• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Bennian, Gao Yang, Chen Shifu, Xie Junyuan. A Review of Web Intelligence Research[J]. Journal of Computer Research and Development, 2005, 42(5): 721-727.
Citation: Wang Bennian, Gao Yang, Chen Shifu, Xie Junyuan. A Review of Web Intelligence Research[J]. Journal of Computer Research and Development, 2005, 42(5): 721-727.

A Review of Web Intelligence Research

More Information
  • Published Date: May 14, 2005
  • Web intelligence is a new research direction for researchers, which is an integr ation of artificial intelligence and information technology on the new platform of the Web and Internet, an enhancement or an extension of them. Many fruits hav e been obtained in recent years, and many problems remain unsolved. The notion a nd research contents as well as the functions and technologic framework of Web i ntelligence are firstly discussed. Then some recent research developments that a re related to the key aspects of Web intelligence, including semantic Web and on tology, Web agent, and Web mining, are deeply surveyed, and at the same time som e further research stresses and trends are presented. Finally, the concept of wi sdom Web that is viewed as the goal and challenge of Web intelligence is discuss ed.
  • Related Articles

    [1]Zhao Anning, Xu Nuo, Liu Kang, Luo Li, Pan Bingzheng, Bo Ziyi, Tan Chenghao. The Synthesis of Multiple Stateful Logic Gates for In-memory Computing with Low Wear[J]. Journal of Computer Research and Development, 2025, 62(3): 620-632. DOI: 10.7544/issn1000-1239.202440627
    [2]Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
    [3]Ning Zhenyu, Zhang Fengwei, Shi Weisong. A Study of Using TEE on Edge Computing[J]. Journal of Computer Research and Development, 2019, 56(7): 1441-1453. DOI: 10.7544/issn1000-1239.2019.20180522
    [4]Xu Shaoping, Liu Tingyun, Li Chongxi, Tang Yiling, Hu Lingyan. Noise Level Estimation Algorithm Using Convolutional Neural Network-Based Noise Separation Model[J]. Journal of Computer Research and Development, 2019, 56(5): 1060-1070. DOI: 10.7544/issn1000-1239.2019.20180185
    [5]Liu Hai, Li Xinghua, Ma Jianfeng. Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism[J]. Journal of Computer Research and Development, 2015, 52(10): 2332-2340. DOI: 10.7544/issn1000-1239.2015.20150511
    [6]Ke Changbo, Huang Zhiqiu. Privacy Requirement Description and Checking Method in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(4): 879-888. DOI: 10.7544/issn1000-1239.2015.20131906
    [7]Wang Zhuxiao, Hu Hong, Chen Limin, Shi Zhongzhi. Parallel Computation Techniques for Dynamic Description Logics Reasoning[J]. Journal of Computer Research and Development, 2011, 48(12): 2317-2325.
    [8]Fan Liya, Zhang Fa, Wang Gongming, Liu Zhiyong. Algorithm Analysis and Efficient Parallelization of the Single Particle Reconstruction Software Package: EMAN[J]. Journal of Computer Research and Development, 2010, 47(12).
    [9]Zhao Feng, Jin Hai, Jin Li, Yuan Pingpeng. VFRS: A Novel Approach for Intrusion Tolerance in Virtual Computing Environment[J]. Journal of Computer Research and Development, 2010, 47(3): 493-499.
    [10]Tu Bibo, Hong Xuehai, Zhan Jianfeng, Fan Jianping. Workflow-Based User Environment for High Performance Computing[J]. Journal of Computer Research and Development, 2007, 44(10): 1717-1723.

Catalog

    Article views (1245) PDF downloads (868) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return