5 @" j* j; ? P0 {第二届IEEE数据库技术与应用国际会议(DBTA2010)将于2010年11月27-28日在中国-武汉召开。第一届IEEE数据库技术与应用国际会议(DBTA2009)全部收录的论文已经被EI Compendex检索。DBTA2010将由美国IEEE出版社出版,收录的论文将全部被ISTP和EI Compendex检索。会议优秀论文将被推荐选入EI或SCI国际期刊专刊发表。 + o( ~3 `# ^; E) ?, y( ` G H$ n$ P' P) j欢迎研究员、工程师、教师和学生踊跃投稿,会议论文主题由以下领域构成,但并不局限于:) c/ k0 l$ _. U0 D
* J; `+ I$ w: r s) g$ K/ G; B# M
1. Database and Related Issue / i. r# B1 z6 i
Temporal Data 7 U0 S0 J- M9 Q7 RScientific Databases ; T \1 `, E: M7 S% LBusiness database software 9 J7 {- \, K5 UComputer data processing . \( w" M# h% n. s- v2 I5 bData processing services 5 s. e+ t, k8 x6 v" d; ~5 k% l) ?Data processing supplies 6 v$ }% f$ Y8 ~! k$ B; v& w
Data processing systems1 l5 w1 t2 u; ]. _
Metadata Management 2 Y X- T& D' y* u! b5 ^Mobile Data and Information 8 D0 x5 p$ \' P+ u** Databases8 e; \. C0 N Q& h/ n+ e
WWW and Databases# a3 W9 S3 [3 ^& w
Workflow Management and Databases" d3 t" ], U2 v, C) J
XML and Databases 0 A7 g P7 \8 c9 @; Q5 t3 [7 E- x** Databases `( J" o/ N' B
Data modeling and architectures: Z' I8 q7 r% `& r
Data streaming, data provenance and data quality 4 `2 S% f# U) {% T# JData Security, privacy, and data integrity , D w2 P& ?/ M+ s$ L
Web Data and the Internet " k* n" I5 h. S* h' dXML and databases, web services ) L3 c6 P& f0 |Semi-structured data, metadata * ]1 f6 ?, t3 Y. ~9 je-commence 7 U' { U& Q/ ^* \7 B! Y! m9 g& g $ P8 s% P6 `$ G: }+ ~2. Data warehouse and Data mining 5 l( n$ A) A( u% t6 c' W {# lGrid/Parallel/distributed data warehousing , |4 T, J* y( D. G5 |9 X TWeb/** data warehouses / U8 v2 \* H0 z, z' x+ l5 uData warehousing and the semantic web9 a- d+ j/ \, j, o+ W# S3 J$ x
Data warehousing with unstructured data! s6 t9 c/ ~# b# [
Integration of Data Warehousing 1 Y& n) W8 x) v8 PData and knowledge representation ) N3 n" Y5 T: O+ m+ i1 y% [* ?Languages and inte**ces for data mining 2 _3 g b9 e0 R5 I" gData integration and interoperability 0 q. `: O+ ^ t) Z5 sData extraction, cleansing, transforming and loading & v5 x. J, R' J! r, M3 \Data mining and information extraction5 A' X: x* {. j& b3 o
KDD Process and Human Interaction 1 b, S$ K- b. ~3 ^7 FOLAP and Data Mining; e! F- v7 m4 o& T
Parallel and Distributed Data Mining & h8 {) o4 W4 J$ S, W& @1 VPhysical database design and performance evaluation $ |- r" I& a6 E$ {; UQuery processing and optimization 5 \3 V: B8 |: g8 B2 `& JReliability and Robustness Issues , w3 x, v* Y. t, YSemantic web and ontology+ U" @. `3 \( K
Software Warehouse and Software Mining& Z2 V$ Q8 N ^. u2 n) |( }% a, r
Social and mathematical statistics" O2 _1 |3 y; O) m& B8 `' o j
Novel data mining algorithms in traditional areas (such as classification, regression, clustering, probabilistic modeling, and association analysis) 6 o0 g2 k7 ]3 s/ _7 O
Developing a unifying theory of data mining # a! w9 D0 C5 Q8 zMining sequences and sequential data- N7 q" p/ i7 J# l
Data pre-processing, data reduction, feature selection, and feature transformation + h' v6 _ t; {8 w
Quality assessment, interestingness analysis, and post-processing - f0 b- [7 t( w) h! o- X" f9 f5 qMining unstructured, semi-structured, and structured data+ u9 I3 G+ G* j( a
Mining temporal, spatial, spatio-temporal data. Q. y. ^* f$ p- p2 L8 D% k5 V
Mining data streams and sensor data: C7 {/ Z3 W- h% ~- {
Mining ** data 6 _; W* L6 S ^1 yMining social network data 5 K8 S. R4 F/ Z! z7 \Human-machine interaction and visual data mining 4 D7 w( p9 a# v; c! k- u
Data mining applications (bioinformatics, E-commerce, Web, intrusion/fraud detection, finance, healthcare, marketing, telecommunications, etc) ! E8 k' x* M! Z7 g, t. |Knowledge Acquisition & Management ; h* |8 @) p& |! h6 r' QKnowledge Modeling/ z# y/ l5 U% H% v- m' }( E3 w
Knowledge Processing2 t, x5 D, d: H
Integrated KDD applications and systems 5 s5 x* S% i0 i
Business Process Intelligence0 E! P% j" ~1 I8 t8 O
Cluster Analysis and Knowledge Base system , w" F: v+ Q P, ?1 bInformation systems technology5 u$ {4 C. ~* g2 }# t) m
Other related technology about data mining* c/ @4 w* O$ r1 z2 R- s$ D) _5 |
7 A7 T; Y# f" S5 F9 m* Q- f3. Computer Science and Related Technology ; z5 Q. s( u8 Y- o; i# I" K$ W
Image and signal processing : `* ]" f+ q! c+ N# W3 VArtificial Intelligence * r: a2 y8 d: l1 y/ X+ y# M& u
Software engineering - Y/ z2 b4 i+ _- E; a
Systems Engineering + L! o) {9 C5 Q7 AComputer Graphics : @. j, Z* ~* S. {. A
Computer Application , K8 y2 ~3 {- y2 b1 WControl Technology 2 L$ R5 k* R% y2 A% F t
Network Technology * C' ]0 _0 E ~) Y$ p8 @6 ONetwork security 4 S8 O* n" n' ]: n5 {2 ^Numerical and symbolic computation* i7 [- O/ Y/ |5 @3 P4 d C0 V2 u
Computer Modeling and Simulation% k, y- ~7 p5 o6 [! k
Communication Technology : g9 f% U* T* d+ z- r9 J- v
Algorithms and data structures, Y+ z, ^/ i9 b: N; P
Computer Education6 U4 w% H2 E4 C
Other Advanced Technology * Z5 b) x8 o" D4 v9 y: E 9 E$ I) o' I9 {: Z2 I; O6 X====================================== % x2 z- e9 x5 r) z! LDBTA2010会议联系秘书处 + V# \0 ]4 \7 m7 M) _( |' X0 y1 P* [8 R2 A$ T
邮件: dbta2010@vip.sina.com, info@icdbta.org 2 L* D0 v- F& S2 y电话: +86-15102769170! k: y& I% {; Y5 p; K
======================================