Contextual knowledge sharing in a P2P network

被引:0
作者
O'Brien, Philip [1 ]
Abidi, Syed Sibte Raza [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 3V6, Canada
来源
2006 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF INTELLIGENT SYSTEMS | 2006年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Developing techniques and tools to leverage context and facilitate actions, personalization, tasks, and knowledge has been at the forefront of research in knowledge management with little concern of fully understanding context. Knowledge is created and consumed in a context-i.e. decisions are made, conversations are held, conditions computed, and knowledge is shared with respect to a context. As knowledge sharing is so critically. placed within context, an understanding of this context is essential in developing effective tools. Thus, before further research can be conducted effectively, we must determine the nature and characteristics of context. This paper presents a critical overview of context from multiple perspectives. We will propose a model for elucidating and characterizing context in knowledge sharing, with a practical application to peer-to-peer knowledge sharing networks.
引用
收藏
页码:221 / +
页数:2
相关论文
共 50 条
[31]   The research of reputation incentive mechanism of P2P network file sharing system [J].
Li S. ;
Su W. .
International Journal of Information and Computer Security, 2018, 10 (2-3) :149-169
[32]   A Social Network Based Reputation System for Cooperative P2P File Sharing [J].
Chen, Kang ;
Shen, Haiying ;
Sapra, Karan ;
Liu, Guoxin .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (08) :2140-2153
[33]   Structuring communities for sharing human digital memories in a social P2P network [J].
Haseeb Ur Rahman ;
Madjid Merabti ;
David Llewellyn-Jones ;
Sud Sudirman ;
Anwar Ghani .
Peer-to-Peer Networking and Applications, 2020, 13 :1629-1642
[34]   Threshold Secret Sharing Based Trust Security in Structured P2P Network [J].
Cai Biao ;
Li Zhishu ;
Luo Zhen .
2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, :320-323
[35]   P2P Service Performance Analysis of Unstructured P2P Network [J].
Mao, JunPeng ;
Cui, YanLi ;
Huang, JianHua ;
Zhang, JianBiao .
2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, :50-+
[36]   Propagation modeling for P2P botnet in structured P2P network [J].
Qian, Quan ;
Xiao, Chao-Jie ;
Zhang, Rui .
Ruan Jian Xue Bao/Journal of Software, 2012, 23 (12) :3161-3174
[37]   The Bitcoin P2P Network [J].
Donet Donet, Joan Antoni ;
Perez-Sola, Cristina ;
Herrera-Joancomarti, Jordi .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 :87-102
[38]   A P2P File Sharing Network Topology Formation Algorithm Based on Social Network Information [J].
Altmann, Joern ;
Bedane, Zelalem Berhanu .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, :242-+
[39]   Knowledge sharing over p2p knowledge networks: A peer ontology and semantic overlay driven approach [J].
Abidi, SSR ;
Pang, XL .
PEOPLE, KNOWLEDGE AND TECHNOLOGY: WHAT HAVE WE LEARNT SO FAR?, 2004, :329-339
[40]   Designing Incentives for P2P Multimedia Sharing [J].
Zhang, Yu ;
van der Schaar, Mihaela .
2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,