设为首页收藏本站|繁體中文 快速切换版块

 找回密码
 立即加入
搜索
查看: 1463|回复: 0

[原创] 第二届IEEE数据库技术与应用国际会议-DBTA2010(DBTA2009已全部EI Compendex检索)

[复制链接]

该用户从未签到

尚未签到

发表于 2010-5-4 22:25:42 | 显示全部楼层 |阅读模式

马上加入,结交更多好友,共享更多资料,让你轻松玩转电力研学社区!

您需要 登录 才可以下载或查看,没有账号?立即加入

×
abbr_319e1d4bad0ac813b4ae9db0f9767e2f.rar (38.66 KB, 下载次数: 0)
3 a6 L% s# v* k# P9 Z+ o; m: y0 tThe 2nd International Workshop on Database Technology and Applications (DBTA2010)
: ^2 M% `" Q2 ^
+ P8 N$ I7 M, z' c# I第二届IEEE数据库技术与应用国际会议-DBTA2010(DBTA2009已全部EI Compendex检索)
2 `: |# H- e5 i" G% @+ E3 m7 i0 n. K5 `2 A+ g% f; f
11月27-28,2010,武汉,中国 - H& G1 C! w3 ^

  F5 X, _" F2 U5 w% yhttp://www.icdbta.org/$ D# P: N. L8 T9 q( }

1 Y# A& g# I3 W: p$ S0 w& X" f  e: _% \( |" V/ u0 Z* P
) {# F6 I4 ]2 C( v
论文提交日期: 2010年8月18日9 G3 \0 Q: n8 @* d3 m3 ^+ T9 U5 g
  w% f' ^- ?  g5 {, \
论文录用通知日期: 2010年9月 16 日
* @0 Q/ Y+ z9 s7 Q, |( y8 y* x) u6 f+ B# X0 o2 v  Q0 [( t
论文修订版本提交日期: 2010年9月22日" U" Z  L, A0 P, U5 o

; O- D1 ]* a" x" x论文注册日期: 2010年9月28日
2 A/ J. S- }4 ^5 f7 z7 z
. y( z# j+ u/ \. Y  b论文提交系统: http://www.icdbta.org/dbta2010/submission/
* X# k8 n- p8 @+ W3 }4 t0 G* X2 w- _/ |# K  ~
会议论文模版: http://www.icdbta.org/dbta2010/instruct8.5x11.doc(只接受英文稿件)
- O7 z+ E+ B' n, X5 B3 P5 Y0 l! ^. i5 b; v/ q
IEEE会议论文版权表: http://www.icdbta.org/dbta2010/IEEECopyrightForm.doc (录用注册后提交)
( w% Y$ U7 j8 J" G- b2 U4 w6 J
' N$ I, B7 y3 C+ [) l$ t" a: X9 j; f& E1 X# t, |* u, ]3 z

) \: a$ v! W0 M0 @; Z8 ?第二届IEEE数据库技术与应用国际会议(DBTA2010)将于2010年11月27-28日在中国-武汉召开。7 U9 t- g5 [* a6 H
6 l  R1 q1 @4 i" W. d
第一届IEEE数据库技术与应用国际会议(DBTA2009)全部收录的论文已经被EI Compendex检索。. p5 i3 b7 L1 S5 K: ?, u/ {  ?* @

7 R. V+ H$ F& H. hDBTA2010将由美国IEEE出版社出版,收录的论文将全部被ISTP和EI Compendex检索。会议5 m, d' x9 s/ ]: @6 b3 i- L
4 K; z7 w3 N2 M$ `% @+ y
优秀论文将被推荐选入EI或SCI国际期刊专刊发表。5 t, ?% x8 w- ]7 }! p* ^7 H* i3 e8 ]
2 J. o2 `! P5 S1 k9 r
. }$ M2 Z! |7 W2 d# Y! c

% M  K- \2 N; i+ i欢迎研究员、工程师、教师和学生踊跃投稿,会议论文主题由以下领域构成,但并不局限于:
$ Y+ F$ w: x9 K5 d. [' Y$ Y# H* S

- Q3 Z  P" Z4 I2 Y: y" o& L$ V) w3 q- z
1. Database and Related Issue 5 |: d4 h3 T. v8 O
/ W. V; ~) ^- E  {: S
Temporal Data) @+ F1 |/ {3 O; J0 ?

! F9 p3 ?* B4 _/ N) U% S* E8 YScientific Databases
& M$ q) M: k8 p) _8 h, k4 [3 R0 v8 l6 c+ o% @4 x& f9 f
Business database software
% j) o" `. n, E# q0 S0 A9 J; M9 `0 L3 z* z
Computer data processing 1 q6 x8 Z5 @- J7 K4 I

, N6 e# e# v' g5 d8 R8 o9 kData processing services   p2 O$ U' w/ O5 N4 W

  f# e8 K% k1 c' C; L+ J- BData processing supplies * H, ?3 v& V" z
' v5 T$ m" P- Z5 j& c" Z
Data processing systems! d+ r# o6 S6 _$ p: B- e% Q3 ?( p+ f, Q

# X% I1 D+ t0 r& p3 B3 u' f7 yMetadata Management
. Y+ l* {( p3 M# V; l
$ O/ w) b& b" V9 k! j( z/ GMobile Data and Information
1 c8 L0 T9 f$ w* l/ O8 o" Z& {9 C3 N; o0 R1 ?3 Q- j) z: u
Multimedia Databases
! M2 r. C; b8 s3 z
* F0 N2 Q" s) L- ^% D- HWWW and Databases* Y$ @- Y( y5 u' F# [0 p

. C7 @5 r" i+ Q( y3 a4 ]$ oWorkflow Management and Databases7 ^9 [! ?3 G  D& p! I

: V2 _5 f# T% B$ Z) HXML and Databases
; w6 L  H: q5 F& H' J' u  Q# h8 m& `% x5 ~6 D* p
Multimedia Databases
4 y9 F, K# k' X5 t- T: f6 ~$ ]
! Q, Z; |, p" x3 z+ _Data modeling and architectures  R+ u1 n' T& i

/ r( ^9 V3 x  A  G. A- X0 t9 E9 `/ FData streaming, data provenance and data quality
# B9 o* L; G$ w, M
2 g( s  \% f" A) E% _7 B' IData Security, privacy, and data integrity
& n7 }4 K& Y( u% A# E0 x4 A
! u& c# K. O: y. Y! WWeb Data and the Internet
+ A# n7 a% F" V$ t9 A9 ^* y8 m6 I; k8 Y( m( V4 c# Q* r% J& x( P
XML and databases, web services( g; @7 H, N: C$ Z

3 H5 R# k& ~( v" O; f7 M& BSemi-structured data, metadata
  N& e. C+ ]' L9 g: U& B1 e# i$ I$ w4 {  w- x
e-commence
( W) u" d6 A7 T) {; m& }4 F* t, n: S7 y# k) m/ b1 e! {$ y3 {
1 F2 m& u1 G% Q

8 D7 s( f( a4 R/ S2. Data warehouse and Data mining
  J( ?2 ]1 O* l% K2 V1 L- m% y- ?/ p( E! H) z2 u! L1 R
Grid/Parallel/distributed data warehousing3 j) w: K' ]0 c8 X$ l. F. F
5 b) S! C: t9 @% h
Web/multimedia data warehouses7 ]9 Y- p# b; `! }
  n4 a; [8 \( I
Data warehousing and the semantic web
: q5 M7 @: {- F3 v( P5 M. e! W2 R
- j1 d) n% O8 E4 qData warehousing with unstructured data/ S( A, c1 Y+ Z3 [3 |" M
3 n% @, T& y3 H
Integration of Data Warehousing
. v9 O0 d" t1 c% e" {
  k1 w9 q2 F1 H' C1 sData and knowledge representation
9 [  X2 Z% o5 v* E' E8 }# z8 g: u! {
8 L$ E1 p/ x% x# `5 ?+ P" }$ SLanguages and interfaces for data mining
5 D% H/ E. C6 {  K) B% y
0 n* x, d- W+ C/ {% D- G- nData integration and interoperability" u1 c. x) w4 J& i  A) N6 ^

7 m* m3 i; |) h2 F4 X- qData extraction, cleansing, transforming and loading
& y, M2 d  A& R9 [2 W$ @$ t$ S* a
: ?! `% f. w* W1 e+ W8 Q1 d$ t+ J3 UData mining and information extraction3 |4 N3 T- A0 m* S4 v3 i
6 I9 D* y4 B- D
KDD Process and Human Interaction" M1 z9 C. L% u$ T. u1 L2 {

# l3 P* g4 u' G) B$ A* EOLAP and Data Mining
; F8 \% y/ Y4 s, F$ i+ c
2 C; K- m3 b2 u$ T! g3 o0 K& Q0 \( LParallel and Distributed Data Mining+ u5 w  z; a9 X& T* u3 W8 r
& |* P$ n( d: T
Physical database design and performance evaluation
( a+ Q! t) Z) b/ R
3 ?( z- h( k5 H$ D3 S8 |+ TQuery processing and optimization5 I& N  h' U* h
. ?$ v5 b4 z2 N; I, S2 i. }
Reliability and Robustness Issues7 ~  i' I# J+ }  M) a) B
+ K/ c* g; E' l1 D& U
Semantic web and ontology
( y4 y: d5 s) \) o0 \! `, k8 Z. w9 i6 A( e! [2 d9 W
Software Warehouse and Software Mining; `; i' N6 g4 G

- p7 e3 `8 j" Q8 z3 cSocial and mathematical statistics
( j+ m. }1 X  {$ l# l8 E( Q: v! C6 B8 D! l
Novel data mining algorithms in traditional areas (such as classification, regression, clustering, probabilistic modeling, and association analysis) 8 Z% \. h; p8 z  c. {( a
' `6 w" c  v0 @! |* \
Developing a unifying theory of data mining
- u  y5 y8 G0 Z0 V2 D$ S* _6 `. x( l" t& T8 _" \6 M  H+ Z
Mining sequences and sequential data
' @9 J4 z7 I. c, w& \
/ v% M; h4 V) y: D/ E- p2 s6 x6 KData pre-processing, data reduction, feature selection, and feature transformation
; r2 [* n! j3 N2 y3 c5 {  t+ N! Q3 ^/ Y. m
Quality assessment, interestingness analysis, and post-processing
& P/ K* x- |. Q6 p. r
6 Q- M+ t3 m% o5 |5 {) e9 _% @# r; kMining unstructured, semi-structured, and structured data1 r3 `  m, O6 a4 k/ d/ M
/ m( y, U; }, M3 J5 a) k6 U
Mining temporal, spatial, spatio-temporal data1 e4 s; _3 ?+ n0 S7 n
2 l) P" M# W& M/ j+ M! L
Mining data streams and sensor data
) j4 R& b* N8 }5 w
6 T* m# j) y1 H; R3 N0 kMining multimedia data/ \+ f& c6 x, ^$ n
) C, f( w  r/ D8 F3 S4 k$ }( R- J% l
Mining social network data; ^  G) [# P5 g* S! i; E

+ l- E" p1 Q0 z9 k9 QHuman-machine interaction and visual data mining ( e, T) G6 |- K% B2 r

* m. `+ T; k0 ?2 {Data mining applications (bioinformatics, E-commerce, Web, intrusion/fraud detection, finance, healthcare, marketing, telecommunications, etc)
! |  o" m& q7 `) o# Q
+ q" a" N; @  qKnowledge Acquisition & Management* E. k* |" K( c  }

$ r4 ?8 q0 J* t1 _1 ]1 ?Knowledge Modeling
' o* @: t* \) e5 N# K( K9 F' y1 [, n! \1 D5 W
Knowledge Processing
+ f, i2 u1 i/ q; t4 Z, u$ @1 `# B9 Z' J
Integrated KDD applications and systems ) e4 ~7 z- r9 l+ k
1 d4 ?1 ?: B5 O, P$ Y8 b: Q8 A
Business Process Intelligence+ K8 w  \5 |, K& |. x

3 z, P7 S: e! h# ~/ @$ xCluster Analysis and Knowledge Base system# i/ f: V) I1 V: \% Z  x- @; S
0 Y* M% [, J! l- b
Information systems technology
- E1 F* t6 F* C' R: W
% q* |1 P0 {' W  j- m) P3 qOther related technology about data mining7 E  A) ^& y8 O! O* s3 e5 n

0 j& v( O7 ^, x/ A5 h% X- T; U7 g
# e9 z" E, ]( r& x# B  r1 B- q1 {. `: n
3. Computer Science and Related Technology - P: y- X4 n, k. |, D% c

1 {+ v4 }6 D) J6 _' v; gImage and signal processing ( @+ j+ |  W  S5 }

* [2 V4 I2 N5 S4 i" [- qArtificial Intelligence
+ g1 E$ \4 G2 _7 P. n' |! B" f% l/ i: U
Software engineering
7 V2 G1 c0 J. `% R$ S# y; V
, G1 C% a- z. e3 I) B, O- zSystems Engineering
- r) B8 `1 g: F8 g3 h( F7 u3 U' D1 |# m0 L6 q2 \/ z
Computer Graphics ; ^* n) O& ?3 W" N8 E* M& x! O  A$ ]
' V" c. c, `6 n+ n& _9 Z, t+ t
Computer Application ; R$ C- X% D# l/ H, D
, P( e) c5 |4 n- ]% ^
Control Technology " M2 n2 X# C1 k4 R- S) l8 q
& p" v) U' V; b& I+ D
Network Technology + M% M7 ]! f" B) H" c* M% `

, ~- {6 ]/ p; U4 @' C3 z* }Network security 4 l$ q" Q1 F  I; B

! {( Y+ H5 ~9 k# t( n- B! ONumerical and symbolic computation
* a5 |/ S$ I) t1 w. w
( L  a. N3 X, a9 _8 H; y. [+ }5 \$ x% sComputer Modeling and Simulation
' ~  }9 U+ w* K7 B9 h
  B0 S, u  i( zCommunication Technology
; D$ v5 H  y. }$ r
5 M6 r) o7 R, N6 r2 y9 w" k! jAlgorithms and data structures8 ^' |2 }3 _. `+ ]# N7 b& u$ @8 M, {4 [

) L3 V1 N% B( {+ E7 ~4 OComputer Education
  J4 i0 i3 c# Z' D- ]3 E$ |4 f7 E; m+ e% q. O
Other Advanced Technology8 ~1 M" x/ x$ T& z5 s+ m% ~2 D
( K% v; x3 z( m

% _7 b# P3 @0 v7 p: C; K* H* j: \& b" W, b4 J9 Q6 e  f/ a
======================================$ ^: y. T2 @) K2 J8 r5 x4 X5 W

3 i$ C6 ]% b- f& VDBTA2010会议联系秘书处
# Z* a$ s. k! [% R- c& u
: z; ]# j4 E! ~, V3 \/ W2 `4 |4 l  D% [- ^- n) H1 b
; D. l# g! P- b  b# B/ O# P1 A
邮件: dbta2010@vip.sina.com, info@icdbta.org3 p+ s3 C, x' ~$ n

8 @( U. ]0 S) V" x电话: +86-15102769170
"真诚赞赏,手留余香"
还没有人打赏,支持一下
楼主热帖
帖文化:【文明发帖 和谐互动】 社区精神:【创新、交流、互助、共享】
您需要登录后才可以回帖 登录 | 立即加入

本版积分规则

招聘斑竹

小黑屋|手机版|APP下载(beta)|Archiver|电力研学网 ( 赣ICP备12000811号-1|赣公网安备36040302000210号 )|网站地图

GMT+8, 2025-4-5 22:31

Powered by Discuz! X3.5 Licensed

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表