{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:34:20Z","timestamp":1757309660592},"edition-number":"1","reference-count":62,"publisher":"Wiley","isbn-type":[{"type":"print","value":"9780471383932"},{"type":"electronic","value":"9780470050118"}],"license":[{"start":{"date-parts":[[2008,9,15]],"date-time":"2008-09-15T00:00:00Z","timestamp":1221436800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Web intelligence (WI) has been recognized as a new direction for scientific research and development to explore the fundamental roles as well as practical impacts of artificial intelligence (AI) and advanced information technology (IT) on the next generation of Web\u2010empowered products, systems, services, and activites. This article gives an introduction to the WI research and development and investigates various ways to study WI and potential applications.<\/jats:p>","DOI":"10.1002\/9780470050118.ecse465","type":"other","created":{"date-parts":[[2008,1,15]],"date-time":"2008-01-15T14:46:25Z","timestamp":1200408385000},"page":"1-11","source":"Crossref","is-referenced-by-count":12,"title":["Web Intelligence (<scp>WI<\/scp>)"],"prefix":"10.1002","author":[{"given":"Ning","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Jiming","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yiyu","family":"Yao","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,9,15]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_9_2_1_1","DOI":"10.1023\/A:1020945620934"},{"unstructured":"J.Liu Web intelligence (WI): what makes wisdom web?Proc. 18thInternational Joint Conference on Artificial Intelligence (IJCAI\u201003) 2003 pp.1596\u20131601.","key":"e_1_2_9_2_2_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_3_1","DOI":"10.1007\/978-3-540-39592-8_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_4_1","DOI":"10.1007\/3-540-45490-X_1"},{"unstructured":"N.Zhong J.Liu Y. Y.Yao andS.Ohsuga Web intelligence (WI) Proc. 24th IEEE Computer Society International Computer Software and Applications Conference (COMPSAC 2000) Piscataway NJ:IEEE Computer Society Press 2000 pp.469\u2013470.","key":"e_1_2_9_2_5_1"},{"key":"e_1_2_9_2_6_1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45490-X","volume-title":"Web Intelligence: Research and Development","author":"Zhong N.","year":"2001"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_7_1","DOI":"10.1109\/MC.2002.1046970"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_8_1","DOI":"10.1007\/978-3-662-05320-1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_9_1","DOI":"10.1145\/1226736.1226741"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_10_1","DOI":"10.1145\/846183.846188"},{"volume-title":"Data Warehousing and Business Intelligence for e\u2010Commerce","year":"2001","author":"Simon A. R.","key":"e_1_2_9_2_11_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_12_1","DOI":"10.1142\/S0218001402002180"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_13_1","DOI":"10.1007\/3-540-44831-4_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_14_1","DOI":"10.1145\/360402.360406"},{"key":"e_1_2_9_2_15_1","first-page":"172","volume-title":"Web Intelligence","author":"Lu Z.","year":"2003"},{"volume-title":"Web Farming for the Data Warehouse","year":"2000","author":"Hackathorn R. D.","key":"e_1_2_9_2_16_1"},{"volume-title":"Webster's Revised Unabridged Dictionary","year":"1913","author":"Porter N.","key":"e_1_2_9_2_17_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_18_1","DOI":"10.1007\/978-3-662-05320-1_2"},{"issue":"4","key":"e_1_2_9_2_19_1","article-title":"Characterizing web usage regularities with information foraging agents","volume":"16","author":"Liu J.","year":"2004","journal-title":"IEEE Trans. Know. Data Engin."},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_20_1","DOI":"10.1038\/scientificamerican0501-34"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_21_1","DOI":"10.1109\/4236.989007"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_22_1","DOI":"10.1145\/268092.268108"},{"volume-title":"The Intelligent Wireless Web","year":"2002","author":"Alesso H. P.","key":"e_1_2_9_2_23_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_24_1","DOI":"10.1145\/506218.506240"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_25_1","DOI":"10.1109\/MC.2002.1046972"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_26_1","DOI":"10.1142\/9789812811844"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_27_1","DOI":"10.1145\/384150.384156"},{"issue":"6","key":"e_1_2_9_2_28_1","first-page":"235","article-title":"Knowledge discovery and data mining","volume":"27","author":"Zhong N.","year":"2001","journal-title":"The Encyclopedia of Microcomputers"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_29_1","DOI":"10.1109\/4236.895018"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_30_1","DOI":"10.1007\/978-3-662-04396-7"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_31_1","DOI":"10.1109\/TKDE.2006.1599392"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_32_1","DOI":"10.1109\/5254.920602"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_33_1","DOI":"10.1109\/MC.2002.1046976"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_34_1","DOI":"10.1142\/S0129054102001278"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_35_1","DOI":"10.1109\/MC.2002.1046971"},{"doi-asserted-by":"crossref","unstructured":"W.Li N.Zhong J.Liu Y. Y.Yao C.Liu Perspective of applying the Global e\u2010mail Network Proc. 2006 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI'06) IEEE Computer Society Press pp.117\u2013120.2006.","key":"e_1_2_9_2_36_1","DOI":"10.1109\/WI.2006.133"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_37_1","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_2_9_2_38_1","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1038\/43601","article-title":"Diameter of the world\u2010wide web","volume":"410","author":"Albert R.","year":"1999","journal-title":"Nature"},{"key":"e_1_2_9_2_39_1","first-page":"96","article-title":"Strong regularities in world wide web surfing","volume":"280","author":"Huberman B. A.","year":"1997","journal-title":"Science"},{"key":"e_1_2_9_2_40_1","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1038\/43604","article-title":"Growth dynamics of the world\u2010wide web","volume":"410","author":"Huberman B. A.","year":"1999","journal-title":"Nature"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_41_1","DOI":"10.1016\/0950-7051(90)90097-2"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_42_1","DOI":"10.1016\/0169-023X(90)90003-V"},{"volume-title":"Handbook of Data Mining and Knowledge Discovery","year":"2002","author":"Klosgen W.","key":"e_1_2_9_2_43_1"},{"volume-title":"Successful Direct Marketing Methods","year":"1996","author":"Stone R.","key":"e_1_2_9_2_44_1"},{"volume-title":"Complexity and Management: A Collection of Essays","year":"1999","author":"Putten P.","key":"e_1_2_9_2_45_1"},{"volume-title":"Rough Sets, Theoretical Aspects of Reasoning about Data","year":"1991","author":"Pawlak Z.","key":"e_1_2_9_2_46_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_47_1","DOI":"10.1007\/978-3-7908-1791-1_5"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_48_1","DOI":"10.1016\/0022-2496(74)90024-8"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_49_1","DOI":"10.1142\/S0218001401000976"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_50_1","DOI":"10.1016\/S0950-7051(01)00153-8"},{"unstructured":"Y.Sai Y. Y.Yao andN.Zhong Data analysis and mining in ordered information tables Proc. 2001 IEEE International Conference on Data Mining (ICDM'01) Piscataway NJ:IEEE Computer Society Press 2001 pp.497\u2013504.","key":"e_1_2_9_2_51_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_52_1","DOI":"10.1007\/3-540-45813-1_62"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_53_1","DOI":"10.1109\/TKDE.2003.1209011"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_54_1","DOI":"10.1007\/s10618-005-0018-2"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_55_1","DOI":"10.1145\/602421.602425"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_56_1","DOI":"10.1111\/j.0824-7935.2005.00270.x"},{"volume-title":"The Grid: Blueprint for a New Computing Infrastructure","year":"1999","author":"Foster I.","key":"e_1_2_9_2_57_1"},{"volume-title":"The Grid 2: Blueprint for a New Computing Infrastructure","year":"2004","author":"Foster I.","key":"e_1_2_9_2_58_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_2_59_1","DOI":"10.1007\/978-1-4615-0509-9"},{"issue":"2","key":"e_1_2_9_3_2_1","first-page":"91","article-title":"Designing Grid Services for distributed Knowledge Discovery","volume":"1","author":"Congiusta A.","year":"2003","journal-title":"Web Intell Sys"},{"doi-asserted-by":"publisher","key":"e_1_2_9_3_3_1","DOI":"10.1007\/3-540-45490-X_2"},{"doi-asserted-by":"publisher","key":"e_1_2_9_3_4_1","DOI":"10.1007\/978-3-662-07952-2_6"}],"container-title":["Wiley Encyclopedia of Computer Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9780470050118.ecse465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T08:26:58Z","timestamp":1708504018000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9780470050118.ecse465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,15]]},"ISBN":["9780471383932","9780470050118"],"references-count":62,"alternative-id":["10.1002\/9780470050118.ecse465","10.1002\/9780470050118"],"URL":"https:\/\/doi.org\/10.1002\/9780470050118.ecse465","archive":["Portico"],"relation":{},"subject":[],"published":{"date-parts":[[2008,9,15]]}}}