1 / 27

The Design and Evaluation of P2P Transactive Memory System

The Design and Evaluation of P2P Transactive Memory System. Fu-ren Lin Institute of Technology Management National Tsing-hua University Hsin-chu Taiwan 300 R.O.C. frlin@mx.nthu.edu.tw. Kuo-Lung Tsai, Pei-Chen Sun Institute of Information, Computer and Education

shepry
Download Presentation

The Design and Evaluation of P2P Transactive Memory System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Design and Evaluation of P2P Transactive Memory System Fu-ren Lin Institute of Technology Management National Tsing-hua University Hsin-chu Taiwan 300 R.O.C. frlin@mx.nthu.edu.tw Kuo-Lung Tsai, Pei-Chen Sun Institute of Information, Computer and Education National Kaohsiung Normal University Kaohsiung, Taiwan 802 R.O.C. esl@cc.nsysu.edu.tw, sun@nknucc.nknu.edu

  2. Rationale • A peer as a personalized agent can simulate its master’s knowledge sharing behavior. • A peer builds its social networks through communicating with other peers in computer networks. • A peer-to-peer network can be viewed as a distributed knowledge management system by imbedding transactive memory system. • A P2P network embedded with transactive memory can achieve the dual purposes: knowledge network development and individual autonomy.

  3. Research objectives • Developing a P2P knowledge management system with transactive memory to assist peer’s expertise recognition, knowledge network maintenance, information allocation, and retrieval coordination. • Designing a system model which is obedient to human nature and follows the system development trend of decentralization. • Observing the evolution of knowledge network in the community.

  4. Transactive memory system • Transactive memory theory explains how interdependent people within a knowledge network, each with their own set of skills and expertise, develop cognitive knowledge networks that help them identify the skills and expertise of others in the network . • Three memory types • Internal memory: what you know • External memory: what others know • Transactive memory: know who knows what

  5. Transactive memory system • 4 processes: • expertise recognition • identifying who knows what • directory updating • learning who knows what in the group • information allocation • assigning memory items to group members • retrieval coordination • planning how to find items in a way that takes advantage of who knows what

  6. P2P transactive memory system Directory updating Expertise recognition Cognitive K.N.maintenancemodule Authoritycomputing module Expertise recognitionmodule Stereotypemodule Cognitive K.N. exchange module Information allocation Retrieval coordination Information allocation module Retrieval coordination module

  7. Roles of peers • Authority • A peer is an authority when the peer is an expert in a topic and many other peers refer it when they need the knowledge of this topic. • The role of an authority plays a knowledge center to distribute knowledge to peers. • Determining who is an authority is based on the linkages of whole network. • Hub • Referral

  8. Roles of peers: hub • A hub connects to multiple relative authoritative peers. • We can see a hub peer as a recommender to indicate who an authority is. • The hub peer pulls together authorities on a topic and allows us to ignore unrelated peers.

  9. Roles of peers: referral • A referral makes a bridge between requestors and providers. • When a peer wants to get something from authorities, the criteria for an authority to decide whether to provide requested objects is the peer’s propensity to share which consists of its altruism and social network strength. • A referral may be a friend or others who have direct or indirect relationship with requestors and providers.

  10. Directory updating • Cognitive knowledge network maintenance module • Authority computing module • Cognitive network exchange module

  11. Expertise recognition • Expertise recognition module • The expertise recognition module uses knowledge base to provide the mapping between expertise and knowledge items. When a peer receives advertises of other peers, the information will be processed by this module and map to knowledge items which the recipient maybe knows. • Stereotype module • The stereotype module plays the role as a knowledge base to provide necessary mappings, such as profession-expertise and expertise-knowledge, for expertise recognition module. When a peer can’t find the sources of needed knowledge item, the stereotype module provides a substitute to look up the possible alternative sources.

  12. Information allocation • Information allocation decides how to store the new information to an appropriate peer. • When the related knowledge items are collected and stored by certain peers, it is easy to retrieve later. • These authorities become the knowledge center and have the responsibility to store and share these knowledge items. • The information allocation module extracts the key concept from the incoming file, and obtains the authority list from the cognitive knowledge network maintenance module. • After mapping the correlation, the file will be sent to the authoritative peers to store.

  13. Retrieval coordination • The retrieval coordination module receives the search results from the expertise recognition module and the authority list from cognitive knowledge network maintenances module to retrieve the knowledge items from authorized peers.

  14. Knowledge sharing decision model • DMxij = function [REQxj, SOCij, Ali, THRxj]. threshold Peer j sends a request about knowledge item x to peer i Peers i and j’s social relation strength Peer i’s altruism

  15. Evaluation • This study has developed a prototyping P2P system to evaluate the performance of a transactive memory system on knowledge sharing and task collaboration. • In experiments, knowledge networks on a P2P network are updated based on two schemes: exploration and exploitation. • Through exploration, a peer is a risk seeker to search potential knowledge owners through its acquainted peers. • Through exploitation, a peer acquires information of other peers’ expertise via its cognitive knowledge network based on its transactive memory in terms of authority and hub. • In experiments, different degrees of exploration and exploitation during knowledge sharing and task collaboration may result in different team performance.

  16. Experimental settings • Initialization • 6 stages of interactions • Knowledge items (categories): between 3 and 7 items initially • Propensity to share: three levels • Learning curve • Network status measure index: egocentric and whole networks.

  17. Experimental settings • A peer’s knowledge sharing decision making • Propensity to share • Altruism • Strength of social network • Ability • The ability on certain knowledge is growing according to a peer’s learning curve. • Learning curve is the path recording the progress track of a peer along its interactions with others.

  18. Network status measure index is the number of links a peer connects, the maximum number of possible connections a peer can have in the network the number of existing links of the whole network.

  19. Priority sequence of peer inquiry • The different degrees of exploration and exploitation are measured in three parameters: • authority value, • cumulative inquiry success rate, and • risk aspect. • For the group using exploration scheme, • Y =Sweight * SRit + Rweight*Ri, where we set Sweight= index1, and Rweight = 1 - index1 (3) • For the group using exploitation scheme, • Y = Ai* Aweight + SRi * Sweight+ Ri* Rweight (4) • In the experiment, a peer selects one out of three peers suggested by equations (3) and (4).

  20. Performance criteria • Cumulative inquiry success • Learning outcomes

  21. Experimental design • Initializing a P2P network • Constructing cognitive knowledge networks • Exchange peers’ knowledge networks • Comparing the evolutions of two groups via exploration and exploitation, respectively.

  22. Experimental results-cumulative success rate E1: the group with exploration scheme E2: the group with exploitation scheme

  23. Experimental results-learning outcomes E1: the group with exploration scheme E2: the group with exploitation scheme

  24. Experimental results-changes of indices 1 and 2 E1: the group with exploration scheme E2: the group with exploitation scheme

  25. Findings • Index1 and Index2 are designed to measure the status of egocentric and the whole networks. • E1 increases cumulative success rate through the growing knowledge of the egocentric network. • If a peer explores its egocentric network completely, it will find all peers in the network and raise the cumulative success rate. • The increase of E1’s cumulative success rate ascribes to Index1’s increase.

  26. Findings (cont.) • E2’s peers observe the whole network to find the authoritative peers. • Therefore, E2’s members exchange their cognitive knowledge networks with others and increase the understanding of the whole network. • E2’s Index2 increases faster than E1’s, but E2’s Index1 stops increasing in the later stages. This is because E2’s peers quickly find all their authoritative peers in the network and stop unnecessary interactions. • In this comparison, we found that the exploitation scheme is superior to the exploration in finding authorities. • This finding is consistent with the reality of our human society. Through interactions with someone and recognition from other people, we can make an impression quickly and fairly.

  27. Conclusion • In this study, a transactive memory system has been designed and prototyped to assist peer’s expertise recognition, knowledge network maintenance, information allocation, and retrieval coordination. • In the evaluation, we calculate cumulative inquiry success rate and learning outcomes. • We also observed the evolutions of cognitive knowledge network and found that transactive memory can help peer improve the development of their cognition knowledge networks. • The use of transactive memory to design P2P knowledge system is not only obedient to human nature and follows the system development trend of decentralization, but also enhances the mechanisms of privacy, autonomy, and self-organization which a centralized architecture is hard to achieve.

More Related