Homepage Download Link broken?

Captcha verification code

License: Freeware

Version: 2.7.0

Release date: 2013-03-18

Company: IPK-Gatersleben

Language: English

Size: 10 K

Category: Networking

OS support: Windows

MAVisto is a tool for the exploration of motifs in network. It provides a flexible motif search algorithm and different views for the analysis and visualisation of network motifs. MAVisto is written in Java and is based on Gravisto, an editor for graphs and a toolkit for implementing graph algorithms. It is available free of charge and can be used with Java Web Start. To start the tool click on the address or open it with javaws: homepage The following screen-shot shows the application of MAVisto:

New Features of MAVisto. For further details please look at the tutorial site.
- Highlighting of the coverage of network element by motif matches
The coverage of network elements by motif matches is highlighted by using a color scale or a gray scale. This allows a visual exploration of the distribution of the matches within the analysed network.
- Highlighting of network covering of motif label derivatives.
Now it is possible for motif label derivatives (see next point) to highlight the networks elements which are covered by their matches. Therefore, it is possible to analyse which parts/elements of the network are affected by the matches of a motif label derivative and which parts/elements are not affected.
- Analysis of networks with labelled edges and/or vertices (colored networks).
For each motif all different label derivatives can be analysed. Motif label derivatives belong to the same topological motif but differ in the labels of their edges, in the labels of their vertices or both, in the labels of their edges and vertices. These three different types of analyses can be performed with MAVisto by considering only edge labels, only vertex labels or both, edge and vertex labels. The number of different edge labels or vertex labels of a network is not restricted.
- Coloring of the edge types of a network.
The different edge types (identified by their label) can be highlighted with different colors to obtain a better overview of the distribution of the edge types within the analysed network.
- Exclusion of particular edges from randomization.
The labels of the edges of the analysed network are used to arrange the edges into particular groups of edge types according to their edge label. It is possible to exclude the edges of certain edge types from the network randomization process in order to allow for example for a discrimination of regulatory edges and structural edge when analysing the statistical significance of motifs.

File Distribution Notice of MAVisto Freeware -
MAVisto Free Download - 2000 Shareware periodically updates software information of MAVisto from the publisher, so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using MAVisto crack, password, registration codes, key generators, serial numbers is illegal.

Review MAVisto

  • captcha

Related Downloads

Analysis-Analyze-Motif-Motif Analysis-Network Motif-Analyze Network

OlapX Web Control 4.0

OlapX Web is a sophisticated multidimensional database browsing ActiveX control for web applications. It enables the creation interactive analysis, reporting and presentation of Microsoft's Analysis Services databases. Designed for users at any...

OlapX Client Server Control 4.0

OlapX Cliente Server Developer is a sophisticated multidimensional database browsing ActiveX control for developing new applications. It enables the creation interactive analysis, reporting and presentation of Microsoft's Analysis Services databases....

UltraSniff Network Sniffer 3.20

UltraSniff is a powerful network sniffer, It can capture network packets, monitor network traffic,detect bottlenecks and analyze network related problem. UltraSniff provides detailed network statistics and charts to network administrators for helping...


Ethereal 3.1

This application is what people usually call a "Sniffer". You can use Ethereal to monitor network traffic. That will help you analyze network problems, detect intrusion attempts, Monitor usage, collect statistics, filter content from...

WildPackets OmniPeek

WildPackets OmniPeek 6.6

OmniPeek gives network engineers real-time visibility and Expert Analysis into every part of the network from a single interface, including Ethernet, Gigabit, 10 Gigabit, 802.11a/b/g/n wireless, VoIP, and Video to remote offices. Using...


Bytemon 1.3

Bytemon is a network and resource performance monitoring application, intended to give administrators real-time information about the condition of networks and servers, while at the same time providing historical data and charts for reporting,...

Intrusion Detection System - Sax2 4.7

Ax3soft Sax2 is a professional intrusion detection and prevention system (IDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and...


NetStress 2.0

In order to test and troubleshoot networks we need tools that allow us to generate network traffic and analyze the network's throughput performance. This is true for both wired and wireless networks. It focuses strictly on 802.11 (WiFi) networks...

Bytemon Network Monitor

ByteMon is a MRTG-like network monitoring solution (SNMP, WMI, Packet Filtering), giving administrators real-time information about the condition of networks and servers, while at the same time providing historical data and charts for reporting,...

MAC - IP Scanner for Win7 2.0

MAC - IP Scanner for Win7 is the world leading tool for network management and network analysis. This famous tool is designed for both network administrators in the office and LAN users at home. MAC - IP Scanner for Win7 keeps your networks under...

What Is An Sn For Mp3 Rocket - What Is Zoom Tool For Publisher - Latest Project Based On Java - An Avatar For Online Web Camera - Create An Avatar For Yahoo - Free Horoscope Match Based On Tamil - Java And Jar Theme - Magic Photo Editor For Java - On Air Fm Radio For Iphone - Pdf Reader And Editor For Nokia X2 

Related Press Releases

Thales: Organizations In Brazil Increase The Deployment Of Encryption In Response To Compliance Regulations and Cyber Attacks by Thales e-Security Media Relations

SÃO PAULO ---- Thales, leader in information systems and communications security, today releases the 2011 Brazil Encryption Trends Study. The report reveals that there is a growing awareness in Brazil of data security risks and deployment of......

UNH-IOL Staff Provides Computer Science Enrichment Classes To 8th Graders At Dover Middle School by The University Of New Hampshire InterOperability Laboratory

DURHAM, N.H. ---- The University of New Hampshire InterOperability Laboratory (UNH-IOL), an independent provider of broad-based testing and standards conformance services for the networking industry and employer of over 120 college students,......

Rackspace Launches Cloud Monitoring To Help Companies Proactively Track The Health Of Their Cloud and Web Infrastructure Hosted Anywhere by Rackspace

SAN ANTONIO ---- Today, Rackspace® Hosting (NYSE: RAX), the open cloud company, announced the release of Rackspace Cloud Monitoring, a flexible and highly scalable solution that empowers customers to track the health of their infrastructure -......

SRA To Provide IT Systems Development, Maintenance and Integration Services For Office Of Justice Programs’ Office Of The CIO by SRA International, Inc.

FAIRFAX, Va. ---- SRA International, Inc., a leading provider of technology and strategic consulting services and solutions to government organizations, today announced it is has been selected by the U.S. Department of Justice (DOJ) to continue......

The Lies Of CSI: Survey Exposes Surveillance Myths Created By TV Crime Dramas Versus Reality Of Today’s Security Technology by Axis Communications

MISSISSAUGA, Ontario ---- Canadians are hooked on crime dramas, and some shows are so convincing that our perception of what forensic technology can do has been skewed – especially when it comes to video surveillance. According to a survey by......