设为首页收藏本站|繁體中文 快速切换版块

 找回密码
 立即加入
搜索
查看: 1624|回复: 0

[原创] 第二届IEEE数据库技术与应用国际会议-DBTA2010(DBTA2009已全部EI Compendex检索)

[复制链接]

该用户从未签到

尚未签到

发表于 2010-5-4 22:25:42 | 显示全部楼层 |阅读模式

马上加入,结交更多好友,共享更多资料,让你轻松玩转电力研学社区!

您需要 登录 才可以下载或查看,没有账号?立即加入

×
abbr_319e1d4bad0ac813b4ae9db0f9767e2f.rar (38.66 KB, 下载次数: 0)
2 o$ h) |5 T$ |6 O% pThe 2nd International Workshop on Database Technology and Applications (DBTA2010)2 p( N$ ^3 A4 \  |- D9 P
1 G: L4 {" l/ S$ }( I7 n$ U+ t
第二届IEEE数据库技术与应用国际会议-DBTA2010(DBTA2009已全部EI Compendex检索)- {) U8 @4 @+ L

5 X4 }) a, T: l1 a2 m$ Z11月27-28,2010,武汉,中国 ) S5 P4 H2 Y. g9 s

! L# c# E% ^& t9 ~http://www.icdbta.org/! x" c$ Z0 l0 q8 r$ r
. \3 ]( Y) i' v/ |. t
2 Q7 @' f9 l! i6 [9 y, F0 [
9 N& @, i+ {. T( I
论文提交日期: 2010年8月18日
6 w( e. j/ L4 s8 B- n3 j, p, ~0 `9 T5 w/ W% W# Z2 f' r5 i( Y, u" O
论文录用通知日期: 2010年9月 16 日
! }; W1 ~3 w+ d5 }, h  H- z0 q8 c4 R" w3 c! X: k' e7 Z8 \- i0 |
论文修订版本提交日期: 2010年9月22日; t) w. f. G7 C5 @# \

' ^0 Y" Z% j7 u/ J论文注册日期: 2010年9月28日8 a  I3 f( I' I, n" M

  j8 H5 Y) ]; {& _! h+ X" s论文提交系统: http://www.icdbta.org/dbta2010/submission/
* b7 Z3 q/ c0 f  u& I/ I4 A: ]" V, }! I5 m/ Q' T
会议论文模版: http://www.icdbta.org/dbta2010/instruct8.5x11.doc(只接受英文稿件)6 i" Y& u6 G8 J# I  a! |

: c) ^$ a. X1 q6 T0 g! i( a6 ^IEEE会议论文版权表: http://www.icdbta.org/dbta2010/IEEECopyrightForm.doc (录用注册后提交)
7 L+ Q4 q1 n( r! J
7 s- J6 l  Y$ {( x! V% P( X" E8 ~' a' i6 x! K! e

" h) `" M" ^# k7 M5 H2 {+ t3 c第二届IEEE数据库技术与应用国际会议(DBTA2010)将于2010年11月27-28日在中国-武汉召开。
. i" H3 F9 i, y
1 ~3 y& I0 j; E" L: [3 W3 X; [第一届IEEE数据库技术与应用国际会议(DBTA2009)全部收录的论文已经被EI Compendex检索。0 r# j& `  T. o- N1 Y
4 [. t: k5 Q  I8 h4 b) J
DBTA2010将由美国IEEE出版社出版,收录的论文将全部被ISTP和EI Compendex检索。会议
4 _+ z9 _! T- P2 a& N% w% b1 s2 f( k$ b0 F4 d( a; d
优秀论文将被推荐选入EI或SCI国际期刊专刊发表。, I* O: o. `/ l9 F5 Y* x6 T1 O

0 o4 i/ H& ^$ d8 J( X; l
' q7 a: ?* k$ _: `, T1 w. f. A4 a, p# ]% @) {
欢迎研究员、工程师、教师和学生踊跃投稿,会议论文主题由以下领域构成,但并不局限于:
' g  K* f: A2 C" Z4 v3 L) h/ R4 ]- X, f4 c

" m7 s- D8 v7 X7 T( a
4 v+ O0 `8 i4 T/ m2 Z- g) J1. Database and Related Issue 4 V9 F4 E9 e) E5 ]+ w! ^! a  y
: n$ @  k) x' M% a; R4 d. X0 @
Temporal Data: J9 w5 M7 O- o  Y8 y  T, u

" I- s/ o% E6 ?& d/ q9 W$ X2 H3 yScientific Databases
( ?8 A  ?" w6 y3 D0 d3 ?" W
4 p/ i/ o% }! D7 P; Y  {/ NBusiness database software
( m: }4 M( {" R. \& O+ `, T+ e0 c, I5 d, A- g
Computer data processing
$ J1 u9 _6 y4 u0 W9 w# J6 h) F) E
- a: \' _$ _3 S6 p3 q3 f- eData processing services
9 V) I. W, l- B' b2 ~) @
0 |9 n$ D' F9 ]3 Y/ XData processing supplies ' G. _9 K3 ^! P: M1 V

& u4 w# q: y; ?' ]% I2 r* ZData processing systems
0 e% A* b0 T( w$ N4 E+ v3 [6 D4 T  F. Y' h2 p* R- Q/ n
Metadata Management0 Y, g- \; r4 T2 _; G+ c1 E
9 a1 S6 a5 }8 m& r
Mobile Data and Information1 E; w) C6 @. F2 d  i7 O2 M2 n

1 S, B, D8 s0 _, f- s0 n) G5 A4 XMultimedia Databases
1 _/ Q& S4 l: Z; Z  E/ i& l$ `7 |
1 t1 o1 y8 U# x- n3 `! iWWW and Databases7 g7 p# z8 x" l' {

5 L' K9 O' j# P1 i$ f# K7 eWorkflow Management and Databases
; m- \- I) o- t/ w2 f. t  B& M# l- J( l! Q+ l  o$ @
XML and Databases( I' k/ ~5 ?$ a" M! k. F8 L, _

( t/ c$ f- y7 u) {9 u  sMultimedia Databases
' M/ p9 u1 K+ v% Q
2 L7 X. W* p# y4 R6 P/ sData modeling and architectures
* e. D  w" p. X$ H5 A8 H9 F6 a
& K" t! s5 h6 ^5 _Data streaming, data provenance and data quality2 x+ S" |! j: r; \. R9 c" u3 R  z
5 o6 G& o+ V, _7 H" Y
Data Security, privacy, and data integrity 0 @) j, T6 V5 X' h# l6 n; c

3 x, u2 y2 W: tWeb Data and the Internet
8 d( a* H& y, }5 _9 A, `( f. P- o
5 a6 S2 l6 I, w8 A+ o0 q. [8 oXML and databases, web services$ Y) c, F  Y: H  x' }8 b' Q

0 L! @* T; H, A9 U% ?; b0 hSemi-structured data, metadata
5 H6 j2 {# H) Z. W4 W9 Q  z# `; M' W' e8 g/ t/ S
e-commence5 b5 p) ]3 m* z0 E5 ^  H. I6 e5 }/ }

1 l( R( U& Q, }8 x7 S
/ ~3 H/ h& m' b1 h/ Z4 L  n  X- D8 D6 P4 B% N- M8 S- {2 X# J
2. Data warehouse and Data mining
" W0 F* Z" q% z* p  n  }" |8 H: @3 }: c- O9 z* ~; s
Grid/Parallel/distributed data warehousing+ m9 K2 g6 `: F# X, @
- T) h  e/ ]. p2 b, R
Web/multimedia data warehouses6 M9 N1 {. b' }$ m* b9 t; {" Y

0 f0 n/ M6 M2 ]( X4 vData warehousing and the semantic web) G1 D; _5 C1 p% t: @0 i

# C0 g- B2 p2 I0 h$ G' C' l$ JData warehousing with unstructured data; d7 z  ?# l' Q: U2 `4 i6 J4 L
* L  A' G% |$ G5 @9 k6 o* c
Integration of Data Warehousing
0 U( c% l# e. `4 |1 |+ [" j% A6 ~- J1 M( ]1 C
Data and knowledge representation
1 O4 {8 p. S2 D8 N& Y1 v0 l; Z2 u9 K- f: H) U/ x/ G
Languages and interfaces for data mining
& a# q, `2 E. ]! R. _- F% [: F2 t9 _1 [" n+ D/ t
Data integration and interoperability
- l# A1 ?* Q* E3 x  p) _. w; R. K4 T! F9 |+ Z( }  b
Data extraction, cleansing, transforming and loading
" \# [$ U- Q  t$ a( r7 I3 G$ }7 ]/ g' J6 e4 l9 q+ n; _, }( b
Data mining and information extraction
  Q: d/ Y3 z( C7 ^5 u- e
! Q; G. F, [- S* F3 E$ pKDD Process and Human Interaction
2 c; S9 z+ \. f" o2 m' ~8 {0 _7 a, n7 M! |7 H
OLAP and Data Mining  f: M1 S% i. \' e

% ?1 N& D9 `7 M2 N/ S7 CParallel and Distributed Data Mining2 t9 D& I! O! ^5 B
/ o0 P! L7 D9 K1 B2 _8 U  Z5 D
Physical database design and performance evaluation
- s8 s$ w- O4 n! g" c: F5 Z$ u7 g6 p1 D7 E& c! Q9 o' q
Query processing and optimization- p  w; o9 N& q

- `. `! q3 z  q( `+ Z) }/ F/ \Reliability and Robustness Issues( ~' k" P2 y  [+ E
: x/ K7 G, U5 O
Semantic web and ontology
  @; l4 c1 z& d, A# Y% t" Q- r! P
Software Warehouse and Software Mining! A# C. E5 A8 Z1 \4 s; {

9 v7 k& j& Z6 \( \3 H; wSocial and mathematical statistics
/ K% X/ Q7 @0 O9 K
) m& ?8 I4 D/ `) t4 i9 [' ]. P2 ENovel data mining algorithms in traditional areas (such as classification, regression, clustering, probabilistic modeling, and association analysis)
. e: b% R5 W. u5 J2 ?+ A* A; u4 I8 f
Developing a unifying theory of data mining
+ ~+ f* Z5 l4 y5 |: x7 q
' D2 }3 U& z- a2 c' RMining sequences and sequential data( P& A: K1 w6 q7 l. x
- h( ]4 n9 j: G0 |% @5 ?
Data pre-processing, data reduction, feature selection, and feature transformation
( E$ k  D3 T; |6 {7 w
; O+ P7 p; N1 ]+ uQuality assessment, interestingness analysis, and post-processing
: _4 d8 X' J8 B/ V+ U) t2 `0 ~+ F) c7 {3 b/ W7 ]3 E
Mining unstructured, semi-structured, and structured data- {: }' P  R7 Q$ ~5 g& i% U) T

$ }. {7 f! W- ?2 J% ?Mining temporal, spatial, spatio-temporal data' I' e. y' g  T- i" [' M

. h: E2 M, X' NMining data streams and sensor data
& n: x, l4 ^5 @0 H0 s8 i- L
$ A, H9 P  B4 S, lMining multimedia data
1 x* P% n4 u7 K9 X: t* m% c; w: ^/ N) e! r, t$ q- H# h
Mining social network data
8 @$ D, U$ ?+ a4 g  O) e$ E" b' @) ^- o" w6 Q
Human-machine interaction and visual data mining
# Q  u6 Z. g" k: ]4 a. h9 T! ^) I, A) E
Data mining applications (bioinformatics, E-commerce, Web, intrusion/fraud detection, finance, healthcare, marketing, telecommunications, etc)
+ j' s4 G$ L; o/ H5 v/ @
+ X, }' T, ?" x4 k3 M) l4 iKnowledge Acquisition & Management7 g& V9 u0 F/ q. _
. x7 s# t1 V0 P
Knowledge Modeling5 S5 m" C! {4 B0 b' g
$ H' D/ T# t9 U5 ?
Knowledge Processing
) X9 _* i% x% ^8 ~3 {2 h: s3 s; q% e3 ~+ g$ F. ?
Integrated KDD applications and systems   Q8 ~$ l6 n7 {0 ^/ z" o9 E; j  F

  H  s/ J3 n* x( d* l" ~Business Process Intelligence
9 i5 X3 T7 ?& L2 Y4 x2 ]
3 l. [( A# v* X, w: H+ W# FCluster Analysis and Knowledge Base system
) s% V  \4 F% S0 N8 _  ]  n/ y
' Y- l# ]8 x- }Information systems technology
% x. m, `# H+ z* a/ z5 K3 [; w  m5 w% B) C* H
Other related technology about data mining/ o4 l7 _% c1 X% s% ^" b6 i% d9 d
: K% M+ P) X$ C0 w1 Y) W1 C

0 D# r( }: f4 |* R& o7 C. j: g6 }8 h, k
& M$ [( o7 h* A/ C, n3. Computer Science and Related Technology
: h; }6 M9 |( Q3 R9 h$ M; g# ]9 N& b6 i8 h$ N
Image and signal processing
8 K  u- h( p6 C  S4 W+ g0 {3 F
! N' L4 U+ p$ X' {' fArtificial Intelligence
+ X: W$ _* t& l' [. v
+ p2 K3 h0 N; z; Z; ESoftware engineering   P7 N% t$ C: k4 p
- M: \3 v+ U+ F; I( M
Systems Engineering
& @& b, I% Q% U* x, U% j) O& h
# P  S' O( f& H  p6 n$ zComputer Graphics # [1 p1 |8 c1 z- R: d/ F

2 J/ C9 X+ c) P! {Computer Application
- y  |9 V- J- d: M5 s4 @' x  V- ]0 u. `) N% E
Control Technology
- q* ^$ u. X% ?: q) P( X' L7 R, i8 T3 \2 D9 p# L6 n2 v
Network Technology - D0 L6 p9 A1 `, o* e, H3 ^1 ~
) s( l) z. ?, e: D  ]5 M0 V- k4 E
Network security
1 y" J4 O" O+ [: H; h* X0 v; Y0 i) p2 Z# ^3 b+ B& ^: N5 [2 |$ |
Numerical and symbolic computation2 _7 y6 l* Q8 m; V4 b# I. Z

- U; w5 \' a/ o" e: |9 y* l4 p% XComputer Modeling and Simulation3 u* l4 v  [' n+ L, X4 e) Z6 u! Y9 Z

2 O: z$ b: `: r7 s; ]Communication Technology
; X. v. \3 H1 }% ?
" o  x. _9 ]6 H  v* T  u3 R! n! xAlgorithms and data structures" b  R0 g' Y* _/ Y% o, v: z7 j
3 F  q) `' H8 C
Computer Education
" b% b! w7 r6 W' w- M7 j: L& C0 X3 R) `4 _8 d! w2 w
Other Advanced Technology4 _" x6 R4 f8 Q( P* F0 j7 P0 }/ a: Z
+ M5 x# ^! ^7 l2 s

* ~! X4 q" ?0 ?& A# }+ U& e. r  `" t$ b- P3 l1 p- u7 a, }
======================================
$ z1 c' X' g1 d" a
, \; A3 Y; {1 |0 K6 QDBTA2010会议联系秘书处
) M; ]  M* g7 N* |/ |% a& u/ k$ t( M0 k0 T/ _
) r3 l8 W' N0 \" ]' M% ]0 h  f0 [
' J% ~( O0 E9 [9 y! b3 ^
邮件: dbta2010@vip.sina.com, info@icdbta.org" j/ T  L+ J0 {7 t. x& h2 L# X
" {* b: o9 Z  y4 s- ?+ e
电话: +86-15102769170
"真诚赞赏,手留余香"
还没有人打赏,支持一下
楼主热帖
帖文化:【文明发帖 和谐互动】 社区精神:【创新、交流、互助、共享】
您需要登录后才可以回帖 登录 | 立即加入

本版积分规则

招聘斑竹

小黑屋|手机版|APP下载(beta)|Archiver|电力研学网 ( 赣ICP备12000811号-1|赣公网安备36040302000210号 )|网站地图

GMT+8, 2026-3-18 20:20

Powered by Discuz! X3.5 Licensed

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表