- 在线时间
- 0 小时
- 最后登录
- 2010-5-4
- 注册时间
- 2010-4-14
- 听众数
- 3
- 收听数
- 0
- 能力
- 0 分
- 体力
- 49 点
- 威望
- 0 点
- 阅读权限
- 20
- 积分
- 18
- 相册
- 0
- 日志
- 0
- 记录
- 0
- 帖子
- 6
- 主题
- 4
- 精华
- 0
- 分享
- 0
- 好友
- 0
升级   13.68% 该用户从未签到
- 自我介绍
- 学、
 |
The 2nd International Workshop on Database Technology and Applications (DBTA2010)" y% `/ U6 r% D1 p
第二届IEEE数据库技术与应用国际会议-DBTA2010(DBTA2009已全部EI Compendex检索), P$ p; q3 I; ]3 b1 P5 i4 x
11月27-28,2010,武汉,中国
2 E8 b( D6 z; d8 r% E) ahttp://www.icdbta.org/
% k$ H5 p5 _+ F e' |, P
* I6 E$ |! c' k. B) Q! O! y论文提交日期: 2010年8月18日 e8 E+ s0 b% v2 f& @* t
论文录用通知日期: 2010年9月 16 日
6 O$ X9 O( J' F$ _: H论文修订版本提交日期: 2010年9月22日
1 ]) v7 W; Q. |+ s6 I+ w0 o! e论文注册日期: 2010年9月28日7 h* R6 ~) G5 m& {" ?9 h0 L
论文提交系统: http://www.icdbta.org/dbta2010/submission/2 d0 G9 e p: u2 b2 c, Z
会议论文模版: http://www.icdbta.org/dbta2010/instruct8.5x11.doc(只接受英文稿件)4 q4 d4 s0 r3 I( d8 g; j4 _. ^
IEEE会议论文版权表: http://www.icdbta.org/dbta2010/IEEECopyrightForm.doc (录用注册后提交)
" m, U/ h/ }1 j8 W( M* F- A, u9 T2 N. H! C
第二届IEEE数据库技术与应用国际会议(DBTA2010)将于2010年11月27-28日在中国-武汉召开。第一届IEEE数据库技术与应用国际会议(DBTA2009)全部收录的论文已经被EI Compendex检索。DBTA2010将由美国IEEE出版社出版,收录的论文将全部被ISTP和EI Compendex检索。会议优秀论文将被推荐选入EI或SCI国际期刊专刊发表。
/ n; a3 J0 k) D" ?7 B4 k% r: g+ q; m
欢迎研究员、工程师、教师和学生踊跃投稿,会议论文主题由以下领域构成,但并不局限于:
; n2 s% m7 T% F) h7 z" D: a0 r/ i
8 V7 M3 _3 q- ^0 @1. Database and Related Issue
# @6 I! d, |- q8 Y+ n$ `Temporal Data
; x7 R! U" e* `. S8 E! Y# ^Scientific Databases
& |7 Y9 ^$ g4 F% P5 r" m5 VBusiness database software
6 }4 q& u9 ]( g! R* \Computer data processing * O# b: J4 ^" ~( p2 d7 a/ t
Data processing services ! U; y& ?4 }0 s
Data processing supplies ; t8 i$ B: T: [4 V% m% \
Data processing systems! M ?* L! c) y G
Metadata Management( i: h- F- _) K1 R
Mobile Data and Information
; Q5 p* z& \0 L+ P4 j& H** Databases# |; y/ D( V" E
WWW and Databases, o$ w( ~: `* P0 |: M
Workflow Management and Databases& _0 j4 a2 q% l8 p/ l/ R
XML and Databases0 z8 c( \" W2 O: M2 @
** Databases2 w+ @) h8 m/ c! U
Data modeling and architectures
! c8 g4 T( c# [% \/ s6 j. O6 tData streaming, data provenance and data quality
1 T3 u$ N8 v7 k' UData Security, privacy, and data integrity
9 M# z4 Y8 G5 \6 n! uWeb Data and the Internet* j+ Z2 x* i2 A+ O( Z D
XML and databases, web services
( h' |4 |+ @5 L n7 {# S, u" ZSemi-structured data, metadata# w- D+ I+ }9 ]' S+ }8 ?
e-commence
( o/ c% I& F8 ^+ ^- y, { V* o. J( |9 F
2. Data warehouse and Data mining- w0 V) e! e0 _7 k, k) S2 G3 R
Grid/Parallel/distributed data warehousing2 T, L; ?4 W6 K- ]" T! J
Web/** data warehouses
2 f; i- m1 T. ~0 _2 lData warehousing and the semantic web
. V, v; d) ~1 ^Data warehousing with unstructured data3 D" k+ Z1 x5 ]/ F3 V0 O/ {
Integration of Data Warehousing
6 f2 i* @8 ]; Z5 f3 S2 QData and knowledge representation
: o+ c1 f" R4 [8 iLanguages and inte**ces for data mining
+ f0 L# Q/ B3 p5 w8 G/ YData integration and interoperability
" d/ \9 H4 P6 s( M" JData extraction, cleansing, transforming and loading1 ]( f5 Y" U7 \, R/ V$ k4 z
Data mining and information extraction' J$ w3 i" a% G/ m4 `' c2 I
KDD Process and Human Interaction
' M' B% Z' N& S2 T) L! e2 \OLAP and Data Mining
) ~" t$ B" Q! w5 E: u- U" U4 yParallel and Distributed Data Mining/ U/ P6 s9 H/ r, ?& b8 n7 B4 a
Physical database design and performance evaluation# {8 S, r9 \' c( `
Query processing and optimization
V/ m* J1 }, T! w# u6 P4 yReliability and Robustness Issues+ M* b5 |; X3 P+ n7 [
Semantic web and ontology
2 s: m8 W, U; z$ e# E6 zSoftware Warehouse and Software Mining$ B: @ h* o8 t; y
Social and mathematical statistics ] E3 B V! A5 Z% @/ |
Novel data mining algorithms in traditional areas (such as classification, regression, clustering, probabilistic modeling, and association analysis) : V. S* f5 z1 p
Developing a unifying theory of data mining
% t2 H5 V3 s. Q0 |: `Mining sequences and sequential data
$ Q0 m* N8 g& W$ |Data pre-processing, data reduction, feature selection, and feature transformation
5 P2 S3 H1 D0 L5 T. ~' ]Quality assessment, interestingness analysis, and post-processing 9 ?' n0 q" a% s0 s: w
Mining unstructured, semi-structured, and structured data1 y* S j$ O5 M) N0 P
Mining temporal, spatial, spatio-temporal data. A ?& v4 ~5 x* L4 m
Mining data streams and sensor data n+ Q& s2 Q1 `7 d
Mining ** data
. V5 j/ Y+ q' O* @4 ^" sMining social network data( \- M' {/ q8 K+ ?7 D. I; H
Human-machine interaction and visual data mining
4 @6 c9 J3 e% m" }: bData mining applications (bioinformatics, E-commerce, Web, intrusion/fraud detection, finance, healthcare, marketing, telecommunications, etc)
# M$ V- u/ }! f( ~8 yKnowledge Acquisition & Management* n5 f6 ?- o' I2 }) j0 V
Knowledge Modeling% L. R9 B# {9 P) _ d3 ~7 ?
Knowledge Processing* q% z# i# x: u4 s
Integrated KDD applications and systems 7 A( g, Y/ a% R/ i
Business Process Intelligence2 n( ^5 E# @( {& L3 _) {
Cluster Analysis and Knowledge Base system" x+ g( Y, b0 y }& e( }
Information systems technology
9 O! O% H+ b4 `2 p# p; C7 Y7 M8 LOther related technology about data mining
4 {$ L9 a1 o! E
' H8 B8 z* ?: \4 V3. Computer Science and Related Technology
' F* @. u4 B5 h7 O; SImage and signal processing 1 c) X+ E9 p1 ] Q/ I/ ^2 V
Artificial Intelligence
/ }: L' R2 R9 eSoftware engineering
7 Z3 a* [' ^& k/ ySystems Engineering ' X) U8 O/ k8 y& l' f# q; g+ E/ k
Computer Graphics & T; _( t U! {
Computer Application ! i# a% B& G8 B, M! E* J
Control Technology
, V! r+ |& k8 {, q" B+ k7 yNetwork Technology ! L% Z; ^7 l3 z$ [* s+ {. d
Network security
4 m! @7 J( w J& l3 nNumerical and symbolic computation6 l3 @) n4 ?4 t- M, X! I+ R" u
Computer Modeling and Simulation+ E% s+ q% a6 Q" N) p! Y
Communication Technology
: u) X$ R" q6 i3 G6 `Algorithms and data structures" r+ s( e' b0 \5 R" [( m
Computer Education6 F6 A5 J& z# M
Other Advanced Technology
1 i. s R! i+ H. C) a, [' m2 o. w% j- y5 h; r. `& g
======================================2 r! g2 i2 W3 \
DBTA2010会议联系秘书处
% m6 U# w% v1 D) n/ [/ C( h6 b |( n: p( _/ M! x( J
邮件: dbta2010@vip.sina.com, info@icdbta.org( m& k1 E T. Y5 {1 A
电话: +86-15102769170 q" w; \4 t4 g# h h d3 Z
====================================== |
zan
|