From: Towards early software reliability prediction for computer forensic tools (case study)
 | E1F1I1 | E2F2I1 | E2F3I2 | E2F3I3 | E3F3I3 | E4F3I3 | E1F4I3 | E1F1I4 |
---|---|---|---|---|---|---|---|---|
E1F1I1 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
E2F2I1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
E2F3I2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
E2F3I3 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
E3F3I3 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
E4F3I3 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
E1F4I3 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
E1F1I4 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |