1 Design and Evaluation of P2P Transactive Memory System Fu-ren Lin Institute of Technology Management National Tsing-hua University Hsin-chu Taiwan 300.

Slides:



Advertisements
Similar presentations
The art of teaching is the art of assisting discovery. -Mark Van Doren
Advertisements

Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
Fawzy Al-Alami G Term Paper.  Introduction.  Effect of Teamwork in Design-Build. Construction Contract.  Factors Can Enhance Design-Build.
Copyright ©2011 Pearson Education
Exploring Management Chapter 14 Teams and Teamwork.
Consistency of Assessment
Chapter 13 Teams and Teamwork
Knowing Semantic memory.
Improving Robustness in Distributed Systems Jeremy Russell Software Engineering Honours Project.
Chapter 12: Intelligent Systems in Business
HRM-755 PERFORMANCE MANAGEMENT
Team Composition and Team Role Allocation in Agile Project Teams Brian Turrel 30 March 2015.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
Chapter 9 Employee Development
PowerPoint Presentation by Charlie Cook
MODULE 21 TEAMS AND TEAMWORK “Two heads can be better than one” Why is an understanding of teams so important? What are the foundations of successful teamwork?
Managing Organizational Knowledge via Connective and Communal Transactive Memory Dr. Janet Fulk Professor of Communication, Annenberg School for Communication.
What is Business Analysis Planning & Monitoring?
Jack C Richards Professional Development for Language Teachers: Strategies for Teacher Learning Jack C Richards & Thomas.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
Evaluating Centralized, Hierarchical, and Networked Architectures for Rule Systems Benjamin Craig University of New Brunswick Faculty of Computer Science.
Becoming a Teacher Ninth Edition
How to develop research skills in students. The model of searching information. Carol Collier Kuhlthau How to develop research skills in students. The.
Chapter 14: Artificial Intelligence Invitation to Computer Science, C++ Version, Third Edition.
Slide 1 D2.TCS.CL5.04. Subject Elements This unit comprises five Elements: 1.Define the need for tourism product research 2.Develop the research to be.
Professional Certificate – Managing Public Accounts Committees Ian “Ren” Rennie.
NETWORKING ESSENTIALS. 2 PRIOR TO NETWORKING… REMINDER: KNOW YOURSELF Skills Skills Interests Interests Personality Personality Values Values.
11 C H A P T E R Artificial Intelligence and Expert Systems.
Presented by Abirami Poonkundran.  Introduction  Current Work  Current Tools  Solution  Tesseract  Tesseract Usage Scenarios  Information Flow.
© 2011 Brooks/Cole, A Division of Cengage Learning Chapter 16 Consultation and Collaboration You must be the change you wish to see in the world. Mahatma.
Effects on driving behavior of congestion information and of scale of in-vehicle navigation systems Author: Shiaw-Tsyr Uang, Sheue-Ling Hwang Transportation.
As We May Think Vannevar Bush—July Where we are so far…
Knowledge Management in Theory and Practice
Software Project Management Lecture # 7. Outline Project Scheduling.
System Analysis of Virtual Team Collaboration Management System based on Cloud Technology Panita Wannapiroon, Ph.D. Assistant Professor Division of Information.
“Thematic Priority 3” Draft Evaluation of IP + NoE.
1 Designing Effective Programs: –Introduction to Program Design Steps –Organizational Strategic Planning –Approaches and Models –Evaluation, scheduling,
Communications Skills (ELE 205)
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
Understanding Groups & Teams Ch 15. Understanding Groups Group Two or more interacting and interdependent individuals who come together to achieve particular.
Task-oriented approach to information handling support within web-based education Lora M. Aroyo 15 November 2001.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
University of Windsor School of Computer Science Topics in Artificial Intelligence Fall 2008 Sept 11, 2008.
Communications Skills (ELE 205) Dr. Ahmad Dagamseh Dr. Ahmad Dagamseh.
Chapter 4 Decision Support System & Artificial Intelligence.
Enabling e-Research in Combustion Research Community T.V Pham 1, P.M. Dew 1, L.M.S. Lau 1 and M.J. Pilling 2 1 School of Computing 2 School of Chemistry.
Distributed Models for Decision Support Jose Cuena & Sascha Ossowski Pesented by: Gal Moshitch & Rica Gonen.
Use of ICT in Data Management AS Applied ICT. Back to Contents Back to Contents.
Organization Development and Change © PAPERHINT.COM.
More New Media Information Technology and Social Life Feb. 4, 2005.
Knowledge Management in Theory and Practice
Development of the West Virginia University Electronic Theses & Dissertations System Presented By Haritha Garapati at ETD the 7 th International.
SSE3 Knowledge mangement concepts 1. Agenda What is knowledge management Classification of knowledge Knowledge management process Common/shared information.
Lecture №4 METHODS OF RESEARCH. Method (Greek. methodos) - way of knowledge, the study of natural phenomena and social life. It is also a set of methods.
Speaker : 童耀民 MA1G /3/21 1 Authors: Phone Lin and Pai-Chun Chung, National Taiwan University Yuguang Fang, University of Florida.
Social Structure and Interaction. A social structure is a network of interrelated statuses and roles that guide human behavior. A status is a socially.
Simulating Communication and Knowledge Networks Edward T. Palazzolo Arizona State University Source: Newsweek, December 2000.
1 Discovering Web Communities in the Blogspace Ying Zhou, Joseph Davis (HICSS 2007)
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. Understanding Marriage and Family Dynamics Chapter 3.
 Emotional Health  Mental Health  Physical Health  Social Health  Spiritual Health.
Vannevar Bush: As we may think. Consider a future device for individual use, which is a sort of mechanized private file and library. It needs a name,
CHAPTER 5 Transfer of Training.
Agenda  Purpose  Processes  Deliverables  Executing Activities 4.3.
Working with Individual and Organizational Knowledge Introduction.
Stages of Research and Development
Decision Support Systems
Cognitive Model of Trust as Relational Capital
Organization and Knowledge Management
Architecture Components
Organization Development
Presentation transcript:

1 Design and Evaluation of P2P Transactive Memory System Fu-ren Lin Institute of Technology Management National Tsing-hua University Hsin-chu Taiwan 300 R.O.C.

2 As We May Think by Vannevar Bush Originally published in the July 1945 issue of The Atlantic Monthly “Consider a future device for individual use, which is a sort of mechanized private file and library. It needs a name, and to coin one at random, ``memex'' will do. A memex is a device in which an individual stores all his books, records, and communications, and which is mechanized so that it may be consulted with exceeding speed and flexibility. It is an enlarged intimate supplement to his memory. “ Vannevar Bush ( )

3 Rationale A peer as a personalized agent can simulate its master’s knowledge sharing behavior. A peer builds its social networks through communicating with other peers in computer networks. A peer-to-peer network can be viewed as a distributed knowledge management system by imbedding transactive memory system.

4 Transactive memory system Transactive memory theory explains how interdependent people within a knowledge network, each with their own set of skills and expertise, develop cognitive knowledge networks that help them identify the skills and expertise of others in the network. Three memory types –Internal memory: what you know –External memory: what others know –Transactive memory: know who knows what

5 Transactive memory system (cont.) 4 inter-related processes for an agent to develop transactive memory system: –Expertise recognition Identifying who knows what KOxij indicates agent i’s perception of agent j’s level of expertise on a particular item, X. The actual expertise of agent j on item X would be defined as KIxj.

6 Transactive memory system (cont.) Directory updating –learning who knows what in the group –KIxi = f [KIxi, INFxi, CAIxji] –KOxij = f [Ai, KIxi, COMij, Â((COMik)(KOxkj))]

7 Transactive memory system (cont.) Information allocation –assigning memory items to group members –CAIxij = f [KOxij, COMij, INFxi, Ai-Aj]

8 Transactive memory system (cont.) Retrieval coordination –planning how to find items in a way that takes advantage of who knows what –CRIxij = f [TASKxi, KOxij, COMij, Ai-Aj]

9 P2P Transactive Memory System (cont.) A P2P network embedded with transactive memory can achieve the dual purposes: –Knowledge network development –Individual autonomy

10 Research objectives Developing a P2P knowledge management system with transactive memory to assist peer’s expertise recognition, knowledge network maintenance, information allocation, and retrieval coordination. Designing a system model which is obedient to human nature and follows the system development trend of decentralization. Observing the evolution of knowledge network in the community.

11 P2P transactive memory system Directory updatingExpertise recognition Information allocationRetrieval coordination Information allocation module Retrieval coordination module Expertise recognition module Stereotype module Cognitive K.N. maintenance module Authority computing module Cognitive K.N. exchange module

12 Transactive Memory for Virtual Team Development A1 A2 A3 A4 B7 B1 B3 B5 B4 B6 B4 B2 C1 C2 A4 A3 D3 D2 D4 D1 Virtual Team Virtual Community (A P2P Network) Sub-group Knowledge Relation Transactive Memory System Expertise Recognition Directory Updating Information Allocation Retrieval Coordination

13 Roles of peers Authority –A peer is an authority when the peer is an expert in a topic and many other peers refer it when they need the knowledge of this topic. – The role of an authority plays a knowledge center to distribute knowledge to peers. –Determining who is an authority is based on the linkages of whole network. Hub Referral

14 Roles of peers: hub A hub connects to multiple relative authoritative peers. We can see a hub peer as a recommender to indicate who an authority is. The hub peer pulls together authorities on a topic and allows us to ignore unrelated peers.

15 Roles of peers: referral A referral makes a bridge between requestors and providers. When a peer wants to get something from authorities, the criteria for an authority to decide whether to provide requested objects is the peer’s propensity to share which consists of its altruism and social network strength. A referral may be a friend or others who have direct or indirect relationship with requestors and providers.

16 Directory updating Cognitive knowledge network maintenance module Authority computing module Cognitive network exchange module –The willingness of sharing knowledge depends on the peer’s altruism and the social network strength. It can be represented by following equation. –SKNij = function [SOCij, Ali ]

17 Expertise recognition Expertise recognition module –The expertise recognition module uses knowledge base to provide the mapping between expertise and knowledge items. When a peer receives advertises of other peers, the information will be processed by this module and map to knowledge items which the recipient maybe knows. Stereotype module –The stereotype module plays the role as a knowledge base to provide necessary mappings, such as profession- expertise and expertise-knowledge, for expertise recognition module. When a peer can’t find the sources of needed knowledge item, the stereotype module provides a substitute to look up the possible alternative sources.

18 Information allocation Information allocation decides how to store the new information to an appropriate peer. When the related knowledge items are collected and stored by certain peers, it is easy to retrieve later. These authorities become the knowledge center and have the responsibility to store and share these knowledge items. The information allocation module extracts the key concept from the incoming file, and obtains the authority list from the cognitive knowledge network maintenance module. After mapping the correlation, the file will be sent to the authoritative peers to store.

19 Retrieval coordination The retrieval coordination module receives the search results from the expertise recognition module and the authority list from cognitive knowledge network maintenances module to retrieve the knowledge items from authorized peers.

20 Knowledge sharing decision model DMxij = f [REQ xj, SOC ij, Al i, THR xj ]. Peer j sends a request about knowledge item x to peer i Peers i and j’s social relation strength Peer i’s altruism threshold

21 Evaluation This study has developed a prototyping P2P system to evaluate the performance of a transactive memory system on knowledge sharing and task collaboration. In experiments, knowledge networks on a P2P network are updated based on two schemes: exploration and exploitation.

22 Evaluation (cont.) Through exploration, a peer is a risk seeker to search potential knowledge owners through its acquainted peers. Through exploitation, a peer acquires information of other peers’ expertise via its cognitive knowledge network based on its transactive memory in terms of authority and hub. In experiments, different degrees of exploration and exploitation during knowledge sharing and task collaboration may result in different team performance.

23 Experimental settings Initialization –6 stages of interactions Knowledge items (categories): between 3 and 7 items initially Propensity to share: three levels Learning curve Network status measure index: –egocentric –whole networks.

24 Experimental settings (cont.) A peer’s knowledge sharing decision making –Propensity to share Altruism Strength of social network –Ability The ability on certain knowledge is growing according to a peer’s learning curve. Learning curve is the path recording the progress track of a peer along its interactions with others.

25 Learning Curve kY(x) = 0.5 Y(x) ≧ x = 12x = x = 16x = x = 23x = x = 46x = 92

26 Network status measure index is the number of links a peer connects, the maximum number of possible connections a peer can have in the network the number of existing links of the whole network.

27 Priority sequence of peer inquiry The different degrees of exploration and exploitation are measured in three parameters: –authority value, –cumulative inquiry success rate, and –risk aspect.

28 Variables Ai denotes the authority values of peer i which owns a knowledge item in the knowledge network. SRi denotes the cumulative inquiry success rate of past transactions with peer i. Rij represents the risk aspect of of peer i toward peer j depends on the interaction frequency between peer i and j. If two peers have no interactions before, the risk is 1.0; if two peers had interaction, but did not succeed, the risk is set to 0.7.

29 Priority sequence of peer inquiry (cont.) Exploration: Y = S weight * SR it + R weight *R i, where we set S weight = index1, and R weight = 1 - index1 Exploitation: Y = A i * A weight + SR i * S weight + R i * R weight A peer selects one out of three peers suggested by exploration and exploitation.

30 Performance criteria Cumulative inquiry success Learning outcomes

31 Experimental design 1.Initializing a P2P network 2.Constructing cognitive knowledge networks Six stages, each stage performs five Q&A activities 3.Exchange peers’ knowledge networks 4.Comparing the evolutions of two groups via exploration and exploitation, respectively.

32 Experimental results- cumulative success rate

33 Experimental results- learning outcomes

34 Experimental results- changes of indices 1 and 2 E1: the group with exploration scheme E2: the group with exploitation scheme

35 Findings Index1 and Index2 are designed to measure the status of egocentric and the whole networks. E1 increases cumulative success rate through the growing knowledge of the egocentric network. If a peer explores its egocentric network completely, it will find all peers in the network and raise the cumulative success rate. The increase of E1’s cumulative success rate ascribes to Index1’s increase.

36 Findings (cont.) E2’s peers observe the whole network to find the authoritative peers. E2’s members exchange their cognitive knowledge networks with others and increase the understanding of the whole network. E2’s Index2 increases faster than E1’s, but E2’s Index1 stops increasing in the later stages. –This is because E2’s peers quickly find all their authoritative peers in the network and stop unnecessary interactions.

37 Findings (cont.) In this comparison, we found that the exploitation scheme is superior to the exploration in finding authorities. This finding is consistent with the reality of our human society. Through interactions with someone and recognition from other people, we can make an impression quickly and fairly.

38 Evolutions of Peers’ KN By Exploration Stage 1. Index1=0.44, Index2=0.09Stage 2. Index1=0.72, Index2=0.14 Stage 3. Index1=0.83, Index2=0.17Stage 4.Index1=0.94, Index2=0.19 Stage 5. Index1=0.94, Index2=0.19Stage 6. Index1=1.0, Index2=0.2

39 Evolutions of Peers’ KN By Exploitation Stage 1. Index1=0.22, Index2=0.07Stage 2. Index1=0.61, Index2=0.19 Stage 3. Index1=0.78, Index2=0.28Stage 4. Index1=0.78, Index2=0.38 Stage 5. Index1=0.78, Index2=0.4Stage 6. Index1=0.78, Index2=0.47

40 Conclusion A transactive memory system has been designed and prototyped to assist peer’s expertise recognition, knowledge network maintenance, information allocation, and retrieval coordination. Evaluate cumulative inquiry success rate and learning outcomes. The evolutions of cognitive knowledge network show that transactive memory can help peer improve the development of their cognition knowledge networks. The use of transactive memory to design P2P knowledge system is –not only obedient to human nature and follows the system development trend of decentralization, –but also enhances the mechanisms of privacy, autonomy, and self-organization which a centralized architecture is hard to achieve.

41 Ongoing Works Developing P2P application systems to conduct field experiments.