Skip to main content
. 2008 Jan 29;9:64. doi: 10.1186/1471-2105-9-64

Figure 1.

Figure 1

A simple network. Each box contains the numerical values obtained from Equation 2 from nodes A, F, G, H, I and O to other target nodes. The values for nodes P, Q, S, T, U, V and W are the same as node R's. Results for other nodes are not shown. Final identified clusters are delimited when the merging threshold 2.0 is used.

HHS Vulnerability Disclosure