Skip to main content
. 2013 Apr;14(2):91–110. doi: 10.2174/1389202911314020003

Fig. (7).

Fig. (7)

Coupled clustering method used by Rogers et al. [82].

HHS Vulnerability Disclosure