Research Article
Research on Cross-Company Defect Prediction Method to Improve Software Security
Figure 4
Schematic diagram of clustering-based metric matching. (a) Original datasets, (b) data preprocessing, (c) metric clustering, (d) metric matching, (e) metric arrangement, and (f) final datasets.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |