952
Views
31
CrossRef citations to date
0
Altmetric
Original Articles

Critical chain project buffer sizing based on resource constraints

, &
Pages 671-683 | Received 02 Jun 2015, Accepted 04 Jun 2016, Published online: 20 Jun 2016

References

  • Ahlemann, F., F. El Arbi, M. G. Kaiser, and A. Heck. 2013. “A Process Framework for Theoretically Grounded Prescriptive Research in the Project Management Field.” International Journal of Project Management 31 (1): 43–56.10.1016/j.ijproman.2012.03.008
  • Asady, B. 2013. “Trapezoidal Approximation of a Fuzzy Number Preserving the Expected Interval and including the Core.” American Journal of Operations Research 3 (2): 299–306.10.4236/ajor.2013.32027
  • Bevilacqua, M., F. E. Ciarapica, and G. Giacchetta. 2009. “Critical Chain and Risk Analysis Applied to High-risk Industry Maintenance: A Case Study.” International Journal of Project Management 27 (4): 419–432.10.1016/j.ijproman.2008.06.006
  • Bie, L., N. Cui, and X. Zhang. 2012. “Buffer Sizing Approach with Dependence Assumption between Activities in Critical Chain Scheduling.” International Journal of Production Research 50 (24): 7343–7356.10.1080/00207543.2011.649096
  • Chu, C. C. 2008. “Buffer Sizing and Critical Chain Management.” Computer Integrated Manufacturing Systems 14 (5): 1029–1035.
  • Cleden, D. 2009. Managing Project Uncertainty. Farnham: Gower Publishing Limited.
  • Colin, J., and M. Vanhoucke. 2015. “A Comparison of the Performance of Various Project Control Methods Using Earned Value Management Systems.” Expert Systems with Applications 42: 3159–3175.10.1016/j.eswa.2014.12.007
  • Ellis, G. 2015. “Critical Chain Project Management (CCPM).” In Project Management in Product Development. Leadership Skills and Management Techniques to Deliver Great Products. Waltham, MA: Elsevier.
  • Fallah, M., B. Ashtiani, and M. B. Aryanezhad. 2010. “Critical Chain Project Scheduling: Utilizing Uncertainty for Buffer Sizing.” International Journal of Research and Reviews in Apllied Siecnces 3 (3): 280–289.
  • Goldratt, E. M. 1997. Critical Chain: A Business Novel. Great Barrington, MA: North River Press.
  • Herroelen, W., and R. Leus. 2001. “On the Merits and Pitfalls of Critical Chain Scheduling.” Journal of Operations Management 19 (5): 559–577.10.1016/S0272-6963(01)00054-7
  • Hu, X., N. Cui, E. Demeulemeester, and L. Bie. 2016. “Incorporation of Activity Sensitivity Measures into Buffer Management to Manage Project Schedule Risk.” European Journal of Operational Research 249 (2): 717–727.10.1016/j.ejor.2015.08.066
  • Jiang, G., and Y. Chen. 2005. Schedule Risk Management Method of Software Project Based on Critical Chain. Computer Applications. http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJY200501017.htm.
  • Jovanovic, P., P. Kecman, N. Bojovic, and D. Mandic. 2016. “Optimal Allocation of Buffer times to Increase Train Schedule Robustness.” European Journal of Operational Research. 10.1016/j.ejor.2016.05.013.
  • Knyazeva, M., A. Bozhenyuk, and I. Rozenberg. 2015. “Resource-constrained Project Scheduling Approach under Fuzzy Conditions.” Procedia Computer Science 77: 56–64.10.1016/j.procs.2015.12.359
  • Kolb, O., and S. Göttlich. 2015. “A Continuous Buffer Allocation Model Using Stochastic Processes.” European Journal of Operational Research 242 (3): 865–874.10.1016/j.ejor.2014.10.065
  • Kolisch, R., and A. Sprecher. 1996. “PSPLIB – A Project-scheduling Library.” European Journal of Operational Research 96: 205–216.
  • Kuo, Y. C., and S. T. Lu. 2013. “Using Fuzzy Multiple Criteria Decision Making Approach to Enhance Risk Assessment for Metropolitan Construction Projects.” International Journal of Project Management 31 (4): 602–614.10.1016/j.ijproman.2012.10.003
  • Li, X., Y. Liu, Y. Wang, and Z. Gao. 2016. “Evaluating Transit Operator Efficiency: An Enhanced DEA Model with Constrained Fuzzy-AHP Cones.” Journal of Traffic and Transportation Engineering 3 (3): 215–225. 10.1016/j.jtte.2016.05.004.
  • Lim, A., H. Ma, B. Rodrigues, S. T. Tan, and F. Xiao. 2011. “New Concepts for Activity Float in Resource-constrained Project Management.” Computers & Operations Research 38 (6): 917–930.
  • Long, L. D., and A. Ohsato. 2008. “Fuzzy Critical Chain Method for Project Scheduling under Resource Constraints and Uncertainty.” International Journal of Project Management 26 (6): 688–698.10.1016/j.ijproman.2007.09.012
  • Naeni, L. M., S. Shadrokh, and A. Salehipour. 2011. “A Fuzzy Approach for the Earned Value Management.” International Journal of Project Management 29 (6): 764–772.10.1016/j.ijproman.2010.07.012
  • Newbold, R. C. 1998. Project Management in the Fast Lane: Applying the Theory of Constraints. Boca Raton, CA: The St. Lucie Press.
  • Peng, W., and M. Huang. 2014. “A Critical Chain Project Scheduling Method Based on a Differential Evolution Algorithm.” International Journal of Production Research 52 (13): 3940–3949.10.1080/00207543.2013.865091
  • Perminova, O., M. Gustafsson, and K. Wikström. 2008. “Defining Uncertainty in Projects: A New Perspective.” International Journal of Project Management 26 (1): 73–79.10.1016/j.ijproman.2007.08.005
  • Radovilsky, Z. 2008. “Improving Accuracy and Automating Forecasting with Spreadsheets.” International Journal of Business Strategy 8 (2): 137–142.
  • Rand, G. K. 2000. “Critical Chain: The Theory of Constraints Applied to Project Management.” International Journal of Project Management 18 (3): 173–177.10.1016/S0263-7863(99)00019-8
  • Sanderson, J. 2012. “Risk, Uncertainty and Governance in Megaprojects: A Critical Discussion of Alternative Explanations.” International Journal of Project Management 30 (4): 432–443.10.1016/j.ijproman.2011.11.002
  • Saunders, F. C., A. W. Gale, and A. H. Sherry. 2015. “Conceptualising Uncertainty in Safety-critical Projects: A Practitioner Perspective.” International Journal of Project Management 33 (2): 467–478.10.1016/j.ijproman.2014.09.002
  • Shi, Q., W. Yating, and T. Gong. 2012. “An Improved Approach for Project Buffer Sizing and Evaluation.” Systems Engineering-Theory & Practice 32 (8): 1739–1746.
  • Steyn, H. 2002. “Project Management Applications of the Theory of Constraints beyond Critical Chain Scheduling.” International Journal of Project Management 20 (1): 75–80.10.1016/S0263-7863(00)00054-5
  • Tukel, O. I., W. O. Rom, and S. D. Eksioglu. 2006. “An Investigation of Buffer Sizing Techniques in Critical Chain Scheduling.” European Journal of Operational Research 172 (2): 401–416.10.1016/j.ejor.2004.10.019
  • Wu, H. P., G. Xuan, and X. Shuai. 2003. “A Confidence DEA Model for LR-type Fuzzy Numbers.” Systems Engineering – Theory & Practice 23 (9): 28–34.
  • Yang, S., and L. Fu. 2014. “Critical Chain and Evidence Reasoning Applied to Multi-project Resource Schedule in Automobile R&D Process.” International Journal of Project Management 32 (1): 166–177.10.1016/j.ijproman.2013.01.010
  • Zhang, J., X. Song, and E. Diaz. 2014. “Buffer Sizing of Critical Chain Based on Attribute Optimization.” Concurrent Engineering 22 (3): 253–264.10.1177/1063293X14541286
  • Zhang, J., X. Song, H. Chen, and R. Shi. 2015. “Optimisation of Critical Chain Sequencing Based on Activities’ Information Flow Interactions.” International Journal of Production Research 53 (20): 6231–6241.10.1080/00207543.2015.1043157
  • Zhang, J., X. Song, and E. Díaz. 2016. “Project Buffer Sizing of a Critical Chain Based on Comprehensive Resource Tightness.” European Journal of Operational Research 248 (1): 174–182.10.1016/j.ejor.2015.07.009
  • Zhao, Z., and W. You. 2010. “Application of Innovative Critical Chain Method for Project Planning and Control under Resource Constraints and Uncertainty.” Journal of Construction Engineering and Management 136 (9): 1056–1060.10.1061/(ASCE)CO.1943-7862.0000209
  • Zheng, Z., Z. Guo, Y. Zhu, and X. Zhang. 2014. “A Critical Chains Based Distributed Multi-project Scheduling Approach.” Neurocomputing 143: 282–293.10.1016/j.neucom.2014.04.056

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.