In order to verify the effectiveness and correctness of the algorithm, this paper will implant defects in the real software source code, the spread of statistical defects in the entire software system size, verify the effectiveness of key node identification methods.
正在翻譯中..
