Research Article
Research on Cross-Company Defect Prediction Method to Improve Software Security
Figure 4
Schematic diagram of clustering-based metric matching. (a) Original datasets, (b) data preprocessing, (c) metric clustering, (d) metric matching, (e) metric arrangement, and (f) final datasets.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |