{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:53Z","timestamp":1750308233495,"version":"3.41.0"},"reference-count":7,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2005,1]]},"abstract":"<jats:p>This paper describes a simple mathematical algorithm to determine the complexity of software that includes control flow and data flow. Two techniques are analyzed using examples to determine the overall complexity. One of them computes the determinant of a square matrix represented as an N2 chart. The other technique that is new and proposed in this paper computes the sum of products of control flow and data flow. It is shown that the determinant value fluctuates randomly whereas the new sum of product is a monotonic function that increases systematically with increasing complexity. This complexity number can be used to determine the amount of effort (cost and time) required for development and verification of software and whether or not the software can be deployed to perform safety-critical functions with high assurance.<\/jats:p>","DOI":"10.1145\/1039174.1039191","type":"journal-article","created":{"date-parts":[[2005,1,26]],"date-time":"2005-01-26T16:49:14Z","timestamp":1106758154000},"page":"1","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Complexity measurement of data and control flow"],"prefix":"10.1145","volume":"30","author":[{"given":"P. V.","family":"Bhansali","sequence":"first","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2005,1]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Halstead M. H. \"Elements of Software Science \" North-Holland 1997.   Halstead M. H. \"Elements of Software Science \" North-Holland 1997."},{"key":"e_1_2_1_2_1","volume":"2","author":"McCabe T. J.","year":"1976","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1988.0003"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/76380.76382"},{"key":"e_1_2_1_5_1","unstructured":"Lano R. J. \"A Technique for Software and Systems Design \" North-Holland 1979.  Lano R. J. \"A Technique for Software and Systems Design \" North-Holland 1979."},{"key":"e_1_2_1_6_1","unstructured":"Leveson N. G. \"Safeware: System Safety and Computers \" Addison-Wesley 1995.   Leveson N. G. \"Safeware: System Safety and Computers \" Addison-Wesley 1995."},{"key":"e_1_2_1_7_1","unstructured":"NUREG-0492 \"Fault Tree Handbook \" US Government Printing Office January 1986.  NUREG-0492 \"Fault Tree Handbook \" US Government Printing Office January 1986."}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1039174.1039191","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1039174.1039191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:43Z","timestamp":1750264303000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1039174.1039191"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,1]]},"references-count":7,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,1]]}},"alternative-id":["10.1145\/1039174.1039191"],"URL":"https:\/\/doi.org\/10.1145\/1039174.1039191","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2005,1]]},"assertion":[{"value":"2005-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}