Skip to main content
. 2013 Apr;14(2):91–110. doi: 10.2174/1389202911314020003

Fig. (2).

Fig. (2)

Hidden node analysis reveals new node X5. The dotted line represents the connectivity before hidden node analysis and the solid line reresents the connectivity after hidden node analysis.

HHS Vulnerability Disclosure