Skip to main content
. 2012 Jul 20;3:155. doi: 10.3389/fpls.2012.00155

Figure 3.

Figure 3

A state-transition graph of example in Figure 2 showing asynchrony.

HHS Vulnerability Disclosure