Skip to main content
. 2006 Dec 5;1:24. doi: 10.1186/1748-7188-1-24

Figure 2.

Figure 2

A simple network example. Each box contains the numerical values obtained from Equation 2 from nodes A, F, G, and H to other target nodes. Results for other nodes are not shown.

HHS Vulnerability Disclosure