Exploiting Tractable Substructures in Intractable Networks