K.</given-names>
            <surname>Lano</surname>
          </string-name>
          ,
          <article-title>The B Language and Method: A Guide to Practical Formal Development</article-title>
          , 1st ed.,
          <source>SpringerVerlag</source>
          , Berlin, Heidelberg,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Friedenthal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Moore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Steiner</surname>
          </string-name>
          , A Practical Guide to SysML,
          <source>Third Edition: The Systems Modeling Language</source>
          , 3rd ed., Morgan Kaufmann Publishers Inc., San Francisco, CA, USA,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Rumbaugh</surname>
          </string-name>
          , I. Jacobson, G. Booch,
          <string-name>
            <surname>Unified Modeling Language Reference Manual</surname>
          </string-name>
          ,
          <source>The (2nd Edition)</source>
          ,
          <source>Pearson Higher Education</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>T. W.</given-names>
            <surname>Malone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Laubacher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. N.</given-names>
            <surname>Dellarocas</surname>
          </string-name>
          ,
          <article-title>Harnessing crowds: Mapping the genome of collective intelligence</article-title>
          ,
          <year>2009</year>
          . MIT Sloan Research Paper No.
          <fpage>4732</fpage>
          -
          <lpage>09</lpage>
          . Available at SSRN: http://ssrn.com/abstract=1381502 or http://dx.doi.org/10.2139/ssrn.1381502.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Howe</surname>
          </string-name>
          ,
          <article-title>The rise of crowdsourcing</article-title>
          ,
          <source>Wired Magazine</source>
          <volume>14</volume>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>L. von Ahn</surname>
          </string-name>
          , Human Computation,
          <source>Ph.D. thesis</source>
          , Carnegie Mellon University,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Berners-Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fischetti</surname>
          </string-name>
          , Weaving the Web:
          <article-title>The original design and ultimate destiny of the World Wide Web</article-title>
          , Harper Collins, NY,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Robertson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Giunchiglia</surname>
          </string-name>
          ,
          <article-title>Programming the social computer</article-title>
          ,
          <source>Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences</source>
          <volume>371</volume>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Daniel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kucherbaev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cappiello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Benatallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Allahbakhsh</surname>
          </string-name>
          ,
          <article-title>Quality control in crowdsourcing: A survey of quality attributes, assessment techniques, and assurance actions</article-title>
          ,
          <source>ACM Computing Surveys (CSUR) 51</source>
          (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>C.</given-names>
            <surname>Callison-Burch</surname>
          </string-name>
          ,
          <article-title>Fast, cheap, and creative: evaluating translation quality using amazon's mechanical turk</article-title>
          ,
          <source>in: Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>286</fpage>
          -
          <lpage>295</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Copestake</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>James</surname>
          </string-name>
          ,
          <article-title>The samagra anti-poverty programme in madhya pradesh: integrating household data, overcoming silo-problems and leaving nobody behind</article-title>
          .,
          <source>Development Policy Review</source>
          <volume>39</volume>
          (
          <year>2021</year>
          )
          <fpage>435</fpage>
          -
          <lpage>449</lpage>
          . doi:
          <volume>10</volume>
          .1111/dpr.12502.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Carman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhu</surname>
          </string-name>
          , W. Buntine,
          <article-title>Distinguishing question subjectivity from dificulty for improved crowdsourcing</article-title>
          , in: J.
          <string-name>
            <surname>Zhu</surname>
          </string-name>
          , I. Takeuchi (Eds.),
          <source>Proceedings of The 10th Asian Conference on Machine Learning</source>
          , volume
          <volume>95</volume>
          <source>of Proceedings of Machine Learning Research, PMLR</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>192</fpage>
          -
          <lpage>207</lpage>
          . URL: https://proceedings.mlr.press/v95/jin18a.html.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>J. M. Spivey</surname>
            , Understanding
            <given-names>Z</given-names>
          </string-name>
          :
          <article-title>a specification language and its formal semantics</article-title>
          , Cambridge University Press, USA,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R.</given-names>
            <surname>Mitchell</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. McKim</surname>
          </string-name>
          , B. Meyer,
          <article-title>Design by contract, by example</article-title>
          ,
          <source>Addison Wesley Longman Publishing Co., Inc., USA</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P.</given-names>
            <surname>Lewis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Perez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piktus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Petroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Karpukhin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Goyal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Küttler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lewis</surname>
          </string-name>
          , W.-t. Yih,
          <string-name>
            <given-names>T.</given-names>
            <surname>Rocktäschel</surname>
          </string-name>
          , et al.,
          <article-title>Retrieval-augmented generation for knowledge-intensive nlp tasks</article-title>
          ,
          <source>Advances in Neural Information Processing Systems</source>
          <volume>33</volume>
          (
          <year>2020</year>
          )
          <fpage>9459</fpage>
          -
          <lpage>9474</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>