Skip to main content
. 2014 May 6;15:130. doi: 10.1186/1471-2105-15-130

Figure 5.

Figure 5

BicSPAM core steps.