"creating a matrix which having m rows and N columns, where m is a number of recovered digital files and N is a set of potential pirates, wherein each entry [j,i] contains said probabilistic value for a user i and a pirated digital file j, and" . . . .