Fig. 1From: Learning topic description from clustering of trusted user roles and event models characterizing distributed provenance networks: a reinforcement learning approachFlow chart or block diagram summarizing design of solution stepsBack to article page