Search papers, labs, and topics across Lattice.
This paper addresses the challenge of providing high-fidelity AI-as-a-Service (AIaaS) in multi-domain federated networks, where end-to-end performance is affected by both communication and inference impairments. The authors introduce an AIaaS management plane based on Tail-Risk Envelopes (TREs), which are composable per-domain descriptors combining deterministic guardrails with stochastic rate-latency-impairment models. Through stochastic network calculus and Monte-Carlo simulations, the paper demonstrates improved tail latency compliance and tenant isolation under overload using admission control and TRE contracts.
Guaranteeing 99.9% uptime for AI-as-a-Service gets a boost from Tail-Risk Envelopes that tame network impairments and bursty traffic across federated domains.
To support the emergence of AI-as-a-Service (AIaaS), communication service providers (CSPs) are on the verge of a radical transformation-from pure connectivity providers to AIaaS a managed network service (control-and-orchestration plane that exposes AI models). In this model, the CSP is responsible not only for transport/communications, but also for intent-to-model resolution and joint network-compute orchestration, i.e., reliable and timely end-to-end delivery. The resulting end-to-end AIaaS service thus becomes governed by communications impairments (delay, loss) and inference impairments (latency, error). A central open problem is an operational AIaaS control-and-orchestration framework that enforces high fidelity, particularly under multi-domain federation. This paper introduces an assurance-oriented AIaaS management plane based on Tail-Risk Envelopes (TREs): signed, composable per-domain descriptors that combine deterministic guardrails with stochastic rate-latency-impairment models. Using stochastic network calculus, we derive bounds on end-to-end delay violation probabilities across tandem domains and obtain an optimization-ready risk-budget decomposition. We show that tenant-level reservations prevent bursty traffic from inflating tail latency under TRE contracts. An auditing layer then uses runtime telemetry to estimate extreme-percentile performance, quantify uncertainty, and attribute tail-risk to each domain for accountability. Packet-level Monte-Carlo simulations demonstrate improved p99.9 compliance under overload via admission control and robust tenant isolation under correlated burstiness.