当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

《电子商务 E-business》阅读文献:An inner-enterprise knowledge recommender system

资源类别:文库,文档格式:PDF,文档页数:10,文件大小:598.75KB,团购合买
点击下载完整版文档(PDF)

Expert Systems with Applications 37(2010)1703-1712 Contents lists available at ScienceDirect Expert Systems with Applications ELSEVIER journalhomepagewww.elsevier.com/locate/eswa An inner-enterprise knowledge recommender system Lu Zhen,, George Q Huang, Zuhua Jiang Department of Industrial and System Engineering, National University of sin Department of Industrial and Manufacturing Systems Engineering. The University of Hong Kong, PR China Department of Industrial Engineering and Management, Shanghai Jiao Tong University, Shanghai, PR China ARTICLE IN FO A BSTRACT his paper proposes a model of the inner-enterprise knowledge recommender system. Among an orga- nowledge management nization, different members have different demands for knowledge in different context. Comparing with recommender system aditional knowledge query way, the knowledge recommender systems supply us a more that could deliver the proper knowledge to the proper people at the proper time. The recommendation mechanism is based on semantic matching on context information from both users 'side and knowledges side Recommendation rules are also maintained in the recommendation engine which is the core mod- ule in the system. By adjusting the rules, the configuration of the knowledge recommender system could be adapted to different users. This paper presents the system design as well as some key technologies analysis, and also discusses the advantages and preconditions for implementing the proposed system e 2009 Elsevier Ltd. All rights reserved. 1 Introduction With the knowledge recommender, it likes 'knowledge seeks people' rather thanpeople seek knowledge the former is a proac With the advent of the knowledge economy the core of enter- tive way for knowledge while the latter one is a reactive way. this prises is moving from being labor or capital intensive to being paper proposes a model of inner-enterprise knowledge recom- technology intensive, and currently is moving towards knowledge mender system, and it will illustrate: how the recommender sys- ufacturing, customers, previous success and failure; it can produce derives benefits for the knowledge workers Terprise, and how it intensive Within enterprises, knowledge is related to design, man- tem is designed and implemented for the en a long-term and sustained competitive predominance for enter The rest of paper is organized as follows. Some related work rises. So, the knowledge management( KM) became a critical done by other scholars are briefly introduced in the next section ssue for enterprises'management, and it has captured the In Section 3, we briefly describes the general architecture of the attention from both academics and industries(Rouse, 2002) knowledge recommender system. The following three sections One of the most essential aims for knowledge management is to are the introductions to the three key technologies for the knowl- promote knowledge sharing among organizations, which can help edge recommender system: the context model, rules base, and rec- ensure successful outcomes, learning from experience, knowledge ommendation engine are introduced in Sections 4-6, respectively ver architecture based knowledge repository mode is the simplest menting the proposed knowled ges and preconditions for imple- y for implementing knowledge sharing. All the knowledge re- mark and summary are then outlined in the last section sources are accumulated and stored in some centralized knowl- Ige servers: users could query and search knowledge for their 2 Related works tasks. However, knowledge searching is a very time consuming work for users. Sometimes, users have known the knowledge they 2.1. Knowledge management need is surely stored in the repository, but they are not willing to spend too much time and energy to search it. In addition, as to Knowledge is the major driving force for organizations' compet- some unsolved puzzle, or unknown tasks context, users often have itive capacities and wealth creation, and it is defined as a justified no idea about what knowledge they should to search So a more belief that increases an entity's capacity for effective action(Non- dvanced mode, knowledge recommender systems, should be aka, 1994). Knowledge may be viewed from several perspectives brought into enterprises'knowledge management platform. state of mind, resource object, process, or condition, or capability (Gold, Malhotra, Segars, 2001). This paper is based on the re- 4 Corres g author. Tel. +65 81712396 source view of knowledge. Knowledge management(KM) is the E-mailaddress:zhenlu@yahoo.cn(LZhen) systematic and organizationally specified process of creating 0957-4174/s- see front matter o 2009 Elsevier Ltd. All rights reserved. doi:10.1016/eswa2009.06.057

An inner-enterprise knowledge recommender system Lu Zhen a,*, George Q. Huang b , Zuhua Jiang c aDepartment of Industrial and System Engineering, National University of Singapore, Singapore bDepartment of Industrial and Manufacturing Systems Engineering, The University of Hong Kong, PR China cDepartment of Industrial Engineering and Management, Shanghai Jiao Tong University, Shanghai, PR China article info Keywords: Knowledge management Recommender system Context awareness abstract This paper proposes a model of the inner-enterprise knowledge recommender system. Among an orga￾nization, different members have different demands for knowledge in different context. Comparing with traditional knowledge query way, the knowledge recommender systems supply us a more proactive way that could deliver the proper knowledge to the proper people at the proper time. The recommendation mechanism is based on semantic matching on context information from both users’ side and knowledge’s side. Recommendation rules are also maintained in the recommendation engine, which is the core mod￾ule in the system. By adjusting the rules, the configuration of the knowledge recommender system could be adapted to different users. This paper presents the system design as well as some key technologies analysis, and also discusses the advantages and preconditions for implementing the proposed system. 2009 Elsevier Ltd. All rights reserved. 1. Introduction With the advent of the knowledge economy, the core of enter￾prises is moving from being labor or capital intensive to being technology intensive, and currently is moving towards knowledge intensive. Within enterprises, knowledge is related to design, man￾ufacturing, customers, previous success and failure; it can produce a long-term and sustained competitive predominance for enter￾prises. So, the knowledge management (KM) became a critical issue for enterprises’ management, and it has captured the attention from both academics and industries (Rouse, 2002). One of the most essential aims for knowledge management is to promote knowledge sharing among organizations, which can help ensure successful outcomes, learning from experience, knowledge reuse, and improving efficiency of knowledge workers. Client–Ser￾ver architecture based knowledge repository mode is the simplest way for implementing knowledge sharing. All the knowledge re￾sources are accumulated and stored in some centralized knowl￾edge servers; users could query and search knowledge for their tasks. However, knowledge searching is a very time consuming work for users. Sometimes, users have known the knowledge they need is surely stored in the repository, but they are not willing to spend too much time and energy to search it. In addition, as to some unsolved puzzle, or unknown tasks context, users often have no idea about ‘what knowledge they should to search’. So a more advanced mode, knowledge recommender systems, should be brought into enterprises’ knowledge management platform. With the knowledge recommender, it likes ‘knowledge seeks people’ rather than ‘people seek knowledge’, the former is a proac￾tive way for knowledge while the latter one is a reactive way. This paper proposes a model of inner-enterprise knowledge recom￾mender system, and it will illustrate: how the recommender sys￾tem is designed and implemented for the enterprise, and how it derives benefits for the knowledge workers. The rest of paper is organized as follows. Some related works done by other scholars are briefly introduced in the next section. In Section 3, we briefly describes the general architecture of the knowledge recommender system. The following three sections are the introductions to the three key technologies for the knowl￾edge recommender system; the context model, rules base, and rec￾ommendation engine are introduced in Sections 4–6, respectively. Section 7 discusses the advantages and preconditions for imple￾menting the proposed knowledge recommender model. Closing re￾mark and summary are then outlined in the last section. 2. Related works 2.1. Knowledge management Knowledge is the major driving force for organizations’ compet￾itive capacities and wealth creation, and it is defined as a justified belief that increases an entity’s capacity for effective action (Non￾aka, 1994). Knowledge may be viewed from several perspectives: state of mind, resource object, process, or condition, or capability (Gold, Malhotra, & Segars, 2001). This paper is based on the ‘re￾source’ view of knowledge. Knowledge management (KM) is the systematic and organizationally specified process of creating, 0957-4174/$ - see front matter 2009 Elsevier Ltd. All rights reserved. doi:10.1016/j.eswa.2009.06.057 * Corresponding author. Tel.: +65 81712396. E-mail address: zhen_lu@yahoo.cn (L. Zhen). Expert Systems with Applications 37 (2010) 1703–1712 Contents lists available at ScienceDirect Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa

L Zhen et al. / Expert Systems with Applications 37(2010)1703-1712 organizing, sharing, and using knowledge so that employees can In order to make the recommender systems adapt to large scale se it to become more effective and productive in their work network environment, Han et al. suggested a distributed CF algo- (Artail, 2006). There are four domains in KM: knowledge creation, rithm by using dht technology to construct a scalable distributed storage/retrieval, transfer and application (Alavi Leidner, 2001). recommender system( Han, Xie, Yang, Shen, 2004). Olsson studied The theme of this paper, knowledge recommendation, belongs to how peer finds each other without centralized control, so as to pro- the third domain: knowledge transfer (Lin, Geng, whinstor pose a headline recommender system in P2P environment(olss 2005). It occurs at different levels: transfer of knowledge between 2003). A multi-dimensional CF method based on workflow space individuals, from individuals to groups, between groups, across was addressed in(Zhen, Huang, Jiang, 2009). As to the knowledge groups and etc. ( Ko, Kirsch, King, 2005 ) The knowledge transfer grid environment, a conceptual model of proactive knowledge re rocess could be embodied as the forms of knowledge flow or cog- ommendation was proposed in(Zhen Jiang, 2008a), and reactive nitive flow(Zhuge, 2003), which could promote a knowledge- knowledge query model for supporting innovation was proposed based perspective on members'cooperation and coordination in(Zhen Jiang, 2008b). A multi-dimensional CF method based on ( Kotlarsky, van Fenema, Willcocks, 2008). workflow space was addressed in(Zhen, Huang, Jiang, 2009). As Knowledge management system(KMS)is of great interest and to the privacy issue in P2P environment, Foner proposed a distrib- potential value to business managers as well as to the information uted matchmaking system focused on preserving privacy(Foner, system function( King, Marks, McCoy, 2002). KMS refers to a 2003 ). Canny also proposed a decentralized p2P information distri class of information systems applied to managing organization bution system for considering the privacy reason( Canny, 2002). knowledge. They are It based systems developed to support and most researches about the recommender systems enhance the organizational processes of knowledge creation, stor- mainly concerned the recommendation algorithms, or recom- age/retrieval, transfer, and application(Nevo Chan, 2007). The menders for general situations in daily lives(e.g. recommend domain of KMs attracts numerous researches not only in aca- movies, books, music, news and etc. ) but seldom cover the demic prototype system level but also in industrial applications recommendation scenarios for office worker in enterprise. This level(Lin, Yen, Tarn, 2007). The knowledge recommender is paper will mainly introduce the implementation of the one kind of KMS for knowledge sharing Internet/ Intranet technol- knowledge recommender system in a manufacturing enterprise ogies provide a strong basis and opportunity for knowledge shar- in China ing among people with similar interests(Li, Montazemi, Yuan, 2006. The knowledge recommender also needs to learn users'de- mands for knowledge from their colleagues with similar interests 3. The inner-enterprise knowledge recommender system (Zhen, Jiang, Song, Liu, Liang,, 2008). The knowledge recommen- dation is a more advanced way for users to acquire knowledge, it 3. 1. The knowledge resources involved in the enterprise will not need users to seek knowledge by themselves: sometimes sers may not know what they should seek clearly. Nowadays, Before the implementation of knowledge recommender system, Knowledge search/information search is expected to have annual knowledge based system should In growth rates of 17%(King Lekse, 2006). Knowledge seeking, stores various types of inner-enterprise knowledge. The knowledge knowledge acquisition are important sub processes of knowledge resources involved in that enterprise consist of seven categories of gement. Each deal with some phase of process utilized by knowledge: design cases, patents, technical standards, design for users when seeking out facts, advice, opinions or the expertise mulas, design rules, software for design or simulation, experts in order to make a decision. while, knowledge recommendation and etc. is a proactive way for knowledge acquisition. It is knowledge seeks people' rather than 'people seek knowledge'(Zhen Jiang. Design cases refer to the successful or failure cases in the prod- uct design process reused again in the 2.2. Recommender system resent c Those successful cases could be design tasks so as to avoid waste of time and resource the failure cases also could give some warning to the designers so as to avoid following the same The knowledge recommender, the theme of this paper, is old wrong road. related to the recommend technologies, which has become a Patents are the accumulation of human technological achieve- promising and hot area in both academia and industries. There ments. Some innovative principles and technique evolution exist various recommendation systems have been developed route are contained among them. So, with hint from those cor (Adomavicius Tuzhilin, 2005). Tapestry is one of the earliest rec relative patents, designers would broaden their idea for innova- ommendation systems(Goldberg, Nichols, Oki, Terry, 1992). tion in product development. Based on this work, several automated recommendation systems Technical standards mainly refer to various types of standards have been developed A recommendation system for news and mo- files established by some authorities or their own enterprises. vie recommendations was developed by Konstan et al. (1997). As Design formulas are main part of knowledge concerning in the to book recommendation, Mooney and Roy proposed a content roduct developing process. The formulas for calculating or based recommendation system (Mooney Roy, 2000). McNee pro- checking some parameters of parts are usually brought out from sed a recommendation system to help research paper citation experience or experiments: they are very useful in the jobs of McNee et al., 2000). For improving e-commerce sites sales, a tax ct development. nomy recommendation system is developed by Schafer, Konstan, Design rules are generated during the product development and Schafer, Konstan, and riedl (1999). Based on analyzing cus- processes, and they are the excerption of the experts'experi tomer behaviors(navigational patterns ) Yong proposed a CF-based ences, which are very useful for the newly joined team members recommendation system for e-commerce sites(Yong, Yum, Song, to know how to make the design tasks more efficient. Su, 2005 ) Yeong et al. proposed a new methodology in which Software is frequently used in the design process, it will help customer purchase sequences are used to improve the quality of lculate parameters or simulate the performance CF-based recommendations(Yeong. Yoon, &Soung, 2005). Base of designing product. The software could be packed as tele-se n demand modeling and information filtering technologies, an vice which will enable distributed users to evoke the software nformation supply model was proposed(zhen et al., 2008)

organizing, sharing, and using knowledge so that employees can use it to become more effective and productive in their work (Artail, 2006). There are four domains in KM: knowledge creation, storage/retrieval, transfer, and application (Alavi & Leidner, 2001). The theme of this paper, knowledge recommendation, belongs to the third domain: knowledge transfer (Lin, Geng, & Whinston, 2005). It occurs at different levels: transfer of knowledge between individuals, from individuals to groups, between groups, across groups and etc. (Ko, Kirsch, & King, 2005). The knowledge transfer process could be embodied as the forms of knowledge flow or cog￾nitive flow (Zhuge, 2003), which could promote a knowledge￾based perspective on members’ cooperation and coordination (Kotlarsky, van Fenema, & Willcocks, 2008). Knowledge management system (KMS) is of great interest and potential value to business managers as well as to the information system function (King, Marks, & McCoy, 2002). KMS refers to a class of information systems applied to managing organization knowledge. They are IT based systems developed to support and enhance the organizational processes of knowledge creation, stor￾age/retrieval, transfer, and application (Nevo & Chan, 2007). The domain of KMS attracts numerous researches not only in aca￾demic prototype system level but also in industrial applications level (Lin, Yen, & Tarn, 2007). The knowledge recommender is one kind of KMS for knowledge sharing. Internet/Intranet technol￾ogies provide a strong basis and opportunity for knowledge shar￾ing among people with similar interests (Li, Montazemi, & Yuan, 2006). The knowledge recommender also needs to learn users’ de￾mands for knowledge from their colleagues with similar interests (Zhen, Jiang, Song, Liu, & Liang, 2008). The knowledge recommen￾dation is a more advanced way for users to acquire knowledge, it will not need users to seek knowledge by themselves; sometimes users may not know what they should seek clearly. Nowadays, Knowledge search/information search is expected to have annual growth rates of 17% (King & Lekse, 2006). Knowledge seeking, knowledge acquisition are important sub processes of knowledge management. Each deal with some phase of process utilized by users when seeking out facts, advice, opinions or the expertise in order to make a decision. While, knowledge recommendation is a proactive way for knowledge acquisition. It is ‘knowledge seeks people’ rather than ‘people seek knowledge’ (Zhen & Jiang, 2008a). 2.2. Recommender system The knowledge recommender, the theme of this paper, is related to the recommend technologies, which has become a promising and hot area in both academia and industries. There exist various recommendation systems have been developed (Adomavicius & Tuzhilin, 2005). Tapestry is one of the earliest rec￾ommendation systems (Goldberg, Nichols, Oki, & Terry, 1992). Based on this work, several automated recommendation systems have been developed. A recommendation system for news and mo￾vie recommendations was developed by Konstan et al. (1997). As to book recommendation, Mooney and Roy proposed a content￾based recommendation system (Mooney & Roy, 2000). McNee pro￾posed a recommendation system to help research paper citation (McNee et al., 2000). For improving e-commerce sites sales, a tax￾onomy recommendation system is developed by Schafer, Konstan, and Schafer, Konstan, and Riedl (1999). Based on analyzing cus￾tomer behaviors (navigational patterns), Yong proposed a CF-based recommendation system for e-commerce sites (Yong, Yum, Song, & Su, 2005). Yeong et al. proposed a new methodology in which customer purchase sequences are used to improve the quality of CF-based recommendations (Yeong, Yoon, & Soung, 2005). Base on demand modeling and information filtering technologies, an information supply model was proposed (Zhen et al., 2008). In order to make the recommender systems adapt to large scale network environment, Han et al. suggested a distributed CF algo￾rithm by using DHT technology to construct a scalable distributed recommender system (Han, Xie, Yang, & Shen, 2004). Olsson studied how peer finds each other without centralized control, so as to pro￾pose a headline recommender system in P2P environment (Olsson, 2003). A multi-dimensional CF method based on workflow space was addressed in (Zhen, Huang, & Jiang, 2009). As to the knowledge grid environment, a conceptual model of proactive knowledge rec￾ommendation was proposed in (Zhen & Jiang, 2008a), and reactive knowledge query model for supporting innovation was proposed in (Zhen & Jiang, 2008b). A multi-dimensional CF method based on workflow space was addressed in (Zhen, Huang, & Jiang, 2009). As to the privacy issue in P2P environment, Foner proposed a distrib￾uted matchmaking system focused on preserving privacy (Foner, 2003). Canny also proposed a decentralized P2P information distri￾bution system for considering the privacy reason (Canny, 2002). In all, most researches about the recommender systems mainly concerned the recommendation algorithms, or recom￾menders for general situations in daily lives (e.g. recommend movies, books, music, news and etc.), but seldom cover the recommendation scenarios for office worker in enterprise. This paper will mainly introduce the implementation of the knowledge recommender system in a manufacturing enterprise in China. 3. The inner-enterprise knowledge recommender system 3.1. The knowledge resources involved in the enterprise Before the implementation of knowledge recommender system, knowledge based system should already exist in enterprise. It stores various types of inner-enterprise knowledge. The knowledge resources involved in that enterprise consist of seven categories of knowledge: design cases, patents, technical standards, design for￾mulas, design rules, software for design or simulation, experts and etc. Design cases refer to the successful or failure cases in the prod￾uct design process before. Those successful cases could be reused again in the present design tasks so as to avoid waste of time and resource, while the failure cases also could give some warning to the designers so as to avoid following the same old wrong road. Patents are the accumulation of human technological achieve￾ments. Some innovative principles and technique evolution route are contained among them. So, with hint from those cor￾relative patents, designers would broaden their idea for innova￾tion in product development. Technical standards mainly refer to various types of standards files established by some authorities or their own enterprises. Design formulas are main part of knowledge concerning in the product developing process. The formulas for calculating or checking some parameters of parts are usually brought out from experience or experiments; they are very useful in the jobs of product development. Design rules are generated during the product development processes, and they are the excerption of the experts’ experi￾ences, which are very useful for the newly joined team members to know how to make the design tasks more efficient. Software is frequently used in the design process, it will help designers to calculate parameters or simulate the performance of designing product. The software could be packed as tele-ser￾vice, which will enable distributed users to evoke the software in long-distance. 1704 L. Zhen et al. / Expert Systems with Applications 37 (2010) 1703–1712

L Zhen et al Expert Systems with Applications 37(2010)1703-1712 environments Other Applications User portal Context Awareness Mandgement Portal context. Context- User context Edit portal Context Edit portal Rules-Edit Authorized Knonledge- Portal Query Portal Rules miner Knowledge- 2 Rules for recommendation Knowledge Recommendation Engine s Knowledge Flow Knowledge Recommender System -ec.--..-- Information flow -- Control Flow Fig. 1. The architecture of the knowledge recommender system. Experts is also one kind of the knowledge sources, since some management of the enterprise wished that: by using the knowledge mplicit knowledge is just contained in experts brains and could recommender system, users could browse much more knowledgere- t be easily expressed in text or chart forms(Bradley, Paul, sources related to their work. moreover, the system should be flexi- Seeman, 2006). Therefore, as to some certain technical domain, ble, so that users could adjust the configuration of the system by some corresponding experts contact information is stored. adding, removing rules or changing some parameters of the rules Those contact information will be recommended to designers According to those considerations, we designed the knowledge and help them communicate with expert recommender system for supplying the proper knowledge to the proper person at the proper time. The systems architecture In fact, according to the utilization mode of knowledge services, shown in Fig. 1 above seven categories could be divided into three sorts: (1) The knowledge recommender syste nly consists of three browse knowledge (2)calculation knowledge, and(3)expert parts (1) Context model and elicitation: Context model and aware- ess is the basis for the intelligent recommender system design work in the case enterprise, patents, design cases. As to our system, it mainly concerns building context model technical standards, formulas, and design rules are main rom both user and knowledge sides; and context elicitation text-formatted knowledge: users just need to browse those from users'environments and other applications. As to this knowledge. So they could be the form of ordinary web pages part, the following Section 4 will give detail introduction. for users’ browse. (2)Rules for recommendation: It mainly concerns maintaining (2)Calculation knowledge: As to the engineering design work some rules for recommendation engine to utilize. Those in the case enterprise, software mainly refers to calculating rules consist of three sorts: main rules constraint rules parameters or simulation of designing products. Those Sol and newly-added rules. Moreover, they could be mined out knowledge resources could be packed as web services based rom the query log data by the means of data mining tech on tele-service technique. Users could invoke the knowledge logies. as to this part, the following Section 5 will give calculation services in long-distance (3)Expert knowledge: It mainly concerns the corresponding (3)Recommendation engine: It is the core module to execute experts'contact information (e.g. affiliation, Email, tele- the recommendation process that concerns searching correl- phone, URL link for video communication and etc. ) Those ative knowledge resources from repository and deliver to the contact information will be supplied to designers and help users who may need them. The engine will employ semantic them communicate with experts about the technical prob matching technologies to determining the correlative degree lems confronted in their design tasks between users' requirements and knowledges domain. As to this part, the following Section 6 will give detail introduction. 3. 2. The architecture of the system 4. Context model and elicitation The enterprise(ssB) wanted the knowledge recommender system could save a lot of time and energy for employees to seek knowledge. 4. 1. Context model rent tasks, scenarios and etc. ) automatically, and find some poten tial

Experts is also one kind of the knowledge sources, since some implicit knowledge is just contained in experts’ brains and could not be easily expressed in text or chart forms (Bradley, Paul, & Seeman, 2006). Therefore, as to some certain technical domain, some corresponding experts’ contact information is stored. Those contact information will be recommended to designers and help them communicate with experts. In fact, according to the utilization mode of knowledge services, above seven categories could be divided into three sorts: (1) browse knowledge, (2) calculation knowledge, and (3) expert knowledge. (1) Browse knowledge: as to the office work or engineering design work in the case enterprise, patents, design cases, technical standards, formulas, and design rules are mainly text-formatted knowledge; users just need to browse those knowledge. So they could be the form of ordinary web pages for users’ browse. (2) Calculation knowledge: As to the engineering design work in the case enterprise, software mainly refers to calculating parameters or simulation of designing products. Those sort knowledge resources could be packed as web services based on tele-service technique. Users could invoke the knowledge calculation services in long-distance. (3) Expert knowledge: It mainly concerns the corresponding experts’ contact information (e.g. affiliation, Email, tele￾phone, URL link for video communication and etc.). Those contact information will be supplied to designers and help them communicate with experts about the technical prob￾lems confronted in their design tasks. 3.2. The architecture of the system The enterprise (SSB) wanted the knowledge recommender system could save a lot of time and energy for employees to seek knowledge. The system should have the abilities to capture users’ context (cur￾rent tasks, scenarios and etc.) automatically, and find some poten￾tially useful knowledge so as to recommend to users. The top management of the enterprise wished that: by using the knowledge recommender system, users could browse much more knowledge re￾sources related to their work. Moreover, the system should be flexi￾ble, so that users could adjust the configuration of the system by adding, removing rules or changing some parameters of the rules. According to those considerations, we designed the knowledge recommender system for supplying the proper knowledge to the proper person at the proper time. The system’s architecture is shown in Fig. 1. The knowledge recommender system mainly consists of three parts: (1) Context model and elicitation: Context model and aware￾ness is the basis for the intelligent recommender systems. As to our system, it mainly concerns building context model from both user and knowledge sides; and context elicitation from users’ environments and other applications. As to this part, the following Section 4 will give detail introduction. (2) Rules for recommendation: It mainly concerns maintaining some rules for recommendation engine to utilize. Those rules consist of three sorts: main rules, constraint rules, and newly-added rules. Moreover, they could be mined out from the query log data by the means of data mining tech￾nologies. As to this part, the following Section 5 will give detail introduction. (3) Recommendation engine: It is the core module to execute the recommendation process that concerns searching correl￾ative knowledge resources from repository and deliver to the users who may need them. The engine will employ semantic matching technologies to determining the correlative degree between users’ requirements and knowledge’s domain. As to this part, the following Section 6 will give detail introduction. 4. Context model and elicitation 4.1. Context model Recently, many existing researches on context awareness either focus on user side (demand side) or on information resource side Fig. 1. The architecture of the knowledge recommender system. L. Zhen et al. / Expert Systems with Applications 37 (2010) 1703–1712 1705

1706 L Zhen et aL./Expert Systems with Applications 37(2010)1703-1712 (supplier side)alone. We argue that effective and efficient context by the way of tele-service. While, some other knowledge aware recommender systems need to consider from both sides. In resources need users go to the knowledge resources' location. contrast to others work related in context research, our approach In this situation, the location information of users and knowl- stands out from that: we formalize an ontology based context edge resources should be considered in recommendation. model considering both users' side and knowledge resources side. Devices: It reflects the user's current PCs capacities, e.g. CPU The ontology based context model including user context and speed, RAM, and etc. Some knowledge resource(e.g.some knowledge context is illustrated in Fig. 2. web-service based software) need be invoked by tele-g On the user side the users' context mainly includes the user's current PC should have enough capacities to run them. Profile: It describes user's basic information user ID, user name On the knowledge side, the knowledge resourcescontext and etc mainly includes: Roles: It describes the roles that the user is acting as, and the roles'requirements for knowledge. For example, as to the role Profile: It describes knowledge resources basic information, some CAD software belongs to the roles knowledge qualification of capabilities and skills, if there is some new. Domains: It is the main feature for describing domain character nowledge, or notices of training about some CAd software, they istics of knowledge resources. It is the important criteria to judg- will be recommended to the mechanical engineers. ing whether one certain knowledge is suitable for some user Background: It describes the users background in educ cation some skills, e.g. English level, computer level, and etc. It may. Types: Different knowledge types need different management need users qualified with some background knowledge or skills tools and invoke ways of knowledge services. to read, understand, or utilize some knowledge resources Location: It reflects knowledge resources'location. The same Interests: It describes the user's interests in knowledge or infor- as users location context, they all have ect effect to mation. Because this system is mainly utilized in enterprises recommendation offices, the interests are mainly oriented to knowledge or infor-. Prerequisite: The utilization of some knowledge may need mation requirements in engineering or operations domain users' background knowledge and skills be qualified or users Tasks: It describes the tasks that the user is taking on, and the PC devices have enough capacity to use the knowledge(e.g. soft air conditioner thermodynamic simulation, the thermody-. Evaluations: It keeps users' evaluations to knowledge, e.g. ' rela- namic simulation theories or tools for air conditioner are the tive but no need supplied again, relative and supplied again task requirements. So, some knowledge on that area will be sup- and irrelative. It could be utilized to judge: whether it plied to the members who are fulfilling that task. newknowledge for the user; as to the 'old'one, whether it is Time: It is the current date which could be gained from the sys- need to be recommended again tem time of the users PC. At some special time, there is some certain affair need the user to handle. It may imply some knowl- It should be mentioned that: as to above context features edge requirements to aid the user. In addition, based ontime related to knowledge requirements descriptions, e.g. 'Interest context, system could judge whether the user is performing taskin user context, and'domain' in knowledge context, we used some certain task, which is also related to some requirements to a set of tuples including keywords and its weight: for knowledge. ICi, W)IC E C, WE W; C is a set of pre-designed categories, and Location: It reflects the users current location(e.g. city, site of w is the set of weights for rating the categories. company, etc. ) There is no direct relationship between location The work for determining the keywords must based on a pre- and the requirements for knowledge, but it has indirect effect. designed ontology, which contains the categories of things that Some knowledge resources could be viewed online, or invoked may exist in the domain concerning the enterprise in the case Profile Roles Context Ontology Profile (Background Domains Interests Users Knowledge Ontology Untold Location Time Prerequisite Location Evaluations Devices Fig. 2. The ontology based context model

(supplier side) alone. We argue that effective and efficient context￾aware recommender systems need to consider from both sides. In contrast to others’ work related in context research, our approach stands out from that: we formalize an ontology based context model considering both users’ side and knowledge resources side. The ontology based context model including user context and knowledge context is illustrated in Fig. 2. On the user side, the users’ context mainly includes: Profile: It describes user’s basic information, user ID, user name and etc. Roles: It describes the roles that the user is acting as, and the roles’ requirements for knowledge. For example, as to the role ‘mechanical engineer’, some CAD software belongs to the role’s qualification of capabilities and skills, if there is some new knowledge, or notices of training about some CAD software, they will be recommended to the mechanical engineers. Background: It describes the user’s background in education or some skills, e.g. English level, computer level, and etc. It may need users qualified with some background knowledge or skills to read, understand, or utilize some knowledge resources. Interests: It describes the user’s interests in knowledge or infor￾mation. Because this system is mainly utilized in enterprises’ offices, the interests are mainly oriented to knowledge or infor￾mation requirements in engineering or operations domain. Tasks: It describes the tasks that the user is taking on, and the tasks’ requirements for knowledge. For example, as to the task ‘air conditioner thermodynamic simulation’, the thermody￾namic simulation theories or tools for air conditioner are the task requirements. So, some knowledge on that area will be sup￾plied to the members who are fulfilling that task. Time: It is the current date which could be gained from the sys￾tem time of the user’s PC. At some special time, there is some certain affair need the user to handle. It may imply some knowl￾edge requirements to aid the user. In addition, based on ‘time’ context, system could judge whether the user is performing some certain task, which is also related to some requirements for knowledge. Location: It reflects the user’s current location (e.g. city, site of company, etc.). There is no direct relationship between location and the requirements for knowledge, but it has indirect effect. Some knowledge resources could be viewed online, or invoked by the way of tele-service. While, some other knowledge resources need users go to the knowledge resources’ location. In this situation, the location information of users and knowl￾edge resources should be considered in recommendation. Devices: It reflects the user’s current PC’s capacities, e.g. CPU speed, RAM, and etc. Some knowledge resource (e.g. some web-service based software) need be invoked by tele-service; the user’s current PC should have enough capacities to run them. On the knowledge side, the knowledge resources’ context mainly includes: Profile: It describes knowledge resources’ basic information, knowledge ID, title, creator, owner, and etc. Domains: It is the main feature for describing domain character￾istics of knowledge resources. It is the important criteria to judg￾ing whether one certain knowledge is suitable for some user’ demands. Types: Different knowledge types need different management tools and invoke ways of knowledge services. Location: It reflects knowledge resources’ location. The same as user’s location context, they all have indirect effect to recommendation. Prerequisite: The utilization of some knowledge may need users’ background knowledge and skills be qualified, or users’ PC devices have enough capacity to use the knowledge (e.g. soft￾ware sorts of knowledge). Evaluations: It keeps users’ evaluations to knowledge, e.g. ‘rela￾tive but no need supplied again’, ‘relative and supplied again’, and ‘irrelative’. It could be utilized to judge: whether it is ‘new’ knowledge for the user; as to the ‘old’ one, whether it is need to be recommended again. It should be mentioned that: as to above context features related to knowledge requirements descriptions, e.g. ‘Interest’, ‘task’ in user context, and ‘domain’ in knowledge context, we used to a set of tuples including keywords and its weight: fhci; wiijci 2 C; wi 2 Wg; C is a set of pre-designed categories, and W is the set of weights for rating the categories. The work for determining the keywords must based on a pre￾designed ontology, which contains the categories of things that may exist in the domain concerning the enterprise in the case. Fig. 2. The ontology based context model. 1706 L. Zhen et al. / Expert Systems with Applications 37 (2010) 1703–1712

L Zhen et aL/ Expert Systems with Applications 37(2010)1703-1712 With the domain ontology as criterion, the knowledge resources but maybe still important tasks. The'tasks'contextual information and users'requirements will be marked with the same 'language of the user, which mainly refers to: what temporary tasks the user that is also machine-understandable. Otherwise, some mistake or is taking on currently, what the due time is, what the ongoing conflict(e.g.'gasoline'vs 'petrol,)may emerge due to users' differ- tasks'descriptions are (it reflects the tasks'requirements for ent habits for naming some knowledge. In all, context could be extracted through above two channels. 4.2 Context elicitation So, when the system detected the current time from the users PC environment, the tasks context about the user will be extracted Context elicitation is a process of deriving the values of context through above two processes. It should be mentioned that: tasks attributes. There are mainly three ways for context elicitation: context information reflects users'knowledge requirements about form-filling, context detection, and context extraction. their ongoing tasks, which is the major basis for following recom- mendation process. (1) Form-filling: In the form-filling way, contextual infor- users'input, e.g. user's profile, roles. 5. Rules for knowledge recommendation background, interest, location and etc. As to the contextual information of knowl 5.1. Rules in recommendation engine edge resources, they are mainly input by authorized users, e.g. knowledge engi The knowledge is recommended according to the rules, which is neers or the knowledge's creators, and set manually or mined from other sources. Those rules are im rant configuration control parameters to adjust the recommenders (2)Context detection: The goal of context detection is to collect performance and functions, e.g. how many knowledge resources or example, the 'time could be derive between knowledge and users requirements shot directly from the system time of users PC. The same with the'devices' contextual The rules could be divided into three sorts. nformation, it could also be captured directly from the system parameters of (1)Main rules: They are the initial criteria for recommendation users’PC. (3)Context extraction: The context extraction process may be the repository. Based on main rules, system will gain a pre more complex than above two, it could liminary list of knowledge. Main rules mostly concern the users' context information in 'tasks, 'interest, and information of the user, which is very (2)Constraint rules: There are constraints for some knowledge essential for the recommender system in resources' utilization. As to the users who are not qualified his case. The main target of this system to use the knowledge for some reasons (e.g. background is oriented to office environments the knowledge, or hardware capacity ) Those rules are mainly tasks' contextual information reflects a utilized to filter above preliminary list of knowledge. main demand of knowledge for office (3)Newly-added rules: They are added by authorized users workers. Our system will extract 'tasks (e.g. knowledge engineers), or mined out from uses'query contextual information from outside data. They act as the supplements for above main rules applications, e.g. project management system, and email system. The table 1 illustrate in the system N Some important and formal projects'schedule and information could not always coincide with users'requirements, there exists 2. 1. Context extraction from project management system It should be mentioned that: the recommended knowledge are maintained by some project management system. The enter- a correlative values' between users and knowledge As to the Sup- prise in this case is using the 'Microsoft Project Server'as the pro ply(Uinterest, 0.8)"in above rule(ri), the 0.8 is the 'correlative ject management software. Through the PDs( Project Data Service) values. It means to recommend the knowledge according the component, which is the API of 'Microsoft Project Server,our users' requirement descriptions ' U interest with the correlative values higher than 0.8. If the value is omitted in Supply(). it mea tem could capture the project data from the project managemen default value%, which denotes completely coincident. system. In fact, that captured information is the ' contextual information of the user, which mainly refers to: what tasks the user is taking on currently, what output the user should submit 5.2. Rules mining based on query log for the project, what the ongoing tasks' descriptions are(it reflects the tasks' requirements for knowledge). Our recommender system has a knowledge query users. The query histories data stored in query log DB co 4.2. 2 Context extraction from email system lized to m some recommendation rules by the mean Some informal or temporary tasks are triggered by email sys- mining technologies. In fact, those rules mined out from tem. For example, the leader assigned a temporary task to one data are the third sort of rule, ' newly added rules member trough the email system. Those tasks assignment emails Traditional rules mining(X= y) conforms to the general model are usually marked with'AR'(action required) so as to differ from of market analysis, where all items are assumed to belong to one other ordinary mails. Moreover, those AR emails structure is in item set of transaction data, e g. X CT and y ct. In our recor uniform format: assigner. assignees, due time, tasks description, mender system, rules mining involves two different item sets, that and attachment. Through the APl of the enterprise 's email system, is, XCU and Y cK, corresponding to user context domain(U) we could capture the context information as to those temporary and knowledge context domain(K"). respectively

With the domain ontology as criterion, the knowledge resources and users’ requirements will be marked with the same ‘language’ that is also machine-understandable. Otherwise, some mistake or conflict (e.g. ‘gasoline’ vs. ‘petrol’) may emerge due to users’ differ￾ent habits for naming some knowledge. 4.2. Context elicitation Context elicitation is a process of deriving the values of context attributes. There are mainly three ways for context elicitation: form-filling, context detection, and context extraction. (1) Form-filling: In the form-filling way, contextual infor￾mation is acquired directly from the users’ input, e.g., user’s profile, roles, background, interest, location and etc. As to the contextual information of knowl￾edge resources, they are mainly input by authorized users, e.g. knowledge engi￾neers or the knowledge’s creators, and etc. (2) Context detection: The goal of context detection is to collect users’ dynamic contextual information. For example, the ‘time’ could be derived directly from the system time of users’ PC. The same with the ‘devices’ contextual information, it could also be captured directly from the system parameters of users’ PC. (3) Context extraction: The context extraction process may be more complex than above two, it could be utilized to capture ‘tasks’ contextual information of the user, which is very essential for the recommender system in this case. The main target of this system is oriented to office environments. The ‘tasks’ contextual information reflects a main demand of knowledge for office workers. Our system will extract ‘tasks’ contextual information from outside applications, e.g. project management system, and email system. 4.2.1. Context extraction from project management system Some important and formal projects’ schedule and information are maintained by some project management system. The enter￾prise in this case is using the ‘Microsoft Project Server’ as the pro￾ject management software. Through the PDS (Project Data Service) component, which is the API of ‘Microsoft Project Server’, our sys￾tem could capture the project data from the project management system. In fact, that captured information is the ‘tasks’ contextual information of the user, which mainly refers to: what tasks the user is taking on currently, what output the user should submit for the project, what the ongoing tasks’ descriptions are (it reflects the tasks’ requirements for knowledge). 4.2.2. Context extraction from email system Some informal or temporary tasks are triggered by email sys￾tem. For example, the leader assigned a temporary task to one member trough the email system. Those tasks assignment emails are usually marked with ‘AR’ (action required) so as to differ from other ordinary mails. Moreover, those AR emails’ structure is in uniform format: assigner, assignees, due time, tasks description, and attachment. Through the API of the enterprise’s email system, we could capture the context information as to those temporary but maybe still important tasks. The ‘tasks’ contextual information of the user, which mainly refers to: what temporary tasks the user is taking on currently, what the due time is, what the ongoing tasks’ descriptions are (it reflects the tasks’ requirements for knowledge). In all, context could be extracted through above two channels. So, when the system detected the current time from the user’s PC environment, the tasks’ context about the user will be extracted through above two processes. It should be mentioned that: tasks context information reflects users’ knowledge requirements about their ongoing tasks, which is the major basis for following recom￾mendation process. 5. Rules for knowledge recommendation 5.1. Rules in recommendation engine The knowledge is recommended according to the rules, which is set manually or mined from other sources. Those rules are impor￾tant configuration control parameters to adjust the recommender’s performance and functions, e.g. how many knowledge resources should be recommended, how much threshold value for similarity between knowledge and user’s requirements should be proper, and etc. The rules could be divided into three sorts: (1) Main rules: They are the initial criteria for recommendation engine to search for correlative knowledge resources from the repository. Based on main rules, system will gain a pre￾liminary list of knowledge. Main rules mostly concern the users’ context information in ‘tasks’, ‘interest’, and etc. (2) Constraint rules: There are constraints for some knowledge resources’ utilization. As to the users who are not qualified to use the knowledge for some reasons (e.g. background knowledge, or hardware capacity). Those rules are mainly utilized to filter above preliminary list of knowledge. (3) Newly-added rules: They are added by authorized users (e.g. knowledge engineers), or mined out from uses’ query log data. They act as the supplements for above main rules or constraint rules. The Table 1 illustrates some example of recommendation rules in the system. It should be mentioned that: the recommended knowledge could not always coincide with users’ requirements, there exists a ‘correlative values’ between users and knowledge. As to the ‘Sup￾ply(U.interest, 0.8)’ in above rule (R1), the ‘0.8’ is the ‘correlative values’. It means to recommend the knowledge according the users’ requirement descriptions ‘U.interest’ with the ‘correlative values’ higher than 0.8. If the value is omitted in Supply(), it means default value ‘100%’, which denotes completely coincident. 5.2. Rules mining based on query log Our recommender system has a knowledge query portal for users. The query histories data stored in query log DB could be uti￾lized to mining some recommendation rules by the means of data mining technologies. In fact, those rules mined out from query log data are the third sort of rule, ‘newly added rules’. Traditional rules mining ðX ) YÞ conforms to the general model of market analysis, where all items are assumed to belong to one item set of transaction data, e.g. X # T and Y # T. In our recom￾mender system, rules mining involves two different item sets, that is, X # U and Y # K , corresponding to user context domain ðU Þ and knowledge context domain ðK Þ, respectively. L. Zhen et al. / Expert Systems with Applications 37 (2010) 1703–1712 1707

L. Zhen et al. Expert Systems with Applications 37(2010)1703-1712 Some examples of the recommendation rules in the system. IF U time E T interval, THEN Supply (T domain, 0.6 Constraint run AND I THEN Alert( IF Sort=expert, AND K prerequisite=interview,, AND Ulocation K location THEN Alert(location confiict) IF Sort=software, AND K prerequisite=tele-service' AND Udevice K- prerequisite. hardware THEN medium )THEN Alert(diffict IF Evaluation include U remark.'irrelative'OR'relative but no need supplied again THEN Eliminate(k) Newly-added R8 IF U role='electronic engineer, U task=oil pump design'Th IF U time e Last 3 days in one month, THEN Supply (Templet of Monthly Report) Note: 1.u denotes one certain user, k denotes one certain knowledge resource, t denotes one certain task; 2. Supply O, Alter ( Eliminate O are built-in functions in The user context model can be described as a set of features or 6. Knowledge recommendation engine attributes, U=(u1, U2, .. M). each feature, uVi E[1, M]. may take on one of a finite set of options, U=(ui, ui,.,uin, J. That 6.1. The trigger for the engine is, u= :ulEu E Ui. where j=1,.,n, denotes the jth option of ui. One users context could be depicted by a vector of certain op- The recommendation engine is core module that delivers the tions of those features, for example, u;=ui4, Lil,... um3], where knowledge from repository to users who may need them. This rec- uia refers to the fourth option of feature ul, and uir refers to the ommendation process is unnecessary to run all the time; otherwise third option of last feature up it may cause information overload for users. The engine should be The knowledge context model can be described in the same way event driven. In this enterprise our recommendation engine is as above. It has a set of features or attributes, K=I 1, k2,..., kN, mainly triggered by users login action each feature, kViE [1, N, may take on one of a finite set of options, When users log in the recommender system after verifying the K={k…,K} user name and password the system will check whether the cur rent context is changed from the previous context. If there is no b In the query log data set, each user context indicates a particu- change in context from the previous time, the recommendation en- combination of these options, i. e. ;=[ulm: while, each knowl- gine is unnecessary to calculate again; otherwise, the engine will edge context indicates a particular combination of these options, be triggered to re the list of recommended knowledge i.e. K:=k; As a result, the general form of a rule in the mining according to the newly updated context and the recommendation rules As to the detail process, the following subsection will intro- module is given as the following duce: how to prepare the recommendation list based on the con- text and the aforementioned rules 6.2. The semantic matching for recommendation 1…E≤M∈{}N=1…,F≤Nand,s% and c% refer to As mentioned in previous sections, the recommended knowl the support and confidence levels for this rule, respectively They edge could not always coincide with users' requirements com are calculated based on the following pletely, there exists a 'correlative values' between users and knowledge. From the description of 'main rules, the process of count(1∧a2… A AB1AB2……ABF) searching correlative knowledge at the first stage is mainly based count(DB) (1) on users' context in'interest, 'tasks'and knowledge context indo- count(1Aa2… AOE AB1A2…ABF main. Those context attributes are described by a set of tuples count(x1Aa2…∧aE) (2) including keywords and its weight: ((ci, wi)lc EC, w, E W): Cis a set of pre-designed category concepts, and w is the set of weights where, count(x1∧a2…AEAB1A2…A月) is the number of or rating the categories. uery records in DB containing all context feature items 21, 22, . describe one certain knowledge's context domain Wm)I and e as well as B1, B,. and Br, count(DB)is the total number of data records contained in query log DB tuples ((c1, W1),., (c, w),...,(cn, Wn)) describe one A large number of efficient algorithms for mining rules have context domain. Then as to the 'correlative values between user and knowled vell-known algorithm, called Apriori algorithm to determine fre- could be calculated as following quent item sets. Once the frequent item sets are identified from DB.it is straightforward to generate strong rules from them. It Cv=HEwx Maxj=In(sim(c ci) should be mentioned that there is some little format differences between those rules from above data mining and the final forms of recommendation rules described in previous subsection. Th 1∑wxMx1-m(sm(c) rules need some transformation to become the latter ones emendation rules), which could be used by our recommen- However the main issue lies in how to determine the similari- engines in the system. ties between concepts, sim(Ci, c)in above formula

The user context model can be described as a set of features or attributes, U  fu1; u2; ... ; uMg, each feature, uij8i 2 ½1; M, may take on one of a finite set of options, U i  fu i1; u i2; ... ; u ini g. That is, ui ¼:: u ijj9u ij 2 U i , where j ¼ 1; ... ; ni, denotes the jth option of ui. One user’s context could be depicted by a vector of certain op￾tions of those features, for example, u s  u 14; u 21; ... ; u M3 , where u 14 refers to the fourth option of feature u1, and u M3 refers to the third option of last feature uM. The knowledge context model can be described in the same way as above. It has a set of features or attributes, K  fk1; k2; ... ; kNg, each feature, kij8i 2 ½1;N, may take on one of a finite set of options, K i  k i1; k i2; ... ; k ini n o. In the query log data set, each user context indicates a particu￾lar combination of these options, i.e. u s ¼ ½u ij M; while, each knowl￾edge context indicates a particular combination of these options, i.e. k s ¼ k ij h i N . As a result, the general form of a rule in the mining module is given as the following: a1 ^ a2 ^ ae ^ aE ) b1 ^ b2 ^ bf ^ bF [Support = s%; Confidence = c%], where, 9ae 2 u ij n oj8e ¼ 1; ... ; E 6 M; 9bf 2 k ij n oj8f ¼ 1; ... ; F 6 N; and, s% and c% refer to the support and confidence levels for this rule, respectively. They are calculated based on the following: s% ¼ countða1 ^ a2 ^ aE ^ b1 ^ b2 ^ bF Þ countðDBÞ ; ð1Þ c% ¼ countða1 ^ a2 ^ aE ^ b1 ^ b2 ^ bF Þ countða1 ^ a2 ^ aEÞ ; ð2Þ where, countða1 ^ a2 ^ aE ^ b1 ^ b2 ^ bF Þ is the number of query records in DB containing all context feature items a1; a2; ..., and aE as well as b1; b2; ..., and bF , count(DB) is the total number of data records contained in query log DB. A large number of efficient algorithms for mining rules have been proposed (Chen, Han, & Yu, 1996). Our system adopts a well-known algorithm, called Apriori algorithm to determine fre￾quent item sets. Once the frequent item sets are identified from DB, it is straightforward to generate strong rules from them. It should be mentioned that there is some little format differences between those rules from above data mining and the final forms of recommendation rules described in previous subsection. The formal rules need some transformation to become the latter ones (recommendation rules), which could be used by our recommen￾dation engines in the system. 6. Knowledge recommendation engine 6.1. The trigger for the engine The recommendation engine is core module that delivers the knowledge from repository to users who may need them. This rec￾ommendation process is unnecessary to run all the time; otherwise it may cause information overload for users. The engine should be event driven. In this enterprise, our recommendation engine is mainly triggered by user’s login action. When users log in the recommender system after verifying the user name and password, the system will check whether the cur￾rent context is changed from the previous context. If there is no change in context from the previous time, the recommendation en￾gine is unnecessary to calculate again; otherwise, the engine will be triggered to prepare the list of recommended knowledge according to the newly updated context and the recommendation rules. As to the detail process, the following subsection will intro￾duce: how to prepare the recommendation list based on the con￾text and the aforementioned rules. 6.2. The semantic matching for recommendation As mentioned in previous sections, the recommended knowl￾edge could not always coincide with users’ requirements com￾pletely, there exists a ‘correlative values’ between users and knowledge. From the description of ‘main rules’, the process of searching correlative knowledge at the first stage is mainly based on users’ context in ‘interest’, ‘tasks’ and knowledge context in ‘do￾main’. Those context attributes are described by a set of tuples including keywords and its weight: fhci; wiijci 2 C; wi 2 Wg; C is a set of pre-designed category concepts, and W is the set of weights for rating the categories. For example, the set of tuples fhc1; w1i; ... ;hci; wii; ... ;hcm; wmig describe one certain knowledge’s context domain; while, the set of tuples fhc1; w1i; ... ;hcj; wji; ... ;hcn; wnig describe one certain user’s context domain. Then as to the ‘correlative values’ between user and knowledge could be calculated as following: CV ¼ 1 2  1 m Xm i¼1 wi  Maxj¼1;...;nðsimðci; cjÞÞ " þ 1 n Xn j¼1 wj  Maxi¼1;...;mðsimðcj; ciÞÞ# ð3Þ However, the main issue lies in how to determine the similari￾ties between concepts, simðci; cjÞ in above formula. Table 1 Some examples of the recommendation rules in the system. Sorts ID Rules Main R1 IF U.interest exist, THEN Supply(U.interest, 0.8) R2 IF U.time 2 T.interval, THEN Supply(T.domain, 0.6) Constraint R3 IF K.sort=‘software’, AND K.prerequisite=‘local run’, AND U.location – K.location THEN Alert(location conflict) R4 IF K.sort=‘expert’, AND K.prerequisite=‘interview’, AND U.location – K.location THEN Alert(location conflict) R5 IF K.sort=‘software’, AND K.prerequisite=‘tele-service’, AND U.device < K.prerequisite.hardware THEN Alert(device lower) R6 IF K.sort=‘software’, AND K.prerequisite=‘tele-service’, AND (U.backgound.compter < medium, OR U.English < medium ) THEN Alert(difficult) R7 IF K.evaluation include U.remark.‘irrelative’ OR ‘relative but no need supplied again’ THEN Eliminate(K) Newly-added R8 IF U.role=‘electronic engineer’, U.task=‘oil pump design’ THEN Supply(‘electromagnetic valve’) R9 IF U.time 2 Last 3 days in one month, THEN Supply(‘Templet of Monthly Report’) R10 – Note: 1. U denotes one certain user, K denotes one certain knowledge resource, T denotes one certain task; 2. Supply (), Alter (), Eliminate () are built-in functions in recommender system. 1708 L. Zhen et al. / Expert Systems with Applications 37 (2010) 1703–1712

L Zhen et aL/ Expert Systems with Applications 37(2010)1703-1712 Our system utilized a semantic matching approach that enables Definition 3( Concept Semantic Similarity(CSS). Suppose Ci and C will be much better than pure keywords matching search so it the two concepts, the "Concept Semantic Similarit two concepts to be matched with a similarity degree of [0, 1 ] This ty' is defined as method is based on the semantic relations aximum of similarity latent values of all the n paths between them. That is. Definition 1 (Relation similarity coefficient(RSC)). In the ontology there are semantic relationships between concepts. Different CSS(Ci, Ci)= max[FNumk(C1, Cn)I semantic relationships reflect different similarities between con cepts. They are measured by 'Relation Similarity Coefficient'(RSC). hich is between 0 and 1. Table 2 lists some example about Here, n is the number of paths between them. If there is no semantic relationships between concepts and their rScs ir CSS is o The values assigned for RSCs could be adjusted according to As to the example of in Fig 3, we could calculate their specific domain by authorized users(e.g. knowledge engineers). In mantic Similarity, for example: the Table 2, the RSC of ' isa' is higher than 'isa because child CSS(TransmissionShaft, 'Crankshaft)=0.9 0.9x 0.4=0.324 nodes inherit all attributes of father node while father node may not involve all attributes of child nodes. so when search for the father concepts, the knowledge about child concepts could be recommended to users 6.3. The built-in workflow in engine Based on above definition, an example of ontology about concept'shaft' is illustrated in Fig 3. The semantic re The input of recommendation engine is the context and recom- and RSCs are also involved in the ontology. mendation rules; the output is the list of recommended knowl- edge. The main process is shown as following: Definition 2( Concept semantic path(CSP)). Suppose C1, .. Cn are oncepts, Ri,..., Rm are semantic relationships: From CI to Cn Input: Recommendation rules: RM(main rules), Rc(constraint there is a semantic path, that is: ERS=(RI, .. Rm, the set of RSCs rules)and Rw(newly added rules ); Context: Cu(user context) is ps=(p,,.,Pm). between G and Cn: CiR1.. Rm Cn, which Ck(knowledge context) is named with 'Concept Semantic Path, denoted by CSP(C1. Cn) Output: The list of recommended knowledge: List; The product of the RSCs of all semantic relationships on the path is defined as 'similarity latent value of path, denoted by (1) Search the relevant knowledge according the Rm(main FNum(, Cn)=I-p rule): generate stage output, List. Sort the List accord- ing to thecorrelative values between users and kno Table 2 (2)Search the relevant knowledge according the rw(newly Relationship similarity coefficient. dded rule): generate stage output, List2. Sort the List2 according to thesupport and 'confid levels of the rule(s%, c% in formulas 1-2), which is the basis for rec- truck -isa, automobile ommending the knowledge item in the list utomobile -isa1 truck (3)Filter List, and List according to Rc: generate final out put, List; this step will utilize the Cu and CK in con- straints'calculations. As to the knowledge that is not meeting the Rc, mark an alert information to that action object drive -action object-car Shaft Revolvin 9 Shaft RSC= /sa C=01 Cran Shaft RSC=0. 4 Shaft RSC Wor ransi Fig 3. Part of ontology about shaft

Our system utilized a semantic matching approach that enables two concepts to be matched with a similarity degree of [0,1]. This method is based on the semantic relations among ontology, so it will be much better than pure keywords matching search. Definition 1 (Relation similarity coefficient (RSC)). In the ontology, there are semantic relationships between concepts. Different semantic relationships reflect different similarities between con￾cepts. They are measured by ‘Relation Similarity Coefficient’ (RSC), which is between 0 and 1. Table 2 lists some example about semantic relationships between concepts and their RSCs: The values assigned for RSCs could be adjusted according to specific domain by authorized users (e.g. knowledge engineers). In the Table 2, the RSC of ‘isa’ is higher than ‘isa1 ’, because child nodes inherit all attributes of father node, while father node may not involve all attributes of child nodes. So when search for the father concepts, the knowledge about child concepts could be recommended to users. Based on above definition, an example of ontology about concept ‘shaft’ is illustrated in Fig. 3. The semantic relationships and RSCs are also involved in the ontology. Definition 2 (Concept semantic path (CSP)). Suppose C1; ... ; Cn are concepts, R1; ... ; Rm are semantic relationships; From C1 to Cn, there is a semantic path, that is: 9RS ¼ fR1; ... ; Rmg, the set of RSCs is qS ¼ fq1; ... ; qmg, between C1 and Cn : C1R1C2R2 ... RmCn, which is named with ‘Concept Semantic Path’, denoted by CSPðC1; CnÞ. The product of the RSCs of all semantic relationships on the path is defined as ‘similarity latent value of path’, denoted by FNumðC1; CnÞ ¼ Qm i¼1qi . Definition 3 (Concept Semantic Similarity (CSS)). Suppose Ci and Cj are two concepts, the ‘Concept Semantic Similarity’ is defined as the maximum of similarity latent values of all the n paths between them. That is: CSSðCi; CjÞ ¼ max k¼1;...;n ½FNumkðC1; CnÞ Here, n is the number of semantic paths between them. If there is no path between two concepts, their CSS is 0. As to the example of concepts in Fig. 3, we could calculate their Semantic Similarity, for example: CSSð‘TransmissionShaft0 ; ‘Crankshaft0 Þ ¼ 0:9  0:9  0:4 ¼ 0:324: 6.3. The built-in workflow in engine The input of recommendation engine is the context and recom￾mendation rules; the output is the list of recommended knowl￾edge. The main process is shown as following: Input: Recommendation rules: RM (main rules), RC (constraint rules) and RN (newly added rules); Context: CU (user context), CK (knowledge context); Output: The list of recommended knowledge: List; Steps: (1) Search the relevant knowledge according the RM (main rule); generate stage output, List1. Sort the List1 accord￾ing to the ‘correlative values’ between users and knowl￾edge, derived by semantic matching algorithm. (2) Search the relevant knowledge according the RN (newly added rule); generate stage output, List2. Sort the List2 according to the ‘support’ and ‘confidence’ levels of the rule (s%, c% in formulas 1-2), which is the basis for rec￾ommending the knowledge item in the List2. (3) Filter List1 and List2 according to RC; generate final out￾put, List; this step will utilize the CU and CK in con￾straints’ calculations. As to the knowledge that is not meeting the RC , mark an alert information to that knowledge. Table 2 Relationship similarity coefficient. Relationship RSC Examples same as 1 PC -same as ? computer isa 0.9 truck -isa ? automobile isa1 0.4 automobile -isa1 ? truck part of 0.7 CPU -part of ? PC partof 1 0.3 PC -partof 1 ? CPU – – action object 0.1 drive -action object ? car – – Fig. 3. Part of ontology about ‘shaft’. L. Zhen et al. / Expert Systems with Applications 37 (2010) 1703–1712 1709

L Zhen et aL. / Expert Systems with Applications 37(2010)1703-1712 KM Platform V2.0 Knowledge Recommender System Lzhen Log out Result List of the Recom mended Knouledge Resources 20080701 The Recommended Knowledge Lists Newly Acquired Knowledge Resources cording to Main Rules (3) Query ( Portal Pressure equalizer of compressor of air conditioner essor control system for vehicle air condition ly knowledge Apparatus for driving a compressor and a refrigerating air conditioner Horizontal rotary compressor in a bus air conditioner Outdated Knowledge ever Browsed Befor Recom mended List Variable capacity compressor having a capacity control system using an electromagnetic valve The plat form of thermodynamics simulation for compressor in air conditioner aLert device capacity is low Local Repository Knowledge ID: P-0203233201 Domain Link Knowlege Context Information Creator. fcDevece ne Noy Return back Rules Configuration Evaluation: relative but no need supplied again Engineering SSB Corporation (4)Divide the final list into two sorts: 'newly acquired'and rules As to the first part, they are sorted according to the ' correl- already read before, according to the information in Ck ative values'between users and knowledge as to the second part, hey are sorted according to the'support'and'confidence levels of There are two points should be mentioned for above flow: In the bottom of list shown in Fig 4, one knowledge resour sers and knowledge in step (1). it is one of core algorithms in list out with alert information That knowledge resource ( The plat the recommendation engine, which is introduced in previou subsection in detail tioner,)is a software which need the device with more than 2 GB CPU and 2 GB Ram, which has exceed the user's PC capaci Secondly, the newly added rules are mainly derived by rules So the knowledge item is marked with alert information'device mining from users' knowledge query log, and there are two dexes for measuring the support'and'confidence'levels of capacity is lower' hose rules(mentioned in Section 5.2). According to those newly added rules, some knowledge will be recommended. The knowl- 7. Discussion edge derived by the rules with higher'support' confidence levels, will be sorted at the much anterior part in list. The knowledge recommender system promotes the knowledge The Fig 4 illustrates the system,s interface of recommendation ates the speed of knowledge flow among the vers. It also acsee p lists for users. The newly acquired knowledge resources, which the working efficiency and effectiveness of knowledge workers in means the user have not read before, are list in above part. The bot- the enterprise. The benefits are list as follow tom part of the list is the knowledge that ever browsed by the user fore, which is named as the 'outdated knowledge. Those knowl-. The implementation of the knowledge recommender system ge resources have been read by the user, while the user is willing saves a lot of time and energy for users to seek knowledge. to read them again. In previous Section 4. 1, we have mentioned The system could capture users' context(current tasks, scenar- that the 'evaluationin each knowledge resource's context kept ios and etc. )and find some potentially useful knowledge so as its historical evaluations by the user. Some knowledge resources to recommend to users. It could also avoid the knowledge are assigned with the ' relative and supplied again evaluation from searching with ambiguous targets, sometimes even without the user; then those 'old knowledge will also be recommended clear and specific targets. again in the list. By using the knowledge recommender system. users could In the Fig 4, the newly acquired knowledge is divided into two rowse much more knowledge resources related to their work. orts:'according to main rules' and according to newly added So it promotes the productivity of knowledge workers obviously

(4) Divide the final list into two sorts: ‘newly acquired’ and ‘already read before’, according to the information in CK evaluation; There are two points should be mentioned for above flow: Firstly, as to how to determine the ‘correlative values’ between users and knowledge in step (1), it is one of core algorithms in the recommendation engine, which is introduced in previous subsection in detail. Secondly, the newly added rules are mainly derived by rules mining from users’ knowledge query log, and there are two indexes for measuring the ‘support’ and ‘confidence’ levels of those rules (mentioned in Section 5.2). According to those newly added rules, some knowledge will be recommended. The knowl￾edge derived by the rules with higher ‘support’ and ‘confidence’ levels, will be sorted at the much anterior part in list. The Fig. 4 illustrates the system’s interface of recommendation lists for users. The newly acquired knowledge resources, which means the user have not read before, are list in above part. The bot￾tom part of the list is the knowledge that ever browsed by the user before, which is named as the ‘outdated knowledge’. Those knowl￾edge resources have been read by the user, while the user is willing to read them again. In previous Section 4.1, we have mentioned that the ‘evaluation’ in each knowledge resource’s context kept its historical evaluations by the user. Some knowledge resources are assigned with the ‘relative and supplied again’ evaluation from the user; then those ‘old’ knowledge will also be recommended again in the list. In the Fig. 4, the newly acquired knowledge is divided into two sorts: ‘according to main rules’ and ‘according to newly added rules’. As to the first part, they are sorted according to the ‘correl￾ative values’ between users and knowledge. As to the second part, they are sorted according to the ‘support’ and ‘confidence’ levels of the rule. In the bottom of list shown in Fig. 4, one knowledge resources that meet the main rules but not meet the constraint rules are also list out with alert information. That knowledge resource (‘The plat￾form of thermodynamics simulation for compressor in air condi￾tioner’) is a software, which need the device with more than 2 GB CPU and 2 GB Ram, which has exceed the user’s PC capacity. So the knowledge item is marked with alert information ‘device capacity is lower’. 7. Discussion The knowledge recommender system promotes the knowledge sharing and reuse among the knowledge workers. It also acceler￾ates the speed of knowledge flow among the users and enhanced the working efficiency and effectiveness of knowledge workers in the enterprise. The benefits are list as follow: The implementation of the knowledge recommender system saves a lot of time and energy for users to seek knowledge. The system could capture users’ context (current tasks, scenar￾ios and etc.) and find some potentially useful knowledge so as to recommend to users. It could also avoid the knowledge searching with ambiguous targets, sometimes even without clear and specific targets. By using the knowledge recommender system, users could browse much more knowledge resources related to their work. So it promotes the productivity of knowledge workers obviously. Fig. 4. The recommendation list. 1710 L. Zhen et al. / Expert Systems with Applications 37 (2010) 1703–1712

1711 The knowledge recommender system could not only supply 8. Conclusion owledge to users but also stimulate users'innovative think ing by the hints from the recommended knowledge. It should Most recent researches about the recommender systems main be admitted that: the recommended knowledge sometimes concerned the recommendation algorithms, or recommenders for may not coincide with users'requirements completely How- general situations in daily lives(e. g. recommend movies, books ever, those seeming irrelevant knowledge resources could give music, news, etc. ) but seldom cover the recommendation scenar users some hints or inspirations to link some ideas in other ios for office workers in enterprise. This paper mainly introduces the model of an inner-enterprise re ender system. This paper The system could be customized by different users due to its presents the system design as well as some key technologies anal- flexibility. Users could adjust the configuration of the system ysis(context model, rule base, and recommendation engine). by adding, removing rules or changing some parameters of the However, there exist some limitations for the current system rules. As to the busy users, higher threshold value is set so as and method to fewer but with higher correlative knowledge could be recom lended to them. it has avoided information overload for differ (1) The scope of the knowledge sharing is currently limited in ent users, also made the system accepted and used by more er-enterprise. After all, one enterprise's inside knowledge users in the enterprise esources are narrow to some extent, which is not benefit for The implementation of the knowledge recommender system knowledge sharing and technology innovation. The scope of improves the collaboration among distributed engineers and the knowledge recommendation should be extended to a experts. Experts are taken into account as one sort of knowledge much wider range. resource in the enterprise. The knowledge recommendation pro-(2)The users' context information is a little simple to cess makes best of those experts resources. Some engineers in extent. The channel to capturing the users'context her sites, who may be unknown to the knowledge seeke narrow. Without richer context information to reflect could be recommended to the users through the recommender mands for knowledge, the recommender system The knowledge works'enthusiasm of knowledge sharing could be stimulated by implementing the recommender system. Users could upload their own newly obtained knowledge to the repos In the future work, we will extent the knowledge sharing and itory, from which they could be supplied to other users. Other recommendation to a much wider span, for example, ally with un users'evaluation after browsing knowledge, acted as a quant- versities, institutes and other outside knowledge repositories. The itive criterion for knowledge contribution, which could be current knowledge recommender system will turn out to be'inter- linked to employees performance assessment. make an exploratory research about the context capturing from Preconditions for implementing knowledge recommender sys- more sources and channels. Then, more abundant context could m are listed as fol be utilized for knowledge demands awareness, so as to make the telligent and auton A strong KM foundation is the precondition for implementing the knowledge recommender systems. The KM foundation Acknowledgements ainly concerns that: a well organized knowledge repository with large volume of knowledge resources should already exist This work is also partially supported by the 973/National Basic in the enterprise. Without a normative management of knowl- Research Program(2003CB317005) edge as the basis, the recommender system, as an advanced KM tool, will not be suitable to be implemented References a professional KM team or department including knowledge gineers should be established for some maintenance care Adomavicius, G& Tuzhilin, A.(2005). Toward the next generation of recommender work, which includes: enriching knowledge resources i the repository all the time, maintaining the context informa- Alavi, M. Leidner, D. E(2001). Knowledge management and knowledge on for the knowledge and the recommendation rules, management onceptual foundations and research chich are the necessary basis for the knowledge recom- Artail. H. A(2006). Application of KM measures to the impact of a specialized A strong support from the top management is the prerequi- ermen,43(4)551-564. site for implementing the knowledge recommender systems. Bradley. J. H- Paul, R,& Seeman, E(2006). Analyzing the structure of expert The executive officers of the enterprise should give necessary Canny. ].(2002) Collaborative filtering with privacy. In Proceedings of the IEEE deploy the system development. With the support and che mo. Han o n e ach i csie o priva (pp- esources and chances to acquire demands for design ar A overview from Foner, L N(2003). Political artifacts and personal privacy: The 8(6). ions on Knowledge g de s ipate into the active knowledge sharing and recommendation ted matchmaking system. Ph.D. thesis, Massachusetts In A well foundation of OA information systems will promote Goldberg, D, Nichols, D, Oki, B M,& Terry, D (1992) Using collaborative filt the intelligent level of the knowledge recommender system. Gold. A M a notra. A. a spears. A H (20010 kno wedge man gement More OA information systems could supply more context 1) ibilities perspective. Jourmal of Management Informat information for the recommender to capturing. With more users'context, working scenario, and environment informa- Han, P. Xie, B, Yang F& Shen, R(2004). A scalable P2P recommender system tion gained, the knowledge recommender system could be more aware to users' current demands for knowledge, which King. w R,& Lekse w.J. ving managerial benefit from knowledge could make the recommendation much more accurate and King. W R, Marks, P v nt43(7).874-88 (2002). The most important issues in ntelligent nowledge management cations of the ACM, 45(9), 93-9

The knowledge recommender system could not only supply knowledge to users but also stimulate users’ innovative think￾ing by the hints from the recommended knowledge. It should be admitted that: the recommended knowledge sometimes may not coincide with users’ requirements completely. How￾ever, those seeming ‘irrelevant’ knowledge resources could give users some hints or inspirations to link some ideas in other disciplines. The system could be customized by different users due to its flexibility. Users could adjust the configuration of the system by adding, removing rules or changing some parameters of the rules. As to the busy users, higher threshold value is set so as to fewer but with higher correlative knowledge could be recom￾mended to them. It has avoided information overload for differ￾ent users, also made the system accepted and used by more users in the enterprise. The implementation of the knowledge recommender system improves the collaboration among distributed engineers and experts. Experts are taken into account as one sort of knowledge resource in the enterprise. The knowledge recommendation pro￾cess makes best of those experts resources. Some engineers in other sites, who may be unknown to the knowledge seeker, could be recommended to the users through the recommender system. The knowledge works’ enthusiasm of knowledge sharing could be stimulated by implementing the recommender system. Users could upload their own newly obtained knowledge to the repos￾itory, from which they could be supplied to other users. Other users’ evaluation after browsing knowledge, acted as a quant￾itive criterion for ‘knowledge contribution’, which could be linked to employees’ performance assessment. Preconditions for implementing knowledge recommender sys￾tem are listed as follows: A strong KM foundation is the precondition for implementing the knowledge recommender systems. The KM foundation mainly concerns that: a well organized knowledge repository with large volume of knowledge resources should already exist in the enterprise. Without a normative management of knowl￾edge as the basis, the recommender system, as an advanced KM tool, will not be suitable to be implemented. A professional KM team or department including knowledge engineers should be established for some maintenance care work, which includes: enriching knowledge resources in the repository all the time, maintaining the context informa￾tion for the knowledge and the recommendation rules, which are the necessary basis for the knowledge recom￾mender system. A strong support from the top management is the prerequi￾site for implementing the knowledge recommender systems. The executive officers of the enterprise should give necessary resources and chances to acquire demands for design and deploy the system development. With the support and encourage from the top management, employees could partic￾ipate into the active knowledge sharing and recommendation process. A well foundation of OA information systems will promote the intelligent level of the knowledge recommender system. More OA information systems could supply more context information for the recommender to capturing. With more users’ context, working scenario, and environment informa￾tion gained, the knowledge recommender system could be more ‘aware’ to users’ current demands for knowledge, which could make the recommendation much more accurate and intelligent. 8. Conclusion Most recent researches about the recommender systems mainly concerned the recommendation algorithms, or recommenders for general situations in daily lives (e.g. recommend movies, books, music, news, etc.), but seldom cover the recommendation scenar￾ios for office workers in enterprise. This paper mainly introduces the model of an inner-enterprise recommender system. This paper presents the system design as well as some key technologies anal￾ysis (context model, rule base, and recommendation engine). However, there exist some limitations for the current system and methods: (1) The scope of the knowledge sharing is currently limited in inner-enterprise. After all, one enterprise’s inside knowledge resources are narrow to some extent, which is not benefit for knowledge sharing and technology innovation. The scope of the knowledge recommendation should be extended to a much wider range. (2) The users’ context information is a little simple to some extent. The channel to capturing the users’ context is too narrow. Without richer context information to reflect uses’ demands for knowledge, the recommender system could not be more intelligent. In the future work, we will extent the knowledge sharing and recommendation to a much wider span, for example, ally with uni￾versities, institutes and other outside knowledge repositories. The current knowledge recommender system will turn out to be ‘inter￾organization’ rather than ‘inner-organization’. In addition, we will make an exploratory research about the context capturing from more sources and channels. Then, more abundant context could be utilized for knowledge demands awareness, so as to make the recommendation much more intelligent and automatic. Acknowledgements This work is also partially supported by the 973/National Basic Research Program (2003CB317005). References Adomavicius, G., & Tuzhilin, A. (2005). Toward the next generation of recommender systems: A survey of the state of the art and possible extensions. IEEE Transactions on Knowledge & Data Engineering, 17(6), 734–749. Alavi, M., & Leidner, D. E. (2001). Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 25(1), 107–136. Artail, H. A. (2006). Application of KM measures to the impact of a specialized groupware system on corporate productivity and operations. Information & Management, 43(4), 551–564. Bradley, J. H., Paul, R., & Seeman, E. (2006). Analyzing the structure of expert knowledge. Information & Management, 43(1), 77–91. Canny, J. (2002). Collaborative filtering with privacy. In Proceedings of the IEEE symposium on research in security and privacy (pp. 45–57). Chen, M., Han, J., & Yu, P. (1996). Data mining: A overview from database perspective. IEEE Transactions on Knowledge & Data Engineering, 8(6), 866–883. Foner, L. N. (2003). Political artifacts and personal privacy: The Yenta multi-agent distributed matchmaking system. Ph.D. thesis, Massachusetts Institute of Technology. Goldberg, D., Nichols, D., Oki, B. M., & Terry, D. (1992). Using collaborative filtering to weave an information apestry. Communications of the ACM, 35, 12–13. Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge management: An organizational capabilities perspective. Journal of Management Information Systems, 18(1), 185–214. Han, P., Xie, B., Yang, F., & Shen, R. (2004). A scalable P2P recommender system based on distributed collaborative filtering. Expert Systems with Applications, 27, 203–210. King, W. R., & Lekse, W. J. (2006). Deriving managerial benefit from knowledge search: A paradigm shift? Information & Management, 43(7), 874–883. King, W. R., Marks, P. V., & McCoy, S. (2002). The most important issues in knowledge management. Communications of the ACM, 45(9), 93–97. L. Zhen et al. / Expert Systems with Applications 37 (2010) 1703–1712 1711

L. Zhen et aL/ Expert Systems with Applications 37(2010)1703-1712 Ko, D L, Kirsch, LJ,& King. W.R. (2005) Antecedents of ge transfer from Olsson, T (2003) Bootstrapping and decentralizing recommender system. Ph. D thesis, consultants to clients in enterprise system impler hnology, Uppsala University. B, Maltz, D Herlocker, J-, Gordon, L,& EEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Ar. g collaborative filtering to usenet news. Comm Reviews.32(4).282-29 Schafer, ]. B, Konstan. ),& Ried, J. (1999). Recommender systems in E-commerce. In Kotlarsky, J, van Fenema, P C.& willcocks, L P (2008). Developing a knowledge of Ist ACM conference on electronic commerce, Denver, Colorado, t,45(2)96-108 Yeong, B. C, Yoon, H. C.& Soung, H K (2005). Mining changes in customer buying mi,A R,& Yuan, Y(2006) Agent-based buddy-finding methodology behavior for collaborative recommendations. Expert Systems with Applications, for knowledge sharing Information E Management, 43(3). 283-296. Lin, L, Geng.X,& whinston, A B.(2005). A sender-receiver framework for Yong. S K Yum, B], Song, J& Su, M. K(2005). Development of a recommender owledge transfer MIS Quarterly, 29(2). 129-197 Lin, C, Yen, D. C.& Tarn, D. C(2007)An industry-level kn commerce sites. Expert Systems wit a study of information-related industry in Taiwan. Information 8 y, D Gopalkrishnan, P, Lam, S K, Rashid, A M, et al Zhen, L,& Jiang, Z(2008a). Knowledge grid based knowledge supply model IEICE ansactions on Information and Systems, E91(4). 1082-1090. Zhen, L,& Jiang Z(2008b). Innovation text categorization. In Proceedings of the ACM international conference Zhen, L Jiang, Z, Song. Nevo. D titution of Mechanical Engineers, Part B, Journal of Engineering Manufacture, gement,4(6).583-597 Nonaka, L(1994). A dynamic theory of organizational knowledge creation. Zhuge, H(2003). Workflow and agent-based cognitive flow management Organization Science, 5(1). 14-37 distributed team cooperation. Information 8 Management, 40(5)419-429

Ko, D. I., Kirsch, L. J., & King, W. R. (2005). Antecedents of knowledge transfer from consultants to clients in enterprise system implementation. MIS Quarterly, 29(1), 59–85. Konstan, J., Miller, B., Maltz, D., Herlocker, J., Gordon, L., & Riedl, J. (1997). GroupLens: Applying collaborative filtering to usenet news. Communications of the ACM, 40(3), 77–87. Kotlarsky, J., van Fenema, P. C., & Willcocks, L. P. (2008). Developing a knowledge￾based perspective on coordination: The case of global software projects. Information & Management, 45(2), 96–108. Li, X., Montazemi, A. R., & Yuan, Y. (2006). Agent-based buddy-finding methodology for knowledge sharing. Information & Management, 43(3), 283–296. Lin, L., Geng, X., & Whinston, A. B. (2005). A sender–receiver framework for knowledge transfer. MIS Quarterly, 29(2), 129–197. Lin, C., Yen, D. C., & Tarn, D. C. (2007). An industry-level knowledge management model—a study of information-related industry in Taiwan. Information & Management, 44(1), 22–39. McNee, S. M., Albert, I., Cosley, D., Gopalkrishnan, P., Lam, S. K., & Rashid, A. M., et al. (2000). On the recommending of citations for research papers. In Proceedings of CSCW 2002, New Orleans, USA (pp. 116–125). Mooney, R. J., & Roy, L. (2000). Content-based book recommending using learning for text categorization. In Proceedings of the ACM international conference on digital libraries, San Antonia, Texas, USA (pp. 195–204). Nevo, D., & Chan, Y. E. (2007). A Delphi study of knowledge management systems: Scope and requirements. Information & Management, 44(6), 583–597. Nonaka, I. (1994). A dynamic theory of organizational knowledge creation. Organization Science, 5(1), 14–37. Olsson, T. (2003). Bootstrapping and decentralizing recommender system. Ph.D. thesis, Department of Information Technology, Uppsala University. Rouse, W. B. (2002). Need to know-information, knowledge, and decision making. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 32(4), 282–292. Schafer, J. B., Konstan, J., & Riedl, J. (1999). Recommender systems in E-commerce. In Proceedings of 1st ACM conference on electronic commerce, Denver, Colorado, USA (pp. 158–166). Yeong, B. C., Yoon, H. C., & Soung, H. K. (2005). Mining changes in customer buying behavior for collaborative recommendations. Expert Systems with Applications, 28, 359–369. Yong, S. K., Yum, B. J., Song, J., & Su, M. K. (2005). Development of a recommender system based on navigational and behavioral patterns of customers in e￾commerce sites. Expert Systems with Applications, 28, 381–393. Zhen, L., Huang, G. Q., & Jiang, Z. (2009). Collaborative filtering based on workflow space. Expert Systems with Applications, 36(4), 7873–7881. Zhen, L., & Jiang, Z. (2008a). Knowledge grid based knowledge supply model. IEICE Transactions on Information and Systems, E91(4), 1082–1090. Zhen, L., & Jiang, Z. (2008b). Innovation-oriented knowledge query in knowledge grid. Journal of Information Science and Engineering, 24(2), 601–613. Zhen, L., Jiang, Z., Song, H., Liu, C., & Liang, J. (2008). Information supply: An approach based on demand modeling and information filtering. Proceedings of the Institution of Mechanical Engineers, Part B, Journal of Engineering Manufacture, 222(4), 541–557. Zhuge, H. (2003). Workflow and agent-based cognitive flow management for distributed team cooperation. Information & Management, 40(5), 419–429. 1712 L. Zhen et al. / Expert Systems with Applications 37 (2010) 1703–1712

点击下载完整版文档(PDF)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
已到末页,全文结束
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有