Skip to main content
. 2008 Jul 28;9:322. doi: 10.1186/1471-2105-9-322

Table 1.

The clusters of the two networks in Figure 2.

Network N1 Network N2
{B, C} {B, C}
{C, D} {C, D}
{B, C, D} {B, C, D}
{D, E} {D, E}
{E, F} {E, F}
{D, E, F} {D, E, F}
{B, C, D, E, F} {B, C, D, E, F}
{A, B, C} {A, B, C}
{A, B, C, D} {A, B, C, D}
{A, B, C, D, E, F} {A, B, C, D, E, F}
{E, F, G} {E, F, H}
{D, E, F, G} {D, E, F, H}
{G, H} {G, H}
{D, E, F, G, H} {D, E, F, G, H}

A table of the (nontrivial) clusters of the two networks N1 and N2 in Figure 2, denoted by C(N1) and C(N2), respectively, in the text. Highlighted are rows corresponding to clusters that differ between the two networks.

HHS Vulnerability Disclosure