Scheduling simulation-based techniques for earned value management on resource-constrained schedules under delayed scenarios

Ming Fung Siu, Ming Lu

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

7 Citations (Scopus)

Abstract

Earned value management (EVM) is widely utilized for project progress monitoring and cost control purposes. However, traditional EVM techniques are intended for ideal scheduling scenarios without considering the effect of activity-level and project-level delays. The EVM fails to account for dynamic changes of project status in terms of project time extension and associated cost overrun, potentially generating misleading project performance tracking indicators. This research proposes a refined EVM approach based on discrete event simulation (scheduling simulation) to tackle complicated resource-constrained scheduling. A case study is used to demonstrate its applications on a resource-constrained schedule under postulated delay scenarios. It is found that this approach is conducive to truthfully reflecting the project performance status given a resource-constrained schedule subject to complicated activity-project delay. Conclusions are drawn by recapitulating the research contributions and addressing the limitations in the end.
Original languageEnglish
Title of host publicationProceedings of the 2011 Winter Simulation Conference, WSC 2011
Pages3455-3466
Number of pages12
DOIs
Publication statusPublished - 1 Dec 2011
Event2011 Winter Simulation Conference, WSC 2011 - Phoenix, AZ, United States
Duration: 11 Dec 201114 Dec 2011

Conference

Conference2011 Winter Simulation Conference, WSC 2011
Country/TerritoryUnited States
CityPhoenix, AZ
Period11/12/1114/12/11

ASJC Scopus subject areas

  • Software
  • Modelling and Simulation
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Scheduling simulation-based techniques for earned value management on resource-constrained schedules under delayed scenarios'. Together they form a unique fingerprint.

Cite this