/ t3 g" P$ f d9 p5 n第二届IEEE数据库技术与应用国际会议(DBTA2010)将于2010年11月27-28日在中国-武汉召开。第一届IEEE数据库技术与应用国际会议(DBTA2009)全部收录的论文已经被EI Compendex检索。DBTA2010将由美国IEEE出版社出版,收录的论文将全部被ISTP和EI Compendex检索。会议优秀论文将被推荐选入EI或SCI国际期刊专刊发表。 0 J" M1 K! m* ]' | ( ~' f; K; `# P0 O- t5 E欢迎研究员、工程师、教师和学生踊跃投稿,会议论文主题由以下领域构成,但并不局限于:6 [( b. Q. K/ G# C- F
; Z% H+ U, O; A# r' S1. Database and Related Issue $ [7 ?2 m( V- f3 C. I2 W9 x( ~4 {
Temporal Data; y; ? n( g! k+ D# e
Scientific Databases9 |5 x6 w* f1 j3 y
Business database software 9 q# e: t( q0 o$ lComputer data processing ' d9 w4 |; C0 b2 b5 N& i- E9 o
Data processing services / N! _! n9 B4 u: ?3 b L( WData processing supplies ' ~) o- a. A: vData processing systems $ k5 r! Y7 @0 i' a" }Metadata Management 1 n% E% |- M; C2 Z7 vMobile Data and Information6 b8 h0 O5 K* ?- |
** Databases1 m3 D% w3 z0 ~# r0 l
WWW and Databases - y" N) ? J; j) d: T; b$ HWorkflow Management and Databases! P& z- ~8 r3 }- d, G
XML and Databases9 a) r7 E+ c1 x* m
** Databases, ~+ c4 Y; T; Y& C3 B* |; a" n0 C
Data modeling and architectures % I! ]8 j6 p5 k+ q. G- B9 YData streaming, data provenance and data quality 0 u6 V/ \2 m( u, `Data Security, privacy, and data integrity 7 S, v5 {; D/ N7 K8 Q) `' ~Web Data and the Internet( l# ]' }# ?4 r2 I: D" Q/ N
XML and databases, web services . s# D# x9 b! y% @( }/ cSemi-structured data, metadata ( E# P n" \/ _2 ]+ C& ]1 T) _" Le-commence " I, g4 F9 R- d5 H% q6 e % V" \& b p0 \! B O2. Data warehouse and Data mining7 S6 @: U# I4 P" G. v1 _
Grid/Parallel/distributed data warehousing : M5 t) K: }) ?' \: Z8 ?: F [+ nWeb/** data warehouses 4 ]$ K& A W3 yData warehousing and the semantic web8 U6 G% \: Z5 m) a M B
Data warehousing with unstructured data 7 Z+ ?6 ~) X2 @9 J/ UIntegration of Data Warehousing+ e7 [* x7 u4 K# |
Data and knowledge representation $ n) U1 W$ @3 zLanguages and inte**ces for data mining ! F$ L" k( l) r' z" P+ X! P& aData integration and interoperability8 F) g. A$ n3 z) M6 t
Data extraction, cleansing, transforming and loading# A4 n) e7 O- j0 K" f! p5 m
Data mining and information extraction% L) I) n+ v! f; L! Q6 ]1 K
KDD Process and Human Interaction : G4 I5 a9 V$ u% a, ~' K" x YOLAP and Data Mining6 u& E6 X# w5 h1 I r
Parallel and Distributed Data Mining 4 N4 {2 N( ~" l1 I% sPhysical database design and performance evaluation 8 S! M, \! ]. m7 lQuery processing and optimization0 r1 F& I2 t" o/ G9 d7 T/ g
Reliability and Robustness Issues 9 d3 E& r( P4 x: ^2 c" ^" ^) k7 wSemantic web and ontology' K# b/ ]- U7 Q4 v8 s0 K
Software Warehouse and Software Mining 8 h2 [ I" A. V! ?, Q4 l) e0 J0 MSocial and mathematical statistics 4 S6 O% u+ V! p+ WNovel data mining algorithms in traditional areas (such as classification, regression, clustering, probabilistic modeling, and association analysis) 4 j# T) Q) L5 A/ b: T0 ]8 dDeveloping a unifying theory of data mining 6 S y5 @6 ^! ~/ R$ A. d
Mining sequences and sequential data2 ^; }5 P; |2 c( p% q H) x
Data pre-processing, data reduction, feature selection, and feature transformation 5 K% p+ Z5 E) H+ i% _, dQuality assessment, interestingness analysis, and post-processing / b8 \7 e) r( ^0 b1 ZMining unstructured, semi-structured, and structured data 6 G8 C1 H: h* E0 sMining temporal, spatial, spatio-temporal data0 X7 w3 T6 _- J- `
Mining data streams and sensor data. w" B" N( T2 V q4 ~# F6 l1 S
Mining ** data. Q C6 x3 }- d6 T4 K2 m
Mining social network data, Z5 r8 \$ v* M7 l: b& d8 p
Human-machine interaction and visual data mining : ]5 |7 S* B% \, [+ H6 W! _; X q. c
Data mining applications (bioinformatics, E-commerce, Web, intrusion/fraud detection, finance, healthcare, marketing, telecommunications, etc): l/ q8 t1 u" z+ _; {+ L: K
Knowledge Acquisition & Management 1 S V, X' s2 r8 nKnowledge Modeling# ?- K! V; p, `2 x( Y
Knowledge Processing* A" t/ W- ~! F5 Z. A
Integrated KDD applications and systems 9 t& a; m, r _+ m8 M) r; Z( ?$ g i& R
Business Process Intelligence . \' ?$ O, e$ b0 k7 UCluster Analysis and Knowledge Base system 0 [$ d! \; E0 L# O( DInformation systems technology 4 s0 X% _/ M# K0 h" L5 R. `' gOther related technology about data mining: M5 b C, M8 m( z6 Z
8 ? R6 S/ l. Z3. Computer Science and Related Technology * s3 E' t" t- H% j4 I/ Y; I0 |! R
Image and signal processing ~' B4 }3 U0 n; r/ a+ T# zArtificial Intelligence + X( g2 m8 B- d4 a7 Y+ |. {! x, k" I
Software engineering , V- [* y! D1 F* X8 p! u
Systems Engineering ( h/ ~1 \$ Z' O
Computer Graphics 6 l0 A' {$ w P6 V* N! c- KComputer Application ' F* J0 }8 U& O+ B8 j
Control Technology 5 A5 {4 q- f- `3 cNetwork Technology ) s; I; a# v+ a0 v" ?Network security / r7 I: U( a7 R, z! u
Numerical and symbolic computation7 L W3 F6 L- D& j W
Computer Modeling and Simulation0 T! h6 C( _5 j& V. U( u( i3 b
Communication Technology 4 g3 w& }2 V gAlgorithms and data structures ) Y6 v; }' v" [- y3 @; P" uComputer Education2 f( J1 u7 Z; ~
Other Advanced Technology 3 h8 q; q3 Y" q4 y* v $ f" T9 t9 u0 p4 e# Y1 l/ F/ b- U: ?====================================== 7 ]- n# }+ w! d0 ~DBTA2010会议联系秘书处 : P0 m+ o( l. j3 p) p8 L9 F" x; o# Z3 @8 J0 g8 p2 m) K
邮件: dbta2010@vip.sina.com, info@icdbta.org : K% a0 _- L* y电话: +86-15102769170( P i- v4 t, i. C, |! J8 X
======================================作者: 数学者 时间: 2010-5-9 13:35
逛逛~作者: liuxn_2005 时间: 2010-5-11 19:36
顶一下!!!!!!!!!!!!!!!!!!!!!作者: wuyemin 时间: 2010-6-7 03:11
好东东~~~~~哇哇哇哇~~