Skip to main content
. 2010 Mar 19;10:74. doi: 10.1186/1471-2334-10-74

Figure 1.

Figure 1

Flowchart of clients intercepted.