Fig. 3From: Towards early software reliability prediction for computer forensic tools (case study)“Add Evidence Item” (part 1) & “Generate Hash” (part 2) sequence diagramsBack to article page