Research Article

Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation

Figure 8

IC Model simulation results for different Tar versions.