A Novel Data Exchange Model Based on P2P and Ontology

被引:0
|
作者
Peng, Li [1 ]
Man, Yuan [2 ]
机构
[1] Beijing Univ Civil Engn & Architecture, Inst Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Northeast Petr Univ, Sch Comp & Informat Technol, Daqing 163318, Peoples R China
来源
PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC) | 2013年
关键词
peer-to-peer; ontology; data exchange; relational model; information integration;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous development of enterprise informatization, there are a large number of heterogeneous data sources. So the requirement for the data exchange and integration in the different information systems becomes more and more prominent. According to the actual demand of data exchange, we introduce ontology and P2P technology, and propose a solution for the data exchange of heterogeneous data sources. First of all we propose a data exchange model based on ontology, and then introduce two aspects of the model-the construction of data source local ontology and the mapping between the various local ontology. Then, according to the function defined in the model, using JXTA technology, we put forward a data exchange model based on P2P and ontology, and meanwhile define the main components of the model.
引用
收藏
页码:1693 / 1696
页数:4
相关论文
共 50 条
  • [31] A Parallel Machine Scheduling Model Based Data Scheduling Scheme for P2P Media Streaming System
    Ji Qi-Jin
    Yang Zhe
    Zhu Yan-Yin
    2009 INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND OPTIMIZATION, PROCEEDINGS, 2009, : 111 - 114
  • [32] P2P based intrusion detection
    Czirkos, Zoltan
    Hosszu, Gabor
    INFOCOMMUNICATIONS JOURNAL, 2009, 1 (01): : 3 - 10
  • [33] P2P file sharing for P2P computing
    Briquet, Cyril
    Dalem, Xavier
    Jodogne, Sebastien
    de Marneffe, Pierre-Arnoul
    MULTIAGENT AND GRID SYSTEMS, 2009, 5 (02) : 137 - 164
  • [34] A P2P Resource Search Model Based on Ant Colony Optimization
    Zhou, Lian-ying
    Sun, Long-ji
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 433 - 436
  • [35] Secure trust model for P2P systems based on trusted computing
    Hao L.-M.
    Yang S.-T.
    Lu S.-N.
    Chen G.-L.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 86 - 90
  • [36] A Secure Trust Model for P2P Systems Based on Trusted Computing
    郝黎明
    杨树堂
    陆松年
    陈恭亮
    Journal of Shanghai Jiaotong University, 2008, (01) : 86 - 90
  • [37] A time-frame based trust model for P2P systems
    Chang, Junsheng
    Wang, Huaimin
    Yin, Gang
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 155 - +
  • [38] A P2P traffic optimization model based on secondary cache strategy
    Chen, Hongwei
    Wang, Shuping
    Wang, Chunzhi
    Zong, Xinlu
    Journal of Computational Information Systems, 2015, 11 (03): : 1029 - 1037
  • [39] A participation-based trust model for mobile P2P networks
    Liu, Kai
    Jin, Guang
    Rao, Daheng
    He, Jiaming
    Jiang, Xianliang
    Journal of Networks, 2014, 9 (07) : 1738 - 1746
  • [40] A Fuzzy Set Based Network Trust Model in P2P Environment
    Qi, Wen
    TWELFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, 2013, : 305 - 309