Works by Seba, Hamida
Results: 13
An efficient exact algorithm for triangle listing in large graphs.
- Published in:
- Data Mining & Knowledge Discovery, 2016, v. 30, n. 5, p. 1350, doi. 10.1007/s10618-016-0451-4
- By:
- Publication type:
- Article
An evaluation tool for backbone extraction techniques in weighted complex networks.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-42076-3
- By:
- Publication type:
- Article
An evaluation tool for backbone extraction techniques in weighted complex networks.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-42076-3
- By:
- Publication type:
- Article
Backbone extraction through statistical edge filtering: A comparative study.
- Published in:
- PLoS ONE, 2025, v. 20, n. 1, p. 1, doi. 10.1371/journal.pone.0316141
- By:
- Publication type:
- Article
Routing Protocol Based Quality of Service and Links Stability (RPQLS) for Future Internet of Vehicles.
- Published in:
- Wireless Personal Communications, 2023, v. 130, n. 3, p. 2013, doi. 10.1007/s11277-023-10369-5
- By:
- Publication type:
- Article
A Stable Link Based Zone Routing Protocol (SL-ZRP) for Internet of Vehicles Environment.
- Published in:
- Wireless Personal Communications, 2020, v. 112, n. 2, p. 1045, doi. 10.1007/s11277-020-07090-y
- By:
- Publication type:
- Article
Distance edge coloring and collision-free communication in wireless sensor networks.
- Published in:
- Networks, 2013, v. 62, n. 1, p. 35, doi. 10.1002/net.21491
- By:
- Publication type:
- Article
Addressing the Desert Kites Phenomenon and Its Global Range Through a Multi-proxy Approach.
- Published in:
- Journal of Archaeological Method & Theory, 2015, v. 22, n. 4, p. 1093, doi. 10.1007/s10816-014-9218-7
- By:
- Publication type:
- Article
The oldest plans to scale of humanmade mega-structures.
- Published in:
- PLoS ONE, 2023, v. 18, n. 5, p. 1, doi. 10.1371/journal.pone.0277927
- By:
- Publication type:
- Article
A review on graph-based approaches for network security monitoring and botnet detection.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 1, p. 119, doi. 10.1007/s10207-023-00742-7
- By:
- Publication type:
- Article
A lightweight key management scheme for wireless sensor networks.
- Published in:
- Journal of Supercomputing, 2015, v. 71, n. 12, p. 4400, doi. 10.1007/s11227-015-1534-5
- By:
- Publication type:
- Article
New data aggregation approach for time-constrained wireless sensor networks.
- Published in:
- Journal of Supercomputing, 2015, v. 71, n. 5, p. 1678, doi. 10.1007/s11227-014-1241-7
- By:
- Publication type:
- Article
Improving node embedding by a compact neighborhood representation.
- Published in:
- Neural Computing & Applications, 2023, v. 35, n. 9, p. 7035, doi. 10.1007/s00521-022-08076-6
- By:
- Publication type:
- Article