设为首页收藏本站|繁體中文 快速切换版块

 找回密码
 立即加入
搜索
查看: 1621|回复: 0

[原创] 第二届IEEE数据库技术与应用国际会议-DBTA2010(DBTA2009已全部EI Compendex检索)

[复制链接]

该用户从未签到

尚未签到

发表于 2010-5-4 22:25:42 | 显示全部楼层 |阅读模式

马上加入,结交更多好友,共享更多资料,让你轻松玩转电力研学社区!

您需要 登录 才可以下载或查看,没有账号?立即加入

×
abbr_319e1d4bad0ac813b4ae9db0f9767e2f.rar (38.66 KB, 下载次数: 0) $ D' O; a# g8 Y+ i8 g1 H
The 2nd International Workshop on Database Technology and Applications (DBTA2010)8 {3 P- U9 ?6 K  z! S; f4 n0 q

% O9 q/ Z+ H+ N+ }: ?8 Z# ]第二届IEEE数据库技术与应用国际会议-DBTA2010(DBTA2009已全部EI Compendex检索)
3 X' }- v1 o) V! d& ^3 A# _4 e2 q' [" B' b
' J$ X8 S4 T/ s6 d8 N; |11月27-28,2010,武汉,中国
2 R- }" S* z; P  A9 V! m
+ D" o) w) z& q* v. \* T6 jhttp://www.icdbta.org/% y5 o0 m2 v; s3 v! ]
+ ?5 e$ Q% E9 d, ?6 V2 x
/ N" M. K% _9 B" O( J5 R8 O

; P8 @7 T$ P/ |6 g- c) v% `9 _0 O论文提交日期: 2010年8月18日% V, K2 d; P0 a1 _5 X" a; V8 h' M
! d7 F5 I/ z7 `6 {
论文录用通知日期: 2010年9月 16 日6 W+ N. m2 Q' e& l& c3 }; Q5 r
3 b& O: ?3 @3 @0 d3 Q5 P
论文修订版本提交日期: 2010年9月22日
* ?9 `& G$ w3 D8 Q
! M- Q# Q( N' m8 {4 \. _1 i0 J+ l: ^论文注册日期: 2010年9月28日
5 c! B2 X6 z; _1 j  p, F, K: v& H' Q( F6 k+ K" Y$ D, {4 _
论文提交系统: http://www.icdbta.org/dbta2010/submission/+ Y- o  Z0 }; d( V) g% ]4 t; m  O

1 p! c& H7 a& ^- @! F/ M; C会议论文模版: http://www.icdbta.org/dbta2010/instruct8.5x11.doc(只接受英文稿件), m2 D. h7 O' [6 X

4 @0 o1 g5 @5 v! p8 k- `6 ^IEEE会议论文版权表: http://www.icdbta.org/dbta2010/IEEECopyrightForm.doc (录用注册后提交)
7 H- o0 O% H4 D) O9 x# m; j4 p
# e! }4 L3 O9 e- k' J- X& N
" M9 F  k+ ]' K* o" E& t3 D! q7 {$ A% E3 b* [7 D0 {
第二届IEEE数据库技术与应用国际会议(DBTA2010)将于2010年11月27-28日在中国-武汉召开。
1 c3 a4 T9 n; N2 b
$ `+ _0 t4 ?7 I! A  w第一届IEEE数据库技术与应用国际会议(DBTA2009)全部收录的论文已经被EI Compendex检索。
8 e5 @: G9 B2 [8 [' g" _0 _
8 k* N1 W1 M7 P: X9 O. {DBTA2010将由美国IEEE出版社出版,收录的论文将全部被ISTP和EI Compendex检索。会议
3 w) g$ U7 u: n5 j  }: i; W) v, l% [5 n4 R/ U( u
优秀论文将被推荐选入EI或SCI国际期刊专刊发表。5 P& g9 t/ V0 ?  P3 ~& x

6 z$ h# R# S( J) z6 ?; P% B5 B) L* g" v3 V2 ]7 J$ S. g( m

( J; W" D, K) U  b欢迎研究员、工程师、教师和学生踊跃投稿,会议论文主题由以下领域构成,但并不局限于:* z5 |' M7 K' ?/ l

5 \/ E$ C9 s+ l6 X! K
% a" n/ T% K+ |6 J' T' K! _; {9 h8 r9 ^( |: J, t( e/ I0 k# {
1. Database and Related Issue
. T! @: Y4 r0 p; L2 h) x5 [; @. F( ^: Q; d
Temporal Data
+ i' i! T  I: F$ Y5 k. v9 F7 x- F" S3 H! z9 S
Scientific Databases* Z% y/ @) B+ I% j

  s$ I4 d: x( U5 U# ]" a8 z3 NBusiness database software5 i! ^9 k0 n, V1 C7 I5 A% W

3 N- P& [3 T/ m, ?4 {3 r9 B+ EComputer data processing
" J$ P! f5 Z# j4 v4 o
8 ~6 s6 c) ~* c9 K+ z/ a0 GData processing services ( b4 {2 H! S* e: k0 v

! u4 U/ ^" D, N! c1 \Data processing supplies . {6 Y6 N  b* Q: {

7 v* v4 T3 x- R- R7 \Data processing systems, O1 [; H( n  e7 v+ @9 U9 W" Y" [' F

' v" o0 q' h. B0 gMetadata Management2 k7 {( b7 l! `# o: f6 n& ^6 [- n

, _; w" j: t* J$ V; Y1 r0 g/ \3 I; rMobile Data and Information0 p3 S# t. m: X! {

. a6 d5 m" C3 p" o3 I% C6 P4 Y3 cMultimedia Databases0 T; R5 {: d! X7 R" k  \
& l# Y; D4 u) H& {) E, d/ K
WWW and Databases2 c& w9 s1 d2 p# g' c3 Y+ F

5 n0 \- F7 `( k* [8 C9 U$ l  h4 TWorkflow Management and Databases
( p- X9 ~7 @, t& V- L8 Q4 r/ P+ m. y! f3 {, j# c
XML and Databases
" G4 l& x# c: \5 F7 l& a
1 g7 z3 f! P/ C0 HMultimedia Databases0 e+ i8 T4 m$ s$ w

0 m. v& u. V; R+ }Data modeling and architectures
5 g$ Q) r7 C& T# x( ^3 p, o
$ W8 j; s4 [+ b  W: @. OData streaming, data provenance and data quality
4 ^- u' i* _/ p4 p' K+ t5 s8 O- K3 ]) G4 z
Data Security, privacy, and data integrity
5 e9 E5 b3 h( c( Z7 o
& K8 D) l$ S2 D, E7 V; C. UWeb Data and the Internet" y- ^& X$ l( l
2 h- Q! J+ _' n& ~7 i
XML and databases, web services
" V" D3 T3 I9 V( V2 c- Y
0 _" h( J( u% L2 e: D/ ISemi-structured data, metadata, J5 B; Z# A( z; o3 v& B! R/ n

3 s+ T9 Y% j  ze-commence9 G5 v/ `% u% c- ?5 C3 T' ?  f/ g
% C8 y% L9 ~: X# B3 b* B) Z8 F
$ y2 ]) |* D' ^, u

; ]4 L# V+ O2 j& }# |$ K2. Data warehouse and Data mining5 T9 L+ C8 k+ G9 a% a
$ S; P$ W' ?+ G( |, K% e  ^
Grid/Parallel/distributed data warehousing5 z* r- A& T; p' p* K

7 y$ R6 k+ p* q+ C) ?. v' v+ dWeb/multimedia data warehouses* F. c* B( G, y7 D6 w7 [

4 }  \; f2 m. L8 LData warehousing and the semantic web- [! f3 E8 }( D3 ^& `
. T" }& r. z- U
Data warehousing with unstructured data; t$ ?# y8 r; [! I5 v# j

+ ?9 [% {- l& J$ r* \4 d2 Y( mIntegration of Data Warehousing
0 g5 u2 Q7 y6 }  f
9 L' l, ~1 G+ F9 y0 {7 pData and knowledge representation. G1 b2 u; i! {+ K+ D, J2 E

2 H1 I  ^! @6 |Languages and interfaces for data mining. t# c) |% ~( M* S7 _( y
/ r: r# L4 H( q9 k6 m
Data integration and interoperability7 E# _) t2 w2 ~. h) J1 T. G: l
" P/ Z# ?  C4 E: V" R6 [) ]3 _- m
Data extraction, cleansing, transforming and loading
* J: o- q; {* q$ U$ X  O
9 F+ z0 J% y& n3 J  g" HData mining and information extraction
# a/ O4 z1 V7 S& ?. U
: H. K7 f( Z! [- Q, JKDD Process and Human Interaction
& j) [0 P/ C7 M, j( r9 }9 u
+ V+ Y# k8 Z4 ?% |1 h, AOLAP and Data Mining; b2 v" [# P$ }/ r: S
$ _, ]: d/ E1 j4 d$ z" G* M
Parallel and Distributed Data Mining! w' Q7 N6 Z4 H

. K7 |  M- \, XPhysical database design and performance evaluation
8 D; i: F  U- P. V8 S* P2 |. X) b$ Y$ E) K& ~' Z6 `
Query processing and optimization
& a7 q. _! t/ z8 u( [1 }7 e. [
Reliability and Robustness Issues8 H3 W: M; \  u4 a7 M& u2 b! D

; D3 Y# y! a; B9 D" D4 f1 NSemantic web and ontology( M! S$ S, E. V
2 \! Z, [9 x1 O# O% o0 G5 M7 [( d
Software Warehouse and Software Mining
5 z+ s1 ]9 R- q$ M$ h' `( z- |4 D' C/ q0 ~% J6 ~2 Y/ y
Social and mathematical statistics
3 T. K; D# o1 h0 F& n3 Q! x9 y4 l( q
Novel data mining algorithms in traditional areas (such as classification, regression, clustering, probabilistic modeling, and association analysis)
. E% L4 j# i, Q! p# d# D1 P  I% F9 T7 Y/ b& ?  x/ J
Developing a unifying theory of data mining
. [, }( v- t% K$ i. @$ v6 t" G! ]. d* a1 o5 Y) Y
Mining sequences and sequential data
/ ]+ P' E) w" K8 p1 K% ]; l: H# `  O
Data pre-processing, data reduction, feature selection, and feature transformation ( c2 s3 j0 s5 X" U" Y0 l2 y
+ s! ^8 [) C. b
Quality assessment, interestingness analysis, and post-processing 3 L' j) u/ `8 @: t. j
  Z) C- ~" T/ w8 @9 q# o2 w7 f
Mining unstructured, semi-structured, and structured data
+ O8 `! W, a5 e) K8 r( t  q! B$ ?4 z4 T* S
Mining temporal, spatial, spatio-temporal data
) C' Y: v# x' E9 D% w0 Q
0 r% ~& [0 y9 R$ M" t( KMining data streams and sensor data+ Y7 e' I2 ?* U1 H
7 @4 y% ^8 o% g
Mining multimedia data
& x) t  p5 I2 J) p# u/ Q* _" t5 [7 M. r
Mining social network data. l* x, \; W9 I* O+ t

- i3 E, i7 c' z6 ]2 CHuman-machine interaction and visual data mining ) X. w3 l3 L  ?8 q

. U+ c) i) J4 ]3 ^6 X8 `0 BData mining applications (bioinformatics, E-commerce, Web, intrusion/fraud detection, finance, healthcare, marketing, telecommunications, etc)) y; g' W0 v8 Q

& o3 p6 X# o! O& A, L; c3 HKnowledge Acquisition & Management4 u! \3 _. b1 h/ J) i5 ^" G

6 q9 a, B2 C# n1 `! r! C* qKnowledge Modeling
: M, ^5 t* }) F( @3 @
, N" T. T5 f. L8 c* Z' J$ fKnowledge Processing; @; s  ^8 b3 `2 L* n6 S( M  t9 \
8 Y+ W, \! x& }( x& O
Integrated KDD applications and systems
) ^0 Y+ q5 R- Z  U! `/ b
2 `9 `4 H+ f! M! y" k6 RBusiness Process Intelligence
" t  d4 D& P1 e5 u) S% h* y
% Z3 P/ [% ?; w% ]Cluster Analysis and Knowledge Base system; C/ n( f% g, f) [* ]* |+ Q

( R  s8 D9 p- rInformation systems technology8 x! u" Q  w2 O( Y5 p
  p9 K1 {) n3 T2 z, g# `0 z/ a
Other related technology about data mining
" d+ A9 Y, f! ^* o1 A  l; |
: n* x1 f. J+ L1 U. K' p) }" k% o+ a% F+ ]. k+ Q3 K4 l4 o+ s  v
+ }) S. T. P. ^/ n2 b. t/ N& F
3. Computer Science and Related Technology
' |5 H4 U  x8 ]- r- |; v/ \0 W
" z9 P! G$ g+ a$ Y2 TImage and signal processing
% Z" c0 c6 E- c1 p
& B. R4 Y! f, bArtificial Intelligence
9 K# D' S! }; E0 [1 P; R' Q8 t7 ~& b) t9 ], }' _4 E, Z! s8 g( F
Software engineering & p0 u: y  |; @. V2 e9 e# ^
: Z9 y; e5 S! ]
Systems Engineering . v- K4 U  @. ]- _* S9 h- P7 `4 H

) K  u+ Y: f/ @" B) m' ]7 yComputer Graphics + z: |4 v1 E' u/ g. A# H

; u8 B9 l) Y- M: k! D! l( y0 dComputer Application ( @, x/ u" C) E) J% {& f, [9 I- `
! l9 P! |0 W: c
Control Technology 8 R% j! q2 H0 S" z; g; k7 V( L3 n  j
. h3 h/ |+ Y5 y( ]8 T# D$ G: [
Network Technology 9 D3 `9 [* Z" K& v) b& {7 _
) t( t1 N9 j7 K/ k  W0 |
Network security 4 _/ h; y3 ~; Y8 H0 z, ]8 t* O

2 Z, `/ f- R  C, N  q, QNumerical and symbolic computation
8 J& f, z7 S2 _" G  s  t# G* j$ E4 ?! P3 T' u$ c8 E. W3 L
Computer Modeling and Simulation
$ w! |# h6 b" J4 `( D' P$ A3 N" Y$ c) D" u" c7 V, j& T+ A4 @
Communication Technology
6 [- w" T* i- r% }1 y0 e5 A+ f5 Q  h: k" d9 h# Q
Algorithms and data structures
! A$ u1 {1 o' I( S. b" G" m9 `: l) n/ O2 L% H  Y% ?4 [! y0 }+ V
Computer Education
! r* K$ @3 Z  u0 s+ q
9 c! b6 R% Y3 I+ F  ]Other Advanced Technology0 B6 ]& N, Z/ b  w( P$ W/ R
7 H3 E1 U2 {! U. Q
" H: M6 A+ g$ @( _+ C) O! \7 w

6 l- q' I+ a( y% R" i======================================
0 n% H6 e& [+ s5 m/ O
/ [9 _( ~) h3 `) @; GDBTA2010会议联系秘书处: p! A% l7 r* D6 k
- v0 ]  \* {0 ?8 D* v$ w
% ?' h3 x7 L5 B* l- n- \1 P
' o7 T/ ?4 D$ |0 b
邮件: dbta2010@vip.sina.com, info@icdbta.org' p" l! G2 `! [* B3 {) K  J* g

  K, c3 w" _9 o9 z$ x- t* f7 h5 K1 \电话: +86-15102769170
"真诚赞赏,手留余香"
还没有人打赏,支持一下
楼主热帖
帖文化:【文明发帖 和谐互动】 社区精神:【创新、交流、互助、共享】
您需要登录后才可以回帖 登录 | 立即加入

本版积分规则

招聘斑竹

小黑屋|手机版|APP下载(beta)|Archiver|电力研学网 ( 赣ICP备12000811号-1|赣公网安备36040302000210号 )|网站地图

GMT+8, 2026-3-17 16:40

Powered by Discuz! X3.5 Licensed

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表