Cost effective software engineering using program slicing techniques

Muhammad Saleem*, Rasheed Hussain, Shaikh Mohsin, Yasir Ismail

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Abstract

Software Development is a complex and multidimensional task. Often software development faces serious problems of meeting key constraints of cost and time. Big projects which are well planned and analyzed, can end up in a disaster because of mismanagement in cost estimation and time allocation. Program slicing has unique importance in addressing the issues of cost and time. It is broadly applicable static program analysis technique which provides mechanism to analyze and understand the program behavior for further restructuring and refinement. In this paper, authors investigate the relationship between program slicing and software development phases on the basis of empirical studies conducted in the past and also establish the fact that how program slicing can be helpful in making software system cost and time effective.

Original languageEnglish
Title of host publicationProceedings of 2nd International Conference on Interaction Sciences
Subtitle of host publicationInformation Technology, Culture and Human
Pages768-772
Number of pages5
DOIs
Publication statusPublished - 2009
Event2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, ICIS 2009 - Seoul, Korea, Republic of
Duration: 24 Nov 200926 Nov 2009

Publication series

NameACM International Conference Proceeding Series
Volume403

Conference

Conference2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, ICIS 2009
Country/TerritoryKorea, Republic of
CitySeoul
Period24/11/0926/11/09

Keywords

  • Program code
  • Program slicing
  • Software cost and time
  • Software development phases

Fingerprint

Dive into the research topics of 'Cost effective software engineering using program slicing techniques'. Together they form a unique fingerprint.

Cite this