TRACK AGENDA Generative AI and Large Language Models |
| TUESDAY, SEPTEMBER 12 |
| Afternoon Track Session |
| 1215 - 1330 |
Opening: get to know each other -- lightning (<1 min) around the room
Collaborative activity:
- What is an LLM?
- How big should it be?
- Do LLMs need to have self-attention mechanisms or something else?
- When we talk about researching LLMs, what are we talking about?
- Can we as a group come up with a definition that is sufficiently precise to be informative?
|
| 1330 - 1400 |
Communication of Use Cases (4 participants ~8 minute "presentation" each)
- Shauna Sweet
- Emily First
- Wil Corvey
- Susmit Jha
|
| 1400 - 1500 |
Breakout Groups Discussion Topics
- Current state of the art
- How might LLMs change the landscape
- What are the key technical challenges
|
| 1500 |
Transition to Plenary Room |
| WEDNESDAY, SEPTEMBER 13 |
| Morning Track Session |
| 0950 - 1020 |
Invited In-Track Talk Susmit Jha, Model Fine Tuning |
| 1020 - 1120 |
Break into use-case groups Scenario: Your use case is specifically tuned to application of LLMs to mission/safety critical systems which require a high degree of precision, with the assumption that data availability is -- the opposite of what we encounter in commercial applications - namely that we have very little data available in the desired modalities and/or that cover the space adequately.
As a discussion starter:
- Should your LLMs leverage pre-trained models, fine tune pre-trained models, or train a model on domain-specific data?
- What are the benefits and drawbacks to each?
- What are the security considerations versus concerns about precision, etc.?
Select a participant to represent your group and provide discussion highlights in an internal panel discussion.
|
| 1120 - 1150 |
Conclude morning session w/internal panel discussion |
| Afternoon Track Session |
| 1315 - 1345 |
Invited In-Track Talk Dan Guido, Security Concerns / Frameworks for LLMs |
| 1345 - 1410 |
Break into use-case groups As a discussion starter:
- What security concerns discussed by the speaker are relevant within your use case?
- Given the presentation, what other security concerns/considerations are relevant given your previous model tuning decisions?
|
| 1410 - 1420 |
Afternoon Break |
| 1420 - 1545 |
Resume into use-case groups As a discussion starter:
- What are the potential core disruptive technologies within your use-case group?
Select a participant to represent your group and provide discussion highlights in an internal panel discussion.
|
| 1545 |
Transition to Plenary Room |
| THURSDAY, SEPTEMBER 14 |
| Morning Track Session |
| 0940 - 1040 |
Resume into use-case groups Continue discussions refining core disruptive technologies
- Consider framing within the Hellmeier Questions:
- What are you trying to do?
- How is it done today?
- What is new about your approach?
- Who cares? What difference will it make?
|
| 1040 |
Transition to Plenary Room |