Figure 8From: Identification of functional modules using network topology and high-throughput dataPerformance of the three proposed heuristics on simulated data. See Figure 2 for further details.Back to article page