This page last changed on Mar 28, 2011 by scott.

5.2.1 Funding Profiles of Three Universities (NSF Data)

Cornell.nsfIndiana.nsfMichigan.nsf  
Time frame: 2000-2009
Region(s): Cornell University, Indiana University, Michigan University
Topical Area(s): Miscellaneous
Analysis Type(s): Co-PI Network

Load 'Cornell.nsf', 'Michigan.nsf', and 'Indiana.nsf' using 'File > Load" and following this path: 'yoursci2directory/sampledata/scientometrics/nsf'.  Use the following workflow for each of the three nsf files loaded. Select each of the datasets in the Data Manager window and run 'Data Preparation > Extract Co-Occurrence Network' using the following parameters (Note that the Aggregation Function File is 'yoursci2directory/sampledata/scientometrics/properties/nsfCoPI.properties'):

Two derived files per dataset will appear in the Data Manager window: the co-PI network and a merge table.  

In the network, nodes represent investigators and edges denote their co-PI relationships. (To learn how the merge table can be used to further clean PI names, see section 5.1.4.2 Author Co-Occurrence (Bibliographic Coupling) Network.)

Choose the "Extracted Network on Column All Investigators" and run 'Analysis > Networks > Network Analysis Toolkit (NAT)' for each dataset. This will display the amount of nodes and edges, as well as the amount of isolate nodes that can be removed by running 'Preprocessing > Networks > Delete Isolates'.
Select 'Visualization > Networks > GUESS' and run 'Layout > GEM' followed by 'Layout > Bin Pack' to visualize the network. Run the 'yoursci2directory/scripts/GUESS/co-PI-nw.py' script. Visualizations of the three university's co-PI networks are shown in Figure 5.23. 

 

 
Figure 5.23: Co-PI network of Indiana University (top, left), Cornell University (top, right), University of Michigan (middle).

To see a more detailed view of any of the components in the network (e.g. the largest Indiana component) select the network with deleted isolates in the Data Manager:

Then, run 'Analysis > Networks > Unweighted & Undirected > Weak Component Clustering' with the parameter:

Indiana's largest component has 19 nodes, Cornell's has 67 nodes, and Michigan's has 55 nodes. Visualize Indiana's network in GUESS using the 'yoursci2directory/scripts/GUESS/co-PI-nw.py' script. Save the file as a jpg by selecting 'File > Export Image'. Use the "Browse…" option in the "Export Image – GUESS" popup window to select the folder in which you would like to save the image. 

Figure 5.24: Largest component of Indiana University co-PI network. Node size and color display the total award amount.

5.2.1.1 Database Extractions

Extended Version
This workflow uses the extended version of the Sci2 Tool. To know how to extend Sci2 view Section 3.2 Additional Plugins.

The Sci2 Tool supports the creation of databases for NSF files. Database loading improves the speed and functionality of data preparation and preprocessing. To load the Indiana NSF file as a database, go to 'File > Load > and select yoursci2directory/sampledata/scientometrics/nsf/Indiana.nsf.' In the "Load" pop-up window, choose "NSF database." Cleaning should be performed before any other task using 'Data Preparation > Database > NSF > Merge Identical NSF People'.
To view a breakdown of each investigator from Indiana, run 'Data Preparation > Database > NSF > Extract Investigators'. View the table – notice that next to each investigator will be listed their total number of awards, total as the PI and as a Co-PI, the total amount awarded to date, as well as their earliest award start date and latest award expiration date.

To create Co-PI networks like those from the previous workflows, simply run 'Data Preparation > Databases > NSF > Extract Co-PI Network' on the cleaned database. Delete the isolates by running 'Preprocessing > Networks > Delete Isolates'.
As before, to visualize the network, select 'Visualization > Networks > GUESS' and run 'Layout > GEM' followed by 'Layout > Bin Pack'. Run the 'yoursci2directory/scripts/GUESS/co-PI-nw_database.py' script to apply the standard Co-PI network theme.

Figure 5.25: Indiana University Co-PI network using databases.

5.2.2 Mapping CTSA Centers (NIH RePORTER Data)

CTSA2005-2009.xls  
Time frame: 2005-2009
Region(s): Miscellaneous
Topical Area(s): Clinical and Translational Science
Analysis Type(s): PI-Institution Network, Co-Authorship Network

Data doesn't always come in easily parsible formats. This study, a search for all recent grants to CTSA centers, requires some advanced searching and data manipulation to prepare the required data. The data comes from the union of NIH RePORTER downloads (see section 4.2.2.2 NIH RePORTER) and NIH ExPORTER data dumps (http://projectreporter.nih.gov/exporter/). Each CTSA Center grant was found and matched with its associated publications using a project-specific ID.

The resulting file, which contains all NIH Clinical and Translational Science Awards and their corresponding details from 2005-2009, is saved in an Excel file in 'yoursci2directory/sampledata/scientometrics/nih/CTSA2005-2009'. The file contains two spreadsheets, one with publications and one with grants. Save each spreadsheet out as grants.csv and publications.csv.
First load grants.csv in the Sci2 Tool using 'File > Load' and 'Standard csv format' in the "Load" pop-up. To view a bimodal network visualizing which main PIs associate with which institution, run 'Data Preparation > Extract Bipartite Network ' with the following parameters:

The resulting network can be visualized in GUESS and laid out using GEM, see Figure 5.26

.

Figure 5.26: Bimodal institution-PI network for CTSA Centers.
Now load publications.csv as a standard csv and create a co-authorship network by running 'Data Preparation > Extract Co-Occurrence Network' with text delimiter set to " ; ". The parameter for Column Name should be set to "author." The resulting co-authorship network has 8,668 nodes, 26 isolates, and 50,129 edges (see Figures 5.27 and 5.28).

Figure 5.27: Co-authorship network of CTSA Center publications

Figure 5.28: Largest connected component of CTSA Center publication co-authorship network

5.2.3 Biomedical Funding Profile of NSF (NSF Data)

MedicalAndHealth.nsf  
Time frame: 2003-2010
Region(s): Miscellaneous
Topical Area(s): Biomedical
Analysis Type(s): NSF Organization-Program Network

A NSF Organization-to-Program(s) bimodal network is exhibited here using data downloaded from the NSF Awards Search at (http://www.nsf.gov/awardsearch) on Nov 23th, 2009, using the query "medical AND health" in the title, abstract, and awards field, with "Active awards only" checked. This query yielded 286 awards (see section 4.2.2.1 NSF Award Search for data retrieval details).

Load 'yoursci2directory/sampledata/scientometrics/nsf/MedicalAndHealth.nsf' in NSF csv format and run 'Data Preparation > Extract Directed Network' with parameters:

Select "Network with directed edges from NSF Organization to Program(s)" in the Data Manager and run 'Analysis > Networks > Unweighted and Directed > Node Indgree. Then select "Network with indegree attribute added to node list" in the Data Manager and run 'Analysis > Networks > Unweighted and Directed > Node Outdegree'. Select the resulting "Network with outdegree attribute added to node list" and run 'Visualization > Networks > GUESS' followed by ' Layout > GEM' and 'Layout > Bin Pack'.

In graph modifier interface:

The resulting network is visualized in Figure 5.29.

Figure 5.29: Bimodal Network of NSF Organization to Program(s) of NSF Medical + Health Funding

5.2.4 Mapping Scientometrics (ISI Data)

5.2.4.1 Document Co-Citation

Scientometrics.isi  
Time frame: 1978-2008
Region(s): Miscellaneous
Topical Area(s): Scientometrics
Analysis Type(s): Document Co-Citation Network

Scientometrics is a discipline which uses statistical and computational techniques in order to understand the structure and dynamics of science. Here we use ISI data from the journal "Scientometrics" and Science of Science and Innovation Policy (SciSIP) data from NSF Awards Search.

Download ?Scientometrics.isi. Load the file using 'File > Load' and locating the downloaded file. This domain level dataset is ideal for document co-citation analysis, as the scale is large enough that the resulting network will paint a fairly accurate picture of document similarity within the domain of scientometrics.

Select the dataset "2126 Unique ISI Records" in the Data Manager window and run 'Data Preparation > Extract Paper Citation Network'.

Two files will appear in the Data Manager window: the paper-citation network and the paper information table.

Select the "Extracted paper-citation network" and run 'Preprocessing > Networks > Extract Nodes Above or Below Value' with the following parameters:

The produced network contains only the original ISI records. Select the resulting file and run 'Data Preparation > Extract Document Co-Citation Network'. Then, select the network and run 'Analysis > Networks > Network Analysis Toolkit (NAT)'. There are 2056 nodes, 26070 edges and 775 isolates in the network. Run 'Preprocessing > Delete Isolates' to remove all the isolates. Because this network is too dense to lay out in GUESS, run 'Visualization > DrL (VxOrd)' with the parameters:

Next, select "Laid out with DrL" in the Data Manager and run 'Visualization > Network > GUESS'. Run the following commands in the GUESS "Interpreter":

     >for n in g.nodes:
         if n.xpos is not None and n.ypos is not None:
             n.x = n.xpos * 10
             n.y = n.ypos * 10
     >resizeLinear(localcitationcount,1,50)
     >colorize(localcitationcount, gray, black)
     >resizeLinear(weight, .25, 8)
     >colorize(weight, "127,193,65,255", black)

Go to "Graph Modifier" and choose 'Object: nodes based on -> > Property: localcitationcount > Operators: >= > Value: 20 > Show Label'. See Figure 5.21.

Figure 5.30: Document co-citation network for Scientometric.isi in GUESS without DrL edge cutting (top) and with DrL (VxOrd) (bottom).

5.2.4.2 Geographic Visualization

Scientometrics.isi  
Time frame: 1978-2008
Region(s): Miscellaneous
Topical Area(s): Scientometrics
Analysis Type(s): Geospatial Analysis

Using the dataset loaded from section 5.2.4.1, select '2126 Unique ISI Records' in the Data Manager. To find the latitude and longitudes of the locations of researches publishing in Scientometrics, run Analysis > Geospatial > ?Yahoo Geocoder. Note that you will need a Yahoo Application ID in order to run this query. Enter your Yahoo Application ID (sign up for one here), "Address" for the Place Type, and the "Reprint Address" for the Place Column Name. Press 'OK'. This step may take several minutes to complete.


A new table will appear in the Data Manager labeled 'With Latitude & Longitude from 'Reprint Address'' containing all data from the initial table, plus columns with the Yahoo Geocoded Latitude and Longitude Coordinates. Select this file and run Visualization > Geospatial > ??Geo Map (circular annotations) using the parameters listed below.

Save and view the resulting visualization using the directions described at ?2.4 Saving Visualizations for Publication. This will be the result:

Figure 5.31: Scientometrics.isi geospatial visualization. Circle sizes represent times cited, colors represent publication year.

5.2.5 Burst Detection in Physics and Complex Networks (ISI Data)

AlessandroVespignani.isi  
Time frame: 1990-2006
Region(s): Indiana University, University of Rome, Yale University, Leiden University, International Center for Theoretical Physics, University of Paris-Sud
Topical Area(s): Informatics, Complex Network Science and System Research, Physics, Statistics, Epidemics
Analysis Type(s): Burst Detection

Burst Detection

A scholarly dataset can be understood as a discrete time series: in other words, a sequence of events/ observations which are ordered in one dimension – time. Observations exist for regularly spaced intervals, e.g., each month or year.

The burst detection algorithm (see Section 4.6.1 Burst Detection) identifies sudden increases or "bursts" in the frequency-of-use of character strings over time. This algorithm identifies topics, terms, or concepts important to the events being studied that increased in usage, were more active for a period of time, and then faded away.

An analysis of publications authored or co-authored by Alessandro Vespignani from 1990 to 2006 will be used to illustrate the "burst" concept. Alessandro Vespignani is an Italian physicist and Professor of Informatics and Cognitive Science at Indiana University, Bloomington. In his publications, it is possible to see a change in research focus - from Physics to Complex Networks - beginning in 2001.

Load Alessandro Vespignani's ISI publication history using 'File > Load' and following this path: 'yoursci2directory/sampledata/scientometrics/isi/AlessandroVespignani.isi'.

This analysis will detect the "bursty" terms used in the title of papers in the dataset. Since the burst detection algorithm is case-sensitive, it is necessary to normalize the field to be analyzed before running the algorithm. Select the table "101 Unique ISI Records" and run 'Preprocessing > Topical > Lowercase, Tokenize, Stem, and Stopword Text.' Check the "Title" box to indicate that you want to normalize this field:

Select the resulting "with normalized Title" table in the Data Manager and run 'Analysis > Topical > Burst Detection' with the following parameters:

The "Gamma" parameter is the value that state transition costs are proportional to. This parameter is used to control how ease the automaton can change states. The higher the "Gamma" value, the smaller the list of bursts generated.

The "Density Scaling" parameter determines how much 'more bursty' each level is beyond the previous one. The higher the scaling value, the more active (bursty) the event happens in each level.

The "Bursting States" parameter determines how many bursting states there will be, beyond the non-bursting state. An i value of bursting states is equals to i + 1 automaton states.

The "Date Column" parameter is the name of the column with date/time when the events / topics happens.

The "Date Format" specifies how the date column will be interpreted as a date/time. See http://java.sun.com/j2se/1.4.2/docs/api/java/text/SimpleDateFormat.html for details.

The "Text Column" parameter is the name of the column with values (delimiter and tokens) to be computed for bursting results.

The "Text Separator" parameters determines the separator that was used to delimit the tokens in the text column.

View the file "Burst detection analysis (Publication Year, Title): maximum burst level 1". On a PC running Windows, right click on this table and select view to see the data in Excel. On a Mac or a Linux system, right click and save the file, then open using the spreadsheet program of your choice.

In this table, there are six columns: "Word," "Level," "Weight," "Length," "Start," and "End."

The "Word" field identifies the specific character string which was detected as a "burst." The "Length" field indicates how long the burst lasted (over the selected time parameter).

The "Level" is the burst level of this burst. The higher burst level, the more frequent the event / topic happens.

The "Weight" field is the weight of this burst between its "Length". A higher weight could be resulted by the longer "Length", the higher "Level" or both.

The "Length" is the period of the burst. It is generated based on (Start - End + 1).

The "Start" field identifies when the burst began (again, according to the specified time parameter).

And the "End" field indicates when the burst stopped. A empty value in the "End" field indicates that the burst lasted until the last date present in the dataset. Where the "End" field is empty, put manually the last year present in the dataset. In this case, 2006.

After you add manually this information, save this .csv file somewhere in your computer. Load back this .csv file into Sci2 using 'File > Load'. Select 'Standart csv format' int the pop-up window. A new table will appear in the Data Manager. To visualize these table that contains the results of the Burst Detection algorithm, select the table you just loaded in the Data Manager and run 'Visualization > Temporal > Horizontal Bar Graph (not included version)' with the following parameters:

Horizontal bar graphs are used to visualize numeric data over time, generating labeled horizontal bars. A PostScript file containing the horizontal bar graph will appear in the Data Manager. 

Open and view the file using the workflow from Section 2.4 Saving Visualizations for Publication.

The resulting analysis indicates a change in the research focus of Alessandro Vespignani for publications beginning in 2001. For example, the bursting terms "fractal," "growth," "transform," and "fix" starting at 1990 are related to Vespignani's Ph.D., entitled "Fractal Growth and Self-Organized Criticality" in Physics. Other bursts also related to Physics follow these, such as "sandipil." After 2001, bursting terms like "complex," "network," "free," and "weight" appear, signifying a change in Vespignani's research area from Physics to Complex Networks, with a larger number of publications on topics like "weighted networks" and "scale-free networks."

Now, let's run the Burst Detection algorithm again for the same dataset but for a different value for the 'Gamma' parameter. Select the table 'with normalized Title' in the Data Manager and run 'Analysis > Topical > Burst Detection' with the following parameters:

Notice that the value for the gamma parameter is now set to 0.5. The parameter gamma controls the ease with which the automaton can change states. With a smaller gamma value, more bursts will be generated. Running the algorithm with these parameters will generate a new table named "Burst detection analysis (Publication Year, Title): maximum burst level 1.2" in the Data Manager.

Again where the "End" field is empty, put manually the last year present in the dataset. In this case, 2006.

After you add manually this information, save this .csv file somewhere in your computer. Load back this .csv file into Sci2 using 'File > Load'. Select 'Standart csv format' int the pop-up window. A new table will appear in the Data Manager. To visualize these table that contains these new results for the Burst Detection algorithm, select the table you just loaded in the Data Manager and run 'Visualization > Temporal > Horizontal Bar Graph (not included version)' with the same parameters.

A new PostScript file containing the horizontal bar graph will appear in the Data Manager. Once more, open and view the file using the workflow from Section 2.4 Saving Visualizations for Publication.

As expected, a larger number of bursts appear, and the new bursts have a smaller weight that those depicted in the first graph. These smaller, more numerous bursting terms permit a more detailed view of the dataset and allow the identification of trends. The "protein" burst starting in 2003, for example, indicates the year in which Alessandro Vespignani started to work with "protein-protein interaction networks," while the burst "epidem" - also from 2001 - is related to the application of complex networks to the analysis of epidemic phenomena in biological networks.

Visualizing Burst Detection in Excel

Its possible to generate a visualization for burst analysis in MS Excel. For this, open the results of the first burst analysis conducted ('Burst detection analysis (Publication Year, Title): maximum burst level 1') in MS Excel, by right clicking on this table in the Data Manager and selecting View.

To generate a visual depiction of the bursts in MS Excel perform the following steps:

1. Sort the data ascending by burst start year.

2. Add column headers for all years, i.e., enter first the start year in the cell of index G1, here 1990. As stated before, when there is no value in the "End" field that indicates that the burst lasted until the last date present in the dataset. So continue, e.g., using formula ‘=G1+1’, until highest burst end year, here 2006 in cell W1.

3. In the resulting word by burst year matrix, select the upper left blank cell (G2) and select ‘Conditional Formatting’ from the ribbon. Then select ‘Data Bars > More Rules > Use a formula to determine which cells to format.’ To color cells for years with a burst weight value of more or equal 10 red and cells with a higher value dark red use the following formulas and format patterns:

=AND(AND(G$1>=$E2,OR(G$1<=$F2,$F2="")),$C2>=10)

 
 
Select ‘OK’ and then repeat step three, using the formula below:
=AND(G$1>=$E2,OR(G$1<=$F2,$F2=""))


 
4. Once both formatting rules have been established, select ‘Conditional Formatting > Manage Rules’, highlight the first formatting rule and move to the top of the list:

 
5. Make sure both formatting rules are selected and apply them to current selection. Apply the format to all cells in the word by year matrix by dragging the box around cell G2 to highlight all cells in the matrix. The result for the given example is shown in Figure 5.33
 

 
 Figure 5.32.1: Visualizing burst results in MS Excel

5.2.6 Mapping the Field of RNAi Research (SDB Data)

RNAi  
Time frame: 1865-2008
Region(s): Miscellaneous
Topical Area(s): RNAi
Analysis Type(s): Co-Author Network, Patent-Citation Network, Burst Detection

The data for this analysis comes from a search of the Scholarly Database (SDB) (http://sdb.cns.iu.edu/) for "RNAi" in "All Text" from Medline, NSF, NIH and USPTO. A copy of this data is available in 'yoursci2directory/sampledata/scientometrics/sdb/RNAi'. The default export format is .csv, which can be loaded directly into the Sci2 Tool.


 
Figure 5.33: Downloading and saving RNAi data from the Scholarly Database.

To view the co-authorship network of Medline's RNAi records, go to 'File > Load' and open 'yoursci2directory/sampledata/scientometrics/sdb/RNAi/Medline_co-author_table(nwb_format).csv'_ in Standard csv format. SDB tables are already normalized, so simply run 'Data Preparation > Extract Co-Occurrence Network' using the default parameters:

According to 'Analysis > Networks > Network Analysis Toolkit (NAT)', the output network has 21,578 nodes with 131 isolates, and 77,739 edges. Visualizing such a large network is memory-intensive, so extract only the largest connected component by running 'Analysis > Networks > Unweighted and Undirected > Weak Component Clustering' with the following parameters:

 

Make sure the newly extracted network ("Weak Component Cluster of 6446 nodes") is selected in the data manager, and run 'Visualization > Networks > GUESS' followed by 'Layout > GEM'. A custom python script has been used to color and size the network in Figure 5.34.


Figure 5.34: The Medline RNAi Co-authorship Network

To visualize the citation patterns of patents dealing with RNAi, load 'yoursci2directory/sampledata/scientometrics/sdb/RNAi/USPTO_citation_table(nwb_format).csv'_ in Standard csv format and run 'Data Preparation > Extract Bipartite Network' using the following parameters:


Run 'Analysis > Networks > Unweighted & Directed > Node Indegree' to append Indegree attributes to each node, and then visualize "Network with indegree attribute added to node list" using 'Visualization > Networks > GUESS' followed by 'Layout > GEM' and 'Layout > Bin Pack'. In the graph modifier pane, use the following parameters and click "Do Resize Linear."

Then select "nodes based on ->" in the Object drop-down box, "bipartitetype" in the Property drop-down box, "==" in the Operator drop-down box, and "cited_patents" in the Value drop-down box. Press "Colour" and click on blue below.

Repeat the previous steps, but change the Value to "citing_patent" and select the color red. Now press "Show Label". The resulting graph should look like Figure 5.35.


Figure 5.35: USPTO Patent citation network on RNAi

The SDB also outputs much more robust tables, for example 'yoursci2directory/sampledata/scientometrics/sdb/RNAi/Medline_master_table.csv'. This table includes full records of Medline papers, and will be used to find bursting terms from Medline abstracts dealing with RNAi.

Load the file in Standard csv format and run 'Preprocessing > Topical > Lowercase, Tokenize, Stem, and Stopword Text' with the following parameters:

Select the "with normalized abstract" table in the Data Manager and run 'Analysis > Topical > Burst Detection' with the following parameters:

View the file "Burst detection analysis (date_cr_year, abstract): maximum burst level 1." There are more words than can easily be viewed with the horizontal bar graph, so sort the list by "Strength" and prune all but the strongest 10 words. Save the file as a new .csv and load it into the Sci2 Tool as a standard csv file.
Select the new table in the data manager and visualize it using 'Visualize > Temporal > Horizontal Bar Graph (not included version)' with the following parameters:

Save and view the resulting PostScript file using the workflow described in section 2.4 Saving Visualizations for Publication.


Figure 5.36: Top ten burst terms from Medline abstracts on RNAi Global Level Studies – Meso


worddav3e4ffaaa2d99c139625831924f011f71.png (image/png)
worddav2c4ad4c6f046b078a703a74d8edc2b7e.png (image/png)
worddav63b0716513537e819add8ee1c0aab70d.png (image/png)
worddava0a745770b36743067ef95616038671c.png (image/png)
worddav00f8100c994ae40757eafda720ea0996.png (image/png)
worddav131995d57523b062c384cc42e6f716a1.png (image/png)
worddav0c343b055df9077c9086f8827fe280a3.png (image/png)
worddav727d27279e0c89683c1f5269cf9159e2.png (image/png)
worddavbbf2e4a929357d49dc2eab2a70f99135.png (image/png)
worddav30dde80318d5b7ebaf2a8f238e0ab648.png (image/png)
worddav9d2cdddb7935b5f72bc39605ecc1ccc9.png (image/png)
worddavdb5f33c3b984cd43e1c95b50b430789f.png (image/png)
worddav8e95c70ea91f5848023fa1ec12ffeca9.png (image/png)
worddav3d3dbf36b43527cc81761359df23587c.png (image/png)
worddavfa7e9368766dcec777f17695f89c7369.png (image/png)
worddavd5f88ae4f97dbbcd06089e15ecb7e4a6.png (image/png)
worddava4bf073e6f43815e5f56d76b099cd197.png (image/png)
worddav3bf067c9e611e2e231da4a40a905288c.png (image/png)
worddavb59f726edb633c5bcfa407c764e1c505.png (image/png)
worddav02a37abf15b3396a87082cd0f2fd3764.png (image/png)
worddav7644b3d222ca9c7c8eb165c6eddfe9ac.png (image/png)
worddavf44941ff08efdd501909023c2ca111d9.png (image/png)
worddav6b263968d1a958e09d85bc1d5e007fc9.png (image/png)
worddav347ff68a9ba371b64c4c64e43de204bf.png (image/png)
worddav2aa65750823b60c86f5851d1a477e1da.png (image/png)
worddavd09b9fb5a5b7a3fefc6bae541aacd278.png (image/png)
worddav945cfd1d34ec293313d0965520ba3bfa.png (image/png)
worddav55bcb0c84840de2879e184f77690312a.png (image/png)
worddav7993a4af9fda8169b3b04ede2d269d5a.png (image/png)
worddavcdc4ffa504da55118cf0222482984c19.png (image/png)
worddavc3326ae9ab5c35d4360fc3ad9d3d524e.png (image/png)
worddavfecf79cfbf0317462e8ba31a6e0a8d0f.png (image/png)
worddavcd1235708825405a11246ddfff61e278.png (image/png)
worddav31fb9c4db719ab2e29aefc3a6152ec5a.png (image/png)
worddavcef62173c77de6013b32b4ea344afc90.png (image/png)
worddav15061b7631b454546f55543ba1bff7e0.png (image/png)
worddav72de1a0e482db30f65121baa61dfdeb6.png (image/png)
worddavf6ff46cf7a89af4bbe7b0d5ef92a04f4.png (image/png)
worddav5156fe42a46e044e1246382589206dbf.png (image/png)
worddavd5c119b109b65aa81a27f55233223732.png (image/png)
worddav6e61a5069224cbc0cd066ecd7ab441a2.png (image/png)
worddav0ce5fbdedab8d5f6688e034823b7dfec.png (image/png)
worddav6bb6bcdc0215653da5e62b3d25900811.png (image/png)
worddav4aa0f84096f06bc32bcc0af5b3e4a0b2.png (image/png)
worddav93ccb582cd19c4ea6510ca82f6a9349c.png (image/png)
worddavb681054e414bb2532e74cf826ddc72d1.png (image/png)
worddavb4914bc5117c082b1851aa4f1986da70.png (image/png)
worddavebb73e30eaa146f76afbbe32fdf9c9cd.png (image/png)
worddaveec4e74bee6194cf5d3d3c11533a3e44.png (image/png)
worddavaedfb1bcd20b759660dc8affb0ab2473.png (image/png)
worddav86e6f535fd7bdd9eef5cf8b7dc5357c6.png (image/png)
worddavb1ae27a554d3b3ea5670018435db9f80.png (image/png)
worddava175b212ec176c70e8d3b4ce935a29d8.png (image/png)
worddav6a6177731a672ff8f69fdeb11fba1ce5.png (image/png)
Sci2PopupExtractNetworkFromTable.jpg (image/jpeg)
Sci2figure5.23.jpg (image/jpeg)
Sci2figiure5.24.jpg (image/jpeg)
Sci2figure5.25.jpg (image/jpeg)
Sci2PopupExtractDirectedNetwork2.jpg (image/jpeg)
Sci2figure5.26.jpg (image/jpeg)
Sci2DataManagerExtractedNetwork.jpg (image/jpeg)
Sci2DataManagerExtractedNetworkNoIsolates.jpg (image/jpeg)
Sci2PopupWeakComponentCluster2.jpg (image/jpeg)
Sci2figure5.27.jpg (image/jpeg)
Sci2figure5.28.jpg (image/jpeg)
Sci2PopupExtractDirectedNetwork3.jpg (image/jpeg)
Document generated by Confluence on May 31, 2011 15:16