Glossary

This glossary defines key terms used throughout this book. Terms are organized alphabetically.

A

accountability

The mechanisms by which individuals or organizations are held responsible for the outcomes of AI systems, involving traceability, documentation, auditing, and the ability to remedy harms. Appears in: Responsible Engineering

adapter modules

Small trainable neural network components inserted between frozen layers of a pretrained model to enable lightweight adaptation without modifying the base architecture. Appears in: On-device learning benefits

adaptive resource pattern

A design pattern that enables systems to dynamically adjust their operations in response to varying resource availability, ensuring efficiency and resilience by scaling up or down based on computational load, network bandwidth, and storage capacity. Appears in: Responsible Engineering

adversarial attack

A type of attack where carefully crafted inputs are designed to cause machine learning models to make incorrect predictions while remaining nearly indistinguishable from legitimate data to humans Appears in: Security & Privacy, Robust AI

adversarial example

A maliciously modified input that is designed to fool a machine learning model into making an incorrect prediction, often created by adding small, imperceptible perturbations to legitimate data Appears in: Security & Privacy, Responsible Engineering, Robust AI

adversarial training

A defense technique that involves training models on adversarial examples to improve their robustness and ability to correctly classify adversarial inputs Appears in: Security & Privacy, Responsible Engineering, Robust AI

agi

Artificial General Intelligence - computational systems that match or exceed human cognitive capabilities across all domains of knowledge and reasoning, capable of generalizing across diverse problem domains without task-specific training. Appears in: Introduction

ai for good

The design, development, and deployment of machine learning systems aimed at addressing important societal and environmental challenges to enhance human welfare, promote sustainability, and contribute to global development goals. Appears in: Responsible Engineering

algorithmic fairness

The principle that automated systems should not disproportionately disadvantage individuals or groups based on protected attributes such as race, gender, or age. Appears in: Responsible Engineering

anomaly detection

The identification of patterns in data that do not conform to expected behavior, often used to detect outliers, faults, or malicious activities in systems. Appears in: Robust AI

anonymization

The process of removing or modifying personally identifiable information from datasets to protect individual privacy, though often insufficient against sophisticated re-identification attacks. Appears in: Security & Privacy

artificial general intelligence

A hypothetical form of AI that matches or exceeds human cognitive abilities across all domains, representing the ultimate goal of AI research beyond current narrow AI systems. Appears in: Introduction

artificial intelligence

A broad field of computer science focused on creating systems that can perform tasks typically requiring human intelligence, including learning, reasoning, and decision-making Appears in: Responsible Engineering, Sustainable AI

attack taxonomy

Systematic classification of cybersecurity threats and adversarial attacks against ML systems, organizing threats by method, target, and impact to guide defense strategies. Appears in: Robust AI

autoencoder

A neural network architecture that learns compressed data representations by minimizing reconstruction error, commonly used for anomaly detection and dimensionality reduction. Appears in: Robust AI

automation bias

The tendency for humans to over-rely on automated system outputs even when clear errors are present, potentially compromising human oversight. Appears in: Responsible Engineering

automl

Automated machine learning that uses algorithms to automate the process of applying machine learning to real-world problems, including feature engineering, model selection, and hyperparameter tuning. Appears in: Introduction

availability attack

A type of data poisoning attack that aims to degrade the overall performance of a machine learning model by introducing noise or corrupting training data across multiple classes. Appears in: Security & Privacy

B

backdoor attack

A type of data poisoning where hidden triggers are embedded in training data, causing models to behave maliciously when specific patterns are encountered during inference Appears in: Security & Privacy, Robust AI

backpropagation

The algorithm for computing gradients in neural networks by propagating error signals backward through layers, essential for training but computationally expensive on resource-constrained devices Appears in: On-device learning benefits, Sustainable AI

bayesian neural networks

Neural networks that incorporate probability distributions over their weights, enabling uncertainty quantification in predictions and more robust decision-making. Appears in: Robust AI

bias detection

Systematic methods for identifying unfair discrimination or disparate treatment across different demographic groups in machine learning system outputs. Appears in: Responsible Engineering

bias mitigation

Techniques and interventions designed to reduce unfair discrimination in machine learning systems, applied during data collection, model training, or post-processing stages. Appears in: Responsible Engineering

bias-only adaptation

A lightweight training strategy that freezes all model weights and updates only scalar bias terms, drastically reducing memory requirements and computational overhead for on-device learning. Appears in: On-device learning benefits

biodiversity monitoring

The systematic observation and measurement of biological diversity using technology such as camera traps and sensor networks to track species populations, habitat changes, and conservation effectiveness. Appears in: Responsible Engineering

bit flip

A hardware fault where a single bit in memory or a register unexpectedly changes its value from 0 to 1 or vice versa, potentially corrupting data or computations. Appears in: Robust AI

black-box attack

An adversarial attack where the attacker has no knowledge of the model’s internal architecture, parameters, or training data, and must rely solely on querying the model and observing outputs. Appears in: Security & Privacy

brain-computer interface

A direct communication pathway between the brain and an external device, enabling control of computers or prosthetics through neural signals and representing a convergence of ML with neurotechnology. Appears in: Introduction

built-in self-test (bist)

Hardware testing mechanisms that allow components to test themselves for faults using dedicated circuitry and predefined test patterns. Appears in: Robust AI

C

cache timing attack

A type of side-channel attack that exploits variations in memory cache access patterns to infer sensitive information about program execution or data. Appears in: Security & Privacy

carbon footprint

The total amount of greenhouse gas emissions produced directly and indirectly by an individual, organization, event, or product, typically measured in CO2 equivalent. Appears in: Sustainable AI

carbon-aware scheduling

A computational approach that schedules AI workloads based on the carbon intensity of the electricity grid, prioritizing execution when renewable energy sources are most available. Appears in: Sustainable AI

catastrophic forgetting

The phenomenon where neural networks lose previously learned knowledge when adapting to new tasks, a critical challenge in continual on-device learning scenarios. Appears in: On-device learning benefits

checkpoint and restart mechanisms

Techniques that periodically save a program’s state so it can resume from the last saved state after a failure, improving system resilience. Appears in: Robust AI

client scheduling

The process of selecting which devices participate in federated learning rounds based on availability, data quality, and resource constraints to ensure representative model updates. Appears in: On-device learning benefits

cloud ml

Machine learning systems that use cloud computing infrastructure to provide scalable computational resources for training and inference, typically offering high-bandwidth connectivity and substantial processing power. Appears in: Responsible Engineering

combinational logic

Digital logic circuits where the output depends only on the current input states, not any past states or memory elements. Appears in: Robust AI

compound ai systems

AI architectures that combine multiple specialized models, tools, and components to achieve complex capabilities through systematic integration rather than relying on a single monolithic model. Appears in: Introduction

concept bottleneck models

Neural network architectures that first predict interpretable intermediate concepts before making final predictions, combining deep learning power with transparency. Appears in: Responsible Engineering

concept drift

A change in the relationship between input features and target outputs over time, requiring model adaptation to maintain performance. Appears in: Robust AI

conservation technology

Technological solutions designed to protect and monitor wildlife and ecosystems, including camera traps, sensor networks, and satellite monitoring systems for tracking animal behavior and detecting threats. Appears in: Responsible Engineering

constitutional ai

A training method where models learn to improve their own outputs by critiquing responses against a set of principles, enabling iterative self-refinement and reducing harmful content while maintaining helpfulness Appears in: Introduction

continual learning

The ability of machine learning systems to learn continuously from a stream of data while retaining previously acquired knowledge, addressing the challenge of catastrophic forgetting in neural networks Appears in: Introduction, On-device learning benefits, Robust AI

cooling effectiveness

The efficiency with which a data center cooling system removes heat from computing equipment, typically measured as the ratio of heat removed to energy consumed for cooling. Appears in: Sustainable AI

counterfactual explanations

Explanations that describe how a model’s output would change if specific input features were modified, particularly useful for understanding decision boundaries. Appears in: Responsible Engineering

covariate shift

A type of distribution shift where the input distribution changes while the conditional relationship between inputs and outputs remains stable. Appears in: Robust AI

D

data center

A facility housing computer systems and associated components such as telecommunications and storage systems, typically including redundant power supplies, cooling systems, and network connections. Appears in: Sustainable AI

data compression

Techniques for reducing the size and complexity of training data through encoding, quantization, or feature extraction to enable efficient storage and processing on memory-constrained devices. Appears in: On-device learning benefits

data poisoning

An attack method where adversaries inject carefully crafted malicious data points into the training dataset to manipulate model behavior in targeted or systematic ways Appears in: Security & Privacy, Robust AI

data sanitization

The process of deliberately and permanently removing or destroying data stored on memory devices to make it unrecoverable, ensuring data security. Appears in: Robust AI

deep learning

A subset of machine learning using neural networks with multiple hidden layers to automatically learn hierarchical representations from data. Appears in: Sustainable AI

defensive distillation

A technique that trains a student model to mimic a teacher model’s behavior using soft labels, reducing sensitivity to adversarial perturbations. Appears in: Robust AI

demographic parity

A fairness criterion requiring that the probability of receiving a positive prediction is independent of group membership across protected attributes. Appears in: Responsible Engineering

dennard scaling

The historical observation that as transistors become smaller, their power density remains approximately constant, allowing for more transistors without proportional increases in power consumption. Appears in: Sustainable AI

depthwise separable convolutions

A computational technique that decomposes standard convolutions into depthwise and pointwise operations, reducing parameters and computation by 8-9\(\times\) for mobile-optimized architectures. Appears in: On-device learning benefits

differential privacy

A mathematical framework that provides formal privacy guarantees by adding calibrated noise to computations, ensuring that the inclusion or exclusion of any individual’s data has a provably limited effect on the output Appears in: On-device learning benefits, Security & Privacy, Responsible Engineering

digital divide

The gap between those who have access to modern information and communication technology and those who do not, particularly affecting underserved communities’ ability to benefit from digital solutions. Appears in: Responsible Engineering

digital twin

A virtual representation of a physical system that uses real-time data and machine learning to mirror, predict, and optimize the behavior of its physical counterpart. Appears in: Introduction

disaster response systems

Automated systems that use machine learning to detect, predict, and respond to natural disasters through satellite imagery analysis, sensor networks, and resource allocation optimization. Appears in: Responsible Engineering

distributed knowledge pattern

A design pattern that addresses collective learning and inference across decentralized nodes, emphasizing peer-to-peer knowledge sharing and collaborative model improvement while maintaining operational independence. Appears in: Responsible Engineering

distributed training

The practice of training machine learning models across multiple computing nodes or devices to reduce training time and enable larger model architectures. Appears in: Sustainable AI

distribution shift

The phenomenon where data encountered during model deployment differs from the training distribution, potentially degrading model performance Appears in: Responsible Engineering, Robust AI

distribution shift types

Formal categorization of changes in data distributions including covariate shift, label shift, concept drift, and domain shift, each requiring specific adaptation techniques. Appears in: Robust AI

domain adaptation

Machine learning techniques that enable models trained on one domain to perform well on a different but related domain, addressing distribution mismatch challenges. Appears in: Robust AI

domain-specific ai applications

Machine learning solutions tailored to specific sectors like healthcare, agriculture, education, or disaster response, designed to address unique challenges and constraints. Appears in: Responsible Engineering

double modular redundancy (dmr)

A fault-tolerance technique where computations are duplicated across two independent systems to identify and correct errors through comparison. Appears in: Robust AI

dual-use dilemma

The challenge of mitigating misuse of technology that has both positive and negative potential applications, particularly relevant in AI security. Appears in: Robust AI

E

edge ai

The deployment of artificial intelligence algorithms directly on edge devices like smartphones, IoT sensors, and embedded systems, enabling real-time processing without cloud connectivity. Appears in: Introduction

edge computing

A distributed computing paradigm that brings computation and data storage closer to data sources, enabling real-time processing with reduced latency and lower bandwidth requirements Appears in: Responsible Engineering, On-device learning benefits, Sustainable AI

edge ml

Machine learning systems that perform inference and sometimes training at the edge of networks, typically on resource-constrained devices like smartphones or embedded systems with limited computational power. Appears in: Responsible Engineering

edge training

The process of training or fine-tuning machine learning models directly on edge devices, enabling personalization and adaptation without requiring data transmission to cloud servers. Appears in: On-device learning benefits

electromigration

The movement of metal atoms in a conductor under the influence of an electric field, potentially causing permanent hardware faults over time. Appears in: Robust AI

embodied carbon

The total greenhouse gas emissions generated during the manufacturing, transportation, and installation of a product before it begins operation. Appears in: Sustainable AI

emergent capabilities

Abilities that appear suddenly in neural networks at specific parameter thresholds, such as reasoning and arithmetic skills that emerge discontinuously rather than gradually improving with scale. Appears in: Introduction

energy efficiency

The ratio of useful output to energy input, measuring how effectively a system converts energy into desired computational work. Appears in: Sustainable AI

ensemble methods

Machine learning approaches that combine predictions from multiple models to improve accuracy, robustness, and reliability compared to individual models. Appears in: Robust AI

environmental impact measurement

Systematic tracking and quantification of the ecological effects of AI systems, including energy consumption, carbon emissions, and resource depletion across the complete system lifecycle. Appears in: Sustainable AI

environmental monitoring

The systematic collection and analysis of environmental data using sensor networks and machine learning to track ecosystem health, pollution levels, and climate change impacts. Appears in: Responsible Engineering

equality of opportunity

A fairness criterion focused on ensuring equal true positive rates across groups, guaranteeing that qualified individuals are treated equally regardless of group membership. Appears in: Responsible Engineering

equalized odds

A fairness definition requiring that true positive and false positive rates are equal across different demographic groups. Appears in: Responsible Engineering

error-correcting codes

Methods used in data storage and transmission to detect and correct errors, improving system reliability and data integrity. Appears in: Robust AI

esp32

A low-cost microcontroller unit widely used in IoT applications, featuring a 240 MHz processor and 520 KB of RAM, commonly deployed in resource-constrained social impact applications. Appears in: Responsible Engineering

exact model theft

An attack that aims to extract the precise internal structure, parameters, and architecture of a machine learning model, allowing complete reproduction of the original model. Appears in: Security & Privacy

experience replay

A memory-based technique that stores past training examples in a buffer to prevent catastrophic forgetting and stabilize learning in streaming or continual adaptation scenarios. Appears in: On-device learning benefits

expert collapse

A training pathology in mixture of experts models where only a few experts receive significant training signal, causing other experts to become underutilized and reducing the model’s effective capacity. Appears in: Introduction

explainability

The ability of stakeholders to understand how a machine learning model produces its outputs through post-hoc explanation techniques. Appears in: Responsible Engineering

explainable ai

AI systems designed to provide clear, interpretable explanations for their decisions and predictions, addressing the “black box” problem of complex machine learning models. Appears in: Introduction

external memory

Mechanisms that allow neural networks to access and manipulate external storage systems, extending their working memory beyond parameter storage to enable more complex reasoning and information retrieval. Appears in: Introduction

F

f1 score

A measure of model accuracy that combines precision and recall into a single metric, calculated as their harmonic mean. Appears in: Robust AI

fairness constraints

Technical and policy restrictions designed to ensure equitable treatment across demographic groups in machine learning systems. Appears in: Responsible Engineering

fast gradient sign method (fgsm)

A gradient-based adversarial attack that generates adversarial examples by adding small perturbations in the direction of the gradient. Appears in: Robust AI

fault injection attack

A physical attack that deliberately disrupts hardware operations through techniques like voltage manipulation or electromagnetic interference to induce computational errors and compromise system integrity. Appears in: Security & Privacy

fault tolerance

The ability of a system to continue operating correctly even when some of its components fail or encounter errors. Appears in: Robust AI

federated averaging

The standard algorithm for federated learning where client model updates are aggregated using weighted averaging based on local dataset sizes to produce a global model. Appears in: On-device learning benefits

federated learning

A machine learning approach that trains algorithms across decentralized data sources without requiring data to be centralized, improving privacy and reducing data transmission energy costs Appears in: Responsible Engineering, Introduction, On-device learning benefits, Security & Privacy, Responsible Engineering, Sustainable AI

few-shot learning

A machine learning paradigm that enables models to adapt to new tasks using only a small number of labeled examples, critical for data-sparse on-device scenarios. Appears in: On-device learning benefits

flops

Floating-point operations per second, a measure of computer performance indicating how many mathematical calculations involving decimal numbers a system can perform per second. Appears in: Sustainable AI

foundation models

Large-scale pretrained models like GPT and BERT that can be adapted for a wide variety of downstream tasks, serving as a foundation for multiple applications. Appears in: Introduction

G

gdpr

The General Data Protection Regulation, a European Union law that imposes strict requirements on personal data processing and significantly influences privacy-preserving machine learning design Appears in: On-device learning benefits, Responsible Engineering

generative adversarial networks

A class of machine learning systems where two neural networks compete against each other, with one generating fake data and the other trying to detect it, leading to highly realistic synthetic data generation. Appears in: Introduction

glitches

Momentary deviations in voltage, current, or signal that can cause incorrect operation in digital systems and circuits. Appears in: Robust AI

governance frameworks

Structured approaches for managing responsible AI development including policies, procedures, oversight mechanisms, and accountability structures. Appears in: Responsible Engineering

gpu

Graphics Processing Unit, a specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images and parallel processing tasks like AI training. Appears in: Sustainable AI

gradient descent

An optimization algorithm that iteratively updates model parameters by moving in the direction opposite to the gradient of the loss function, fundamental to neural network training. Appears in: On-device learning benefits

green ai metrics

Specialized performance indicators that measure the environmental impact of AI systems, including carbon footprint, energy efficiency, and resource utilization throughout the ML lifecycle. Appears in: Sustainable AI

green computing

The practice of designing, manufacturing, using, and disposing of computers and computer systems in an environmentally responsible manner. Appears in: Sustainable AI

grey-box attack

An adversarial attack where the attacker has partial knowledge about the model, such as knowing the architecture but not the specific parameters or training data. Appears in: Security & Privacy

H

hardware constraint optimization

Techniques for adapting ML algorithms and models to work within the memory, compute, and power limitations of mobile and embedded devices. Appears in: On-device learning benefits

hardware redundancy

The duplication of critical hardware components to provide backup functionality and improve system reliability through voting mechanisms. Appears in: Robust AI

hardware trojan

A malicious modification embedded in hardware components during manufacturing that can remain dormant under normal conditions but trigger harmful behavior when specific conditions are met. Appears in: Security & Privacy

heartbeat mechanisms

Periodic signals sent between system components to monitor health and detect failures, enabling timely fault detection and recovery. Appears in: Robust AI

hierarchical processing pattern

A design pattern that organizes systems into tiers (edge, regional, cloud) that share responsibilities based on available resources and capabilities, optimizing resource usage across the computing spectrum. Appears in: Responsible Engineering

homomorphic encryption

A cryptographic technique that allows computations to be performed directly on encrypted data without decrypting it first, enabling privacy-preserving machine learning inference. Appears in: Security & Privacy

hot spares

Backup components kept ready to instantaneously replace failing components without disrupting system operation, providing redundancy. Appears in: Robust AI

huber loss

A robust loss function used in regression that is less sensitive to outliers compared to squared error loss, improving training stability. Appears in: Robust AI

human oversight

The principle that human judgment should supervise, correct, or halt automated decisions, maintaining meaningful human control over AI systems. Appears in: Responsible Engineering

human-ai collaboration

The synergistic partnership between humans and AI systems where each contributes their unique strengths to solve complex problems more effectively than either could alone. Appears in: Introduction

hyperparameter optimization

The process of finding the optimal configuration of hyperparameters (learning rate, batch size, network architecture parameters) that control the machine learning training process. Appears in: Sustainable AI

I

impact assessment frameworks

Structured methodologies for evaluating the potential social, economic, and environmental effects of AI deployments in humanitarian and development contexts. Appears in: Responsible Engineering

inference

The phase in machine learning where a trained model is used to make predictions or generate outputs on new, previously unseen data. Appears in: Sustainable AI

intermittent faults

Hardware faults that occur sporadically and unpredictably, appearing and disappearing without consistent patterns, making diagnosis challenging. Appears in: Robust AI

interpretability

The degree to which humans can understand the reasoning behind a machine learning model’s predictions, often referring to inherently transparent models. Appears in: Responsible Engineering

iot sensors

Internet of Things devices that collect and transmit environmental or behavioral data, often operating on limited power budgets and using low-bandwidth communication protocols. Appears in: Responsible Engineering

K

knowledge distillation

A technique where a large, complex “teacher” model transfers its learned knowledge to a smaller, more efficient “student” model, maintaining performance while reducing computational requirements Appears in: On-device learning benefits, Sustainable AI

L

label shift

A type of distribution shift where the distribution of target labels changes while the conditional relationship between features and labels remains constant. Appears in: Robust AI

large language models

Neural networks with billions or trillions of parameters trained on vast text corpora, capable of understanding and generating human-like text across diverse domains and tasks. Appears in: Introduction

lifecycle assessment

A systematic approach to evaluating the environmental impacts of a product or system throughout its entire life cycle, from raw material extraction to disposal. Appears in: Sustainable AI

load balancing

Techniques in mixture of experts models to ensure that computational load and training signal are distributed evenly across experts, preventing expert collapse and maintaining model efficiency. Appears in: Introduction

lookup table

A data structure that replaces runtime computation with simpler array indexing operations, commonly used for performance optimization. Appears in: Robust AI

lora technology

Long Range wireless communication protocol that enables IoT devices to communicate over 15+ kilometers with minimal power consumption, ideal for agricultural and environmental monitoring applications. Appears in: Responsible Engineering

low-rank adaptation

A parameter-efficient fine-tuning method that approximates weight updates using low-rank matrices, reducing trainable parameters while maintaining adaptation capability. Appears in: On-device learning benefits

M

machine consciousness

The hypothetical emergence of conscious awareness in artificial systems, representing a frontier research area exploring whether machines can develop subjective experiences. Appears in: Introduction

machine learning

A subset of artificial intelligence that enables computers to learn and make decisions from data without being explicitly programmed for each specific task. Appears in: Sustainable AI

machine learning lifecycle

The complete process of developing, deploying, and maintaining ML systems, from data collection through model retirement. Appears in: Responsible Engineering

machine learning operations (mlops)

The practice of deploying and maintaining machine learning models in production reliably and efficiently through automated pipelines. Appears in: Robust AI

machine learning security

The protection of data, models, and infrastructure from unauthorized access, manipulation, or disruption throughout the entire machine learning lifecycle. Appears in: Security & Privacy

machine unlearning

Techniques for removing the influence of specific data points from trained models without complete retraining, supporting data deletion rights. Appears in: Responsible Engineering

megawatt-hour

A unit of energy equal to one megawatt of power used for one hour, commonly used to measure electricity consumption in large facilities like data centers. Appears in: Sustainable AI

membership inference attack

An attack that attempts to determine whether a specific data point was included in a model’s training dataset by analyzing the model’s behavior and outputs. Appears in: Security & Privacy

membership inference attacks

Privacy attacks that attempt to determine whether a specific data point was included in a model’s training set by analyzing model behavior. Appears in: Responsible Engineering

meta-learning

The process of learning how to learn, where models are trained to quickly adapt to new tasks with minimal data, particularly useful for personalization in on-device systems Appears in: Introduction, On-device learning benefits

microcontroller

A compact integrated circuit designed to govern specific operations in embedded systems, typically featuring limited processing power and memory but optimized for low power consumption and real-time applications. Appears in: Responsible Engineering

minimax

A decision-making strategy used in game theory that attempts to minimize the maximum possible loss in adversarial scenarios. Appears in: Robust AI

mixed precision training

A technique that uses different numerical precisions for different parts of neural network training, typically combining 16-bit and 32-bit floating-point arithmetic to reduce memory usage and increase training speed. Appears in: Sustainable AI

mixture of experts

An architectural approach that uses multiple specialized sub-models (experts) with a gating mechanism to route inputs to the most relevant experts, enabling efficient scaling while maintaining sparsity. Appears in: Introduction

mobile ml

Machine learning systems optimized for mobile devices like smartphones and tablets, balancing computational efficiency with inference accuracy for on-device processing. Appears in: Responsible Engineering

mobile-optimized architectures

Neural network designs specifically created for mobile deployment, emphasizing parameter efficiency, computational speed, and energy conservation. Appears in: On-device learning benefits

mobilenet

A family of efficient neural network architectures designed for mobile devices using depthwise separable convolutions to achieve significant reductions in model size and computation. Appears in: On-device learning benefits

mode collapse

A failure mode in generative models where the model produces only a limited variety of outputs, ignoring the diversity present in the training data and failing to capture the full distribution. Appears in: Introduction

model cards

Documentation framework that provides structured information about machine learning models, including intended use, performance characteristics, and limitations. Appears in: Responsible Engineering

model compression

Techniques to reduce the size and computational requirements of machine learning models through methods like quantization, pruning, and knowledge distillation to enable deployment on resource-constrained devices Appears in: Responsible Engineering, On-device learning benefits, Sustainable AI

model extraction

The process of stealing or recreating a machine learning model by observing its input-output behavior, often through systematic querying of model APIs. Appears in: Security & Privacy

model inversion attack

An attack that attempts to reconstruct training data or infer sensitive information about the dataset by analyzing a model’s outputs and confidence scores. Appears in: Security & Privacy

model pruning

The process of removing unnecessary weights, neurons, or connections from a trained neural network to reduce its size and computational requirements. Appears in: Sustainable AI

model quantization

A technique that reduces the precision of model parameters (typically from 32-bit to 8-bit or lower) to decrease model size and computational requirements while maintaining acceptable accuracy. Appears in: Responsible Engineering

model uncertainty

The inadequacy of a machine learning model to capture the full complexity of the underlying data-generating process, leading to prediction uncertainty. Appears in: Robust AI

model watermarking

A technique for embedding verifiable ownership signatures into machine learning models that can be used to detect unauthorized use or prove intellectual property theft. Appears in: Security & Privacy

monte carlo dropout

A technique that uses multiple forward passes with different dropout masks at inference time to estimate prediction uncertainty. Appears in: Robust AI

moore’s law

The observation that the number of transistors on a microchip doubles approximately every two years while the cost of computers is halved. Appears in: Sustainable AI

multi-agent approach

Systems architecture where multiple AI agents collaborate, negotiate, or compete to solve complex problems, enabling division of labor and specialized expertise across different components. Appears in: Introduction

multicalibration

A fairness technique ensuring that model predictions remain calibrated across intersecting subgroups, addressing complex demographic interactions. Appears in: Responsible Engineering

multimodal ai

AI systems that can process and understand multiple types of data simultaneously, such as text, images, audio, and video, enabling more comprehensive understanding and interaction. Appears in: Introduction

N

narrow ai

AI systems designed to excel at specific, well-defined tasks but lacking the ability to generalize across diverse problem domains, in contrast to artificial general intelligence. Appears in: Introduction

neural architecture search

Automated methods for designing optimal neural network architectures, using algorithms to explore the space of possible network designs and find the best performing structures Appears in: Introduction, Sustainable AI

neural engine

Specialized hardware accelerators designed for machine learning inference and training, such as Apple’s Neural Engine or Google’s Edge TPU, optimized for on-device AI workloads. Appears in: On-device learning benefits

neural network

A computational model inspired by biological neural networks, consisting of interconnected nodes (neurons) organized in layers that can learn complex patterns from data. Appears in: Sustainable AI

neuromorphic computing

Computing architectures inspired by the structure and function of biological neural networks, designed to process information more efficiently than traditional digital computers. Appears in: Introduction

non-iid data

Non-independent and identically distributed data where samples are not uniformly distributed across devices or time, creating challenges for federated learning convergence and generalization. Appears in: On-device learning benefits

O

on-device learning

The local adaptation or training of machine learning models directly on deployed hardware devices without reliance on continuous connectivity to centralized servers. Appears in: On-device learning benefits

orchestration

The coordination and management of multiple AI systems or agents working together, ensuring proper sequencing, communication, and resource allocation across distributed intelligence systems. Appears in: Introduction

oxide breakdown

The failure of an oxide layer in transistors due to excessive electric field stress, causing permanent hardware faults. Appears in: Robust AI

P

parameter

A learnable variable in a machine learning model, such as weights and biases in neural networks, that are adjusted during training to optimize performance. Appears in: Sustainable AI

permanent faults

Hardware defects that persist irreversibly until repair or component replacement, consistently affecting system behavior. Appears in: Robust AI

personalization layers

Model components, typically the final classification layers, that are adapted locally to user-specific data while keeping shared backbone layers frozen. Appears in: On-device learning benefits

physical attack

Direct manipulation or tampering with computing hardware to compromise the security and integrity of machine learning systems, bypassing traditional software defenses. Appears in: Security & Privacy

post-hoc explanations

Explanation methods applied after model training that treat the model as a black box and infer reasoning patterns from input-output behavior. Appears in: Responsible Engineering

power usage effectiveness

A metric used to determine the energy efficiency of a data center, calculated as the ratio of total facility energy consumption to IT equipment energy consumption. Appears in: Sustainable AI

precision agriculture

The use of technology including GPS, sensors, and machine learning to optimize farming practices by precisely monitoring and managing crop inputs like water, fertilizer, and pesticides. Appears in: Responsible Engineering

principle of least privilege

A security concept where users are given the minimum access levels necessary to complete their job functions, reducing security risks. Appears in: Robust AI

privacy budget

A concept in differential privacy that represents the total amount of privacy loss allowed across all queries or computations, with each operation consuming part of this finite budget. Appears in: Security & Privacy

privacy-preserving machine learning

Techniques and approaches that enable machine learning while protecting the privacy of individuals whose data is used for training or inference. Appears in: Security & Privacy

privacy-preserving techniques

Methods designed to protect individual privacy in machine learning, including differential privacy, federated learning, and local processing. Appears in: Responsible Engineering

privacy-utility trade-off

The fundamental tension between preserving individual privacy and maintaining the utility of data for machine learning, requiring careful balance through techniques like differential privacy. Appears in: Security & Privacy

progressive enhancement pattern

A design pattern that establishes baseline functionality under minimal resource conditions and incrementally incorporates advanced features as additional resources become available. Appears in: Responsible Engineering

prompt engineering

The practice of designing and optimizing text prompts to effectively communicate with large language models and achieve desired outputs from AI systems. Appears in: Introduction

pruning

A model compression technique that removes unnecessary connections or neurons from neural networks to reduce model size and computational requirements without significantly impacting performance. Appears in: On-device learning benefits

Q

quantization

The process of reducing the precision of model weights and activations from floating-point to lower-bit representations to decrease memory usage and accelerate computation on edge devices Appears in: On-device learning benefits, Sustainable AI

quantum machine learning

The intersection of quantum computing and machine learning, exploring how quantum algorithms and quantum computers can enhance or transform machine learning tasks. Appears in: Introduction

R

regularization

Methods used in machine learning to prevent overfitting by adding penalty terms to the loss function, constraining model complexity. Appears in: Robust AI

renewable energy

Energy collected from renewable resources that are naturally replenished, including solar, wind, hydroelectric, geothermal, and biomass sources. Appears in: Sustainable AI

resource paradox

The challenge in social impact applications where areas with the greatest needs often lack the basic infrastructure required for traditional technology deployments, requiring innovative engineering solutions. Appears in: Responsible Engineering

resource-constrained environments

Deployment contexts with limited computational power, network bandwidth, or power availability, typically requiring specialized system design and optimization techniques. Appears in: Responsible Engineering

responsible ai

The practice of developing and deploying AI systems in ways that are ethical, fair, transparent, and beneficial to society while minimizing potential harms and biases Appears in: Introduction, Responsible Engineering

reward hacking

The phenomenon where AI systems exploit unintended aspects of reward functions to maximize scores while violating the intended objectives. Appears in: Responsible Engineering

rlhf

Reinforcement Learning from Human Feedback - a training method that uses human preferences to guide model behavior, enabling AI systems to better align with human values and intentions. Appears in: Introduction

robust ai

The ability of artificial intelligence systems to maintain performance and reliability despite internal errors, external perturbations, and environmental changes. Appears in: Robust AI

robustness

A model’s ability to maintain stable and consistent performance under input variations, environmental changes, or adversarial conditions. Appears in: Responsible Engineering

robustness metrics

Quantitative measures for evaluating model stability under various perturbations, including adversarial accuracy, certified robustness bounds, and performance under distribution shift. Appears in: Robust AI

S

scaling laws

Mathematical relationships demonstrating power-law scaling between model size, dataset size, compute budget, and performance, suggesting predictable improvements with increased resources. Appears in: Introduction

scan chains

Dedicated test paths in processors that provide access to internal registers and logic for comprehensive hardware testing and fault detection. Appears in: Robust AI

scope 1 emissions

Direct greenhouse gas emissions from sources owned or controlled by an organization, such as on-site fuel combustion and company vehicles. Appears in: Sustainable AI

scope 2 emissions

Indirect greenhouse gas emissions from the generation of purchased electricity, steam, heating, or cooling consumed by an organization. Appears in: Sustainable AI

scope 3 emissions

All other indirect greenhouse gas emissions that occur in an organization’s value chain, including manufacturing, transportation, and end-of-life disposal. Appears in: Sustainable AI

secure aggregation

A cryptographic protocol that enables federated learning servers to compute aggregate model updates without accessing individual client contributions, enhancing privacy protection Appears in: On-device learning benefits, Security & Privacy

secure computation

Cryptographic protocols that enable multiple parties to jointly compute functions over private inputs without revealing those inputs to each other. Appears in: Security & Privacy

secure multi-party computation

A cryptographic method that allows multiple parties to jointly compute a function over their private inputs without revealing those inputs to each other. Appears in: Security & Privacy

selective computation

Computational strategies that dynamically allocate processing resources based on input complexity or current needs, improving efficiency by avoiding unnecessary computation. Appears in: Introduction

self-refinement

A training approach where models iteratively improve their own outputs by critiquing and refining their initial responses, enabling continuous improvement and better alignment with desired behaviors. Appears in: Introduction

self-supervised learning

A machine learning paradigm where models learn representations from unlabeled data by predicting parts of the input from other parts, reducing dependence on manually labeled datasets. Appears in: Introduction

side-channel attack

An attack that exploits information leaked through the physical implementation of computing systems, such as power consumption, electromagnetic emissions, or timing variations. Appears in: Security & Privacy

silent data corruption (sdc)

Undetected errors during computation or data transfer that propagate through system layers without triggering alerts, potentially compromising results. Appears in: Robust AI

smallholder farmers

Farmers operating on plots smaller than 2 hectares who produce a significant portion of global food supply but often lack access to modern agricultural technology and credit. Appears in: Responsible Engineering

social impact measurement

Systematic evaluation of how AI applications affect communities and individuals, including metrics for accessibility, equity, effectiveness, and unintended consequences. Appears in: Responsible Engineering

software fault

Unintended behavior in software systems resulting from defects, bugs, or design oversights that can impair performance or compromise security. Appears in: Robust AI

sparse training

A training approach that maintains sparsity in neural network weights throughout the training process, reducing computational requirements and memory usage. Appears in: Sustainable AI

sparse updates

A training strategy that selectively updates only a subset of model parameters based on their importance or contribution to performance, reducing computational and memory overhead. Appears in: On-device learning benefits

specification gaming

When AI systems find unexpected ways to achieve high rewards that technically satisfy the objective function but violate the intended purpose. Appears in: Responsible Engineering

speculative execution

A performance optimization in processors that executes instructions before confirming they are needed, which can inadvertently expose sensitive data through microarchitectural side channels. Appears in: Security & Privacy

state space models

Neural architectures that process sequences by maintaining compressed memory representations that update incrementally, offering linear scaling advantages over transformer attention mechanisms. Appears in: Introduction

stochastic computing

Computing techniques that use random bits and probabilistic operations to perform arithmetic, potentially offering better fault tolerance than traditional methods. Appears in: Robust AI

stuck-at fault

A permanent hardware fault where a signal line becomes fixed at a logical 0 or 1 regardless of input, causing incorrect computations. Appears in: Robust AI

supply chain attack

An attack that compromises hardware or software components during the manufacturing, distribution, or integration process, potentially affecting multiple downstream systems. Appears in: Security & Privacy

sustainable ai

The practice of developing and deploying artificial intelligence systems that minimize environmental impact while maintaining effectiveness and accessibility. Appears in: Sustainable AI

sustainable development goals

A collection of 17 global goals adopted by the United Nations to address pressing social, economic, and environmental challenges by 2030, providing a framework for AI applications in social good. Appears in: Responsible Engineering

swarm intelligence

Collective intelligence emerging from decentralized, self-organized systems, often inspired by biological swarms and applied to distributed ML systems and robotics. Appears in: Introduction

synthetic data generation

The creation of artificial datasets that approximate the statistical properties of real data while reducing privacy risks and avoiding direct exposure of sensitive information. Appears in: Security & Privacy

system-wide sustainability

Holistic approach to environmental responsibility that considers the entire AI infrastructure ecosystem, from data centers to edge devices, rather than optimizing individual components in isolation. Appears in: Sustainable AI

T

targeted attack

A type of data poisoning attack that aims to cause misclassification of specific inputs or classes while leaving the model’s general performance largely intact. Appears in: Security & Privacy

thermal stress

Hardware degradation caused by repeated cycling through high and low temperatures, leading to material fatigue and potential failures. Appears in: Robust AI

tiny ml

Machine learning systems designed to run on extremely resource-constrained devices like microcontrollers, typically with models under 1 MB and power consumption under 150 mW. Appears in: Responsible Engineering

tinyml

A field focused on deploying machine learning models on microcontrollers and extremely resource-constrained devices with kilobytes of memory and milliwatts of power consumption. Appears in: On-device learning benefits

tpu

Tensor Processing Unit, a specialized AI accelerator chip developed by Google specifically designed for machine learning workloads, particularly neural network computations. Appears in: Sustainable AI

training

The process of teaching a machine learning model to make predictions by showing it examples and adjusting its parameters based on performance feedback. Appears in: Sustainable AI

transfer learning

A machine learning technique that uses knowledge from a pretrained model on one task to improve learning on a related task, enabling efficient adaptation with limited data Appears in: Introduction, On-device learning benefits, Robust AI, Sustainable AI

transformer

A neural network architecture that uses self-attention mechanisms to process sequential data, forming the foundation for many modern language models. Appears in: Sustainable AI

transformer architecture

A neural network architecture based on attention mechanisms that has revolutionized natural language processing and is increasingly applied to other domains like computer vision. Appears in: Introduction

transient faults

Temporary hardware faults that do not persist or cause permanent damage but can lead to incorrect computations if not handled properly. Appears in: Robust AI

transparency

Openness about how AI systems are built, trained, validated, and deployed, including disclosure of data sources, design assumptions, and limitations. Appears in: Responsible Engineering

triple modular redundancy (tmr)

A fault-tolerance technique where three instances of a computation are performed, with majority voting determining the correct result. Appears in: Robust AI

trusted execution environment

A secure area within a processor that provides hardware-based protection for code and data, ensuring confidentiality and integrity even from privileged system software. Appears in: Security & Privacy

V

value alignment

The principle that AI systems should pursue goals consistent with human intent and ethical norms, addressing the challenge of encoding human values in machine objectives. Appears in: Responsible Engineering

value-sensitive design

A methodology for incorporating human values into technology design through systematic stakeholder engagement and ethical consideration of system impacts. Appears in: Responsible Engineering

vector-borne diseases

Diseases transmitted by insects or other vectors, such as malaria carried by mosquitoes, which can be monitored and controlled using machine learning-powered detection systems. Appears in: Responsible Engineering

vision-language models

AI systems that can understand and reason about both visual and textual information simultaneously, enabling tasks like image captioning, visual question answering, and multimodal understanding. Appears in: Introduction

W

watchdog timer

A hardware component that monitors system execution and triggers recovery actions if the system becomes unresponsive or stuck. Appears in: Robust AI

water usage effectiveness

A metric that measures the efficiency of water use in data centers, calculated as the ratio of total water consumed to IT equipment energy consumption. Appears in: Sustainable AI

weight freezing

A technique that fixes most model parameters during training while allowing only specific layers or components to be updated, reducing computational requirements for on-device adaptation. Appears in: On-device learning benefits

white-box attack

An adversarial attack where the attacker has complete knowledge of the model’s architecture, parameters, training data, and internal workings, enabling highly effective attack strategies. Appears in: Security & Privacy

Z

zero-day vulnerability

A previously unknown security flaw in software or hardware that can be exploited by attackers before developers have had a chance to create and distribute a patch. Appears in: Security & Privacy

zero-shot learning

The ability of machine learning models to perform tasks or classify objects they have never seen during training, often achieved through sophisticated representation learning or large-scale pretraining. Appears in: Introduction

Back to top
` HTML comment in this docstring block. HTML disallows nested comments, so the inner `-->` would terminate the outer comment early and cause the example markup below it (the `` and `