Java is one of the world’s most important and widely used computer languages, and it has held this distinction for many years. Unlike some other computer languages whose influence has weared with passage if time, while java’s has grown.

IEEE 2015 - 2016 Data Mining
1.Malware Propagation in Large Scale Networks





Abstracts Base Paper Enquiry
2.Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection





Abstracts Base Paper Enquiry
3.Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge





Abstracts Base Paper Enquiry
4.Context-Based Diversification for Keyword Queries over XML Data





Abstracts Base Paper Enquiry
5.Towards Effective Bug Triage with Software Data Reduction Techniques





Abstracts Base Paper Enquiry
6.Mining weakly labeled web facial images for search based face annotation





Abstracts Base Paper Enquiry
7.Best Keyword Cover Search





Abstracts Base Paper Enquiry
8.Data Mining Based Crime Investigation Systems Taxonomy and Relevance





Abstracts Base Paper Enquiry
9.Discovery of Ranking Fraud for Mobile Apps





Abstracts Base Paper Enquiry
10.Efficient heart disease prediction system using decision tree





Abstracts Base Paper Enquiry
11.Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word





Abstracts Base Paper Enquiry
12.Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites





Abstracts Base Paper Enquiry
13.Scalable Feature Selection in High-Dimensional Data Based on GRASP





Abstracts Base Paper Enquiry
14.Towards Secure Cryptographic Software Implementation Against Side Channel Power





Abstracts Base Paper Enquiry
15.Filtering Mechanism for Unwanted Messages on OSN User Wall Using CBMF





Abstracts Base Paper Enquiry
16.Smart Crawler A Two stage Crawler for Efficiently Harvesting Deep Web Interfaces





Abstracts Base Paper Enquiry
17.EMR A Scalable Graph based Ranking Model for Content based Image Retrieval





Abstracts Base Paper Enquiry
18.Progressive Duplicate Detection





Abstracts Base Paper Enquiry
19.On Summarization and Timeline Generation for Evolutionary Tweet Streams





Abstracts Base Paper Enquiry
20.Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services





Abstracts Base Paper Enquiry
21.Structured Learning from Heterogeneous Behavior for Social Identity Linkage





Abstracts Base Paper Enquiry
22.t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation





Abstracts Base Paper Enquiry
23.Sparsity Learning Formulations for Mining Time-Varying Data





Abstracts Base Paper Enquiry
24.Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts





Abstracts Base Paper Enquiry
25.Scalable Constrained Spectral Clustering





Abstracts Base Paper Enquiry
26.Anonymizing Collections of Tree-Structured Data





Abstracts Base Paper Enquiry
27.Security Evaluation of Pattern Classifiers under Attack





Abstracts Base Paper Enquiry
28.Real-Time Detection of Traffic From Twitter Stream Analysis





Abstracts Base Paper Enquiry
29.Rule-Based Method for Entity Resolution





Abstracts Base Paper Enquiry