PUTTING THE CORE ELEMENTS OF CRITICAL CHAIN PROJECT MANAGEMENT INTO PERSPECTIVE: A GENERAL FRAMEWORK FOR BUFFER MANAGEMENT

Similar documents
CONSTRUCTION PROJECT BUFFER MANAGEMENT IN SCHEDULING PLANNING AND CONTROL

Is Critical Chain Project Management Really a Novel Technique?

CCPM: TOC Based Project Management Technique

A Comparison Study Between Event Chain Methodology And Critical Path Method In The Construction Industry

Gaining Competitive Advantage through Reducing Project Lead Times Duncan Patrick, CMS Montera Inc. Jack Warchalowski, CMS Montera Inc.

Chapter 6: Project Time Management. King Fahd University of Petroleum & Minerals SWE 417: Software Project Management Semester: 072

Multi-Project Management using Critical Chain Project Management (CCPM) The Power of Creative Engineering

CRITICAL CHAIN AND CRITICAL PATH, CAN THEY COEXIST?

Chapter 4: Project Time Management

A SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS

A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method

Critical Chain Project Management (CCPM) at Bosch Security Systems (CCTV) Eindhoven

Software Project Scheduling under Uncertainties

TIME MANAGEMENT TOOLS AND TECHNIQUES FOR PROJECT MANAGEMENT. Hazar Hamad Hussain *

An analysis of Critical Chain concepts in the context of their possible application to traditional project management

Program Management. Turning Many Projects into Few Priorities with TOC

Project Time Management

50% task time estimate A task time estimate that has a 50% probability of being achieved.

Project Time Management

The Theory of Constraints Critical Chain Management using MS Project 2010 and ProChain

Priori ty

Critical Chain Concepts

PROJECT TIME MANAGEMENT

Scheduling Glossary Activity. A component of work performed during the course of a project.

Project Management Chapter 3

Unit 4: Time Management (PMBOK Guide, Chapter 6)

Information Technology Project Management, Sixth Edition. Note: See the text itself for full citations. More courses at cie-wc.edu

pm4dev, 2015 management for development series Project Schedule Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS

Chapter 6: Project Time Management

Project management applications of the theory of constraints beyond critical chain scheduling

IDENTIFICATION AND ILLUMINATION OF POPULAR MISCONCEPTIONS ABOUT PROJECT SCHEDULING AND TIME BUFFERING IN A RESOURCE-CONSTRAINED ENVIRONMENT

Critical chain: the theory of constraints applied to project management

Learning Objectives. Learning Objectives (continued) Importance of Project Schedules

Basics Workshop: Project and Multi-Project Management (English)

A Critical Look at Critical Chain Project Management

Critical Chain and Critical Path What s the Difference? By Gerald I. Kendall (

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi

Transition from Critical Path to Critical Chain: A Case Research Analysis

Lecture 6: Project Time Management By: Prof. Lili Saghafi. Information Technology Project Management, Fifth Edition

Information Technology Project Management

Synchronous Project Management (AKA Critical Chain)

Project Time Management

PLAYING GAMES: EVALUATING THE IMPACT OF LEAN PRODUCTION STRATEGIES ON PROJECT COST AND SCHEDULE

6.1 Process. CHAPTER 6 Developing the (Single-Project) Critical-Chain Plan

PS.S03. An Introduction to Critical Change Project Management

Project Planning and Scheduling

QUANTITATIVE ANALYSIS FOR BUSINESS DECISIONS

22 Project Management with PERT/CPM

Network analysis: P.E.R.T,C.P.M & Resource Allocation Some important definition:

Operational Research. Project Menagement Method by CPM/ PERT

THEORY OF CONSTRAINTS AS AN EFFECTIVE TOOL FOR SUPPLY CHAIN MANAGEMENT JOANNA NOWAKOWSKA-GRUNT 1 EWA MOROZ 2

How To Write A Thesis On Critical Chain Project Management

A Computer Application for Scheduling in MS Project

Time Management. Part 5 Schedule Development. Richard Boser

The only person who likes change is a baby with a wet diaper. Mark Twain. Charan CA Atreya

Project Time Management

Mario Vanhoucke. Project Management. with Dynamic Scheduling. Baseline Scheduling, Risk Analysis. and Project Control. Second Edition.

Critical Chain Project Management The Basics

HOW TO START WORKING WITH P2WARE PROJECT MANAGER 7?

Scheduling Resources and Costs

CRITICAL PATH METHOD (CEE 320 VDC SEMINAR)

Resource-constrained Scheduling of a Real Project from the Construction Industry: A Comparison of Software Packages for Project Management

10 Project Management with PERT/CPM

Importance of Project Schedules. matter what happens on a project. projects, especially during the second half of projects

Project Management with Dynamic Scheduling

Critical Chain. November 14 th Revision Draft

PROJECT TIME MANAGEMENT. 1 Powered by POeT Solvers Limited

Project plan: document used to keep the project under control.

Module 3: The Project Planning Stage

Deming s 14 Points for TQM

Research on Task Planning Based on Activity Period in Manufacturing Grid

Improve Net Present Value using cash flow weight

PROJECT MANAGEMENT USING DYNAMIC SCHEDULING: BASELINE SCHEDULING, RISK ANALYSIS & PROJECT CONTROL By Mario Vanhoucke

Application of Critical Path Method scheduling to research plan and management of graduate students research project in engineering education

STRATEGIC CAPACITY PLANNING USING STOCK CONTROL MODEL

Application Survey Paper

EXAM EXEMPLAR QUESTIONS

Criticality of Schedule Constraints Classification and Identification Qui T. Nguyen 1 and David K. H. Chua 2

A Diagnostic Approach to Scheduling

Use project management tools

Chapter 11. MRP and JIT

SCHEDULING AND TIME MANAGEMENT. Project Management and Leadership 2015D, PhD, PMP

Simplified Drum-Buffer-Rope A Whole System Approach to High Velocity Manufacturing by Eli Schragenheim and H. William Dettmer

15. How would you show your understanding of the term system perspective? BTL 3

Project management: a simulation-based optimization method for dynamic time-cost tradeoff decisions

Operations research and dynamic project scheduling: When research meets practice

A Generalized PERT/CPM Implementation in a Spreadsheet

Network Diagram Critical Path Method Programme Evaluation and Review Technique and Reducing Project Duration

Exploring constraints in projects: A construction industry case study

Comparative Resource Scheduling Using Various Software Packages

The Plan s Journey From Scope to WBS to Schedule

Lecture 26 CPM / PERT Network Diagram

Chapter 2: Project Time Management

Systems Analysis and Design

Module 11. Software Project Planning. Version 2 CSE IIT, Kharagpur

IMCPM04 Project Scheduling and Cost Control. Course Outline

Title: Project Scheduling: Improved approach to incorporate uncertainty using Bayesian Networks

Automated Scheduling Methods. Advanced Planning and Scheduling Techniques

PBL: Project Management. Competency: Project Definition

Quantitative Risk Analysis with Microsoft Project

Transcription:

Appearing in: One World? One view of OM? The Challenges of Integrating Research and Practice, Spina, G., Vinelli, A. et al. Eds., SGE Padova, 2003 PUTTING THE CORE ELEMENTS OF CRITICAL CHAIN PROJECT MANAGEMENT INTO PERSPECTIVE: A GENERAL FRAMEWORK FOR BUFFER MANAGEMENT Jaume Ribera 1, Marc Sachon and Alex Grasas IESE Business School Av. Pearson 21 E-08034 Barcelona Spain ABSTRACT Since the publication of Goldratt s Critical Chain, most of the books and articles devoted to Critical Chain Project Management (CCPM) present it in contrast to an assumed wellknown but undefined traditional CPPM (Critical Path Project Management), spending more attention to describe how CCPM differs from traditional CPPM than in describing the methodology, techniques and assumptions behind CPPM. There is already good evidence that CCPM delivers results when applied to real situations. The paper dissects the Critical Chain Project Management CCPM philosophy, discusses its distinctive elements, grouping them around five main issues. The paper combines a theoretical presentation of the issues with empirical evidence from the results of a survey and the application of CCPM techniques to a large shipbuilding company. Keywords : project management, critical chain, buffer management. INTRODUCTION There is no doubt that with the publication of his Critical Chain book (Goldratt, 1997) has prompted many people to reexamine the way they plan and manage projects. As it is customary in Goldratt s work, although anecdotal and intuitive in nature, showed excellent insights and solution directions to the problems faced by traditional project management methods (Anavi-Isakow and Golany, 2003). The Critical Chain (CC) concept is presented as an application of the Theory of Constraints (Goldratt, 1999) to project management (Rand, 2000), by extending the concept of Critical Path to take into account resource constraints. (Leach, 1997) defines CC as the sequence of dependent events that prevents the project from completing in a shorter interval; resource dependencies determine the critical chain as much as do task dependencies. Since the publication of his first book, The Goal (Goldratt, 1992) has used a story telling approach to present concepts or methods, which have an appealing beauty, are practical, 1 Corresponding author: ribera@iese.edu 1

and have an intuitive simplicity. This makes them very attractive to the practitioners and also allows Goldratt to avoid entering into the messy computational details, or having to present any proof of its efficiency or efficacy in solving particular problems. In his Critical Chain, Goldratt does not make any single reference to anybody else s work, as it has been traditional in all his previous publications. He has been right on many occasions on presenting the drawbacks of some existing practices (e.g., cost accounting when it uses unit cost for production decisions), but he has failed to give credit to other authors and textbooks which have pointed to ways to solve these shortcomings (e.g., by using linear programming to determine the profit per unit of scarce resource). The CC material is managing to get into most project management textbooks, with different fortune. While (Maylor, 2003) devotes a whole chapter to the Critical Chain approach, (Gray and Larson, 2002) discuss it in just a few pages of their 500+ pages textbook. Some books, such as (Newbold, 1998) and (Leach 2000) focusing on the Critical Chain approach, have filled some of the details of the methodology, but not all. The topic makes increasing appearances in specialized journals. Most of the books and articles devoted to Critical Chain Project Management (CCPM) present it in contrast to an assumed well-known but undefined traditional CPPM (Critical Path Project Management), which corresponds to some characterization of the reality of the application of current project management tools. They spend more attention to describe how CCPM differs from the traditional CPPM than in describing the details of the proposed methodology, the techniques, and the assumptions behind CPPM. However, there is already good evidence that CCPM delivers results when applied to real situations, as documented in the publications of the Goldratt Institute (Leach, 1999), ITT Night Vision (Cook, 1998), and a recent case study (Ribera, Grasas, 2003a) which reviews the application of the CC to the shipbuilding industry. (Steyn, 2000) claims that it is difficult to determine to what extend the TOC technique or the mere emphasis on network planning contributed to the success The paper dissects the Critical Chain Project Management CCPM philosophy, and discusses its distinctive elements, grouping them around five main issues: (1) the estimation of activities durations, (2) the definition and computation of the critical chain, (3) the definition, positioning and sizing of buffers, (4) the assignment of resources, and (5) the project monitoring via buffer penetration. The paper combines a theoretical presentation of the issues, referring whenever possible to previously published (but mostly forgotten) literature, with empirical evidence from both a survey of practitioners in Spain (Ribera, Grasas, 2003b) and the recollection made by the authors of experiences from companies applying the CC methodology. The paper complements the work of (Herroelen and Leus, 2001) which follows a similar outline with a more theoretical approach. The project management survey (Ribera and Grasas, 2003b) was conducted during the period January-March 2003, using a convenience sample, former participants in a Project Management intensive course run by one of the authors at IESE for the last few years. Out of 300 distributed surveys, we got a response of 105 (35%), which provided quantitative as well as descriptive aspects of their project management practices. 2

CRITICAL CHAIN PROJECT MANAGEMENT MAIN ELEMENTS 1. Activity duration estimation CCPM claims that the traditional CPPM incorporates some time contingency in the estimate of the duration of each activity. This time buffer guarantees the activity owner some safety level, a reasonable probability that the task can be completed in the specified total time. In the mentioned survey we found this claim to be true for many companies. Project managers admitted incorporating buffers to most activities to cover for the uncertainty in their duration (Fig. 1). Furthermore, two thirds of the respondents mentioned the inclusion of some extra buffers the functional managers and the project manager. When these practices result in too long a project, the buffers are reduced in a negotiation process, but care is taken to keep enough contingencies in the critical activities, criticality defined in a loose way, including activities for which there is high uncertainty and activities which are dependent on the client or a third party, thus not directly controlled by the project manager s company. The definition of critical used by practitioners bears a resemblance more to the critical core, the set of activities that are either pacing the project, or within striking range of being the pacing item (Mascitelli, 2002). 50% 40% 39% 30% 29% 29% 20% 18% 10% 8% 5% 0% Adding buffers to each activity Adding buffers to critical activities Adding buffers in critical locations End of the project buffer Other (CC et al.) Do not consider uncertainty Figure 1 - How uncertainty is incorporated in planning The main problem with these time buffers is that they are not transparent, as the activity owner when producing the estimate does not disclose which part of the total time corresponds to the expected activity duration and which part to the contingency buffer. Furthermore, the rationale behind the buffers is not made explicit, is not shared, is mainly based on intuition and not on facts, and therefore cannot be managed at the project level, nor can any learnt lessons about the buffers be developed at the completion of the project. The existence of these (hidden) buffers, which activity owners consider to be under their responsibility, favours some perverse behaviour during the project execution phase. Together with the project overload, which will be discussed later, the first behaviour is 3

known as the students syndrome, consisting of using up the buffer before the activity begins; that is, only starting those activities which are already late. The second behaviour is the focus on finishing the activity as planned, not earlier, even though the existence of a buffer should guarantee frequent early finishes. As the buffer is considered by the activity owner as his 2 only safeguard against the uncertainties of the tasks, he does not want to show that in some cases the buffer may not be needed because he fears that if he shows it, the buffer size will be reduced in future estimates. Since the owners of the activities following a given one do not expect it to finish earlier than planned, they are not ready to start even in the event that once in a while an activity finishes before its time. To make the contingency explicit, Goldratt suggests that two estimates be made for each activity duration, an estimate of the expected duration and another of its safe duration. The difference of these estimates will define the size of the hidden contingency. This is one way of estimating the uncertainty in the duration, not much different from the PERT method, consisting of getting three values for the estimate, the optimistic, the pessimistic, and the most likely. Under some assumptions about the underlying Beta distribution (Sasieni, 1986) and (Gallagher, 1987) these values are used to compute the duration average and standard distribution. Goldratt s method lacks the theoretical justification of the PERT assumptions and therefore estimates for the uncertainty on the chain cannot be derived in a theoretical form, but we must admit that it is easier for practitioners to understand and apply. In our survey we found that only 5% of the users were making estimates based on the concept of safe duration. 2. Definition and computation of the critical chain The concept of critical chain, as an extension of the critical path to include resource availability constraints, is not new. (Wiest, 1964) already extended the concept of slack to the resource constrained case and defined a critical sequence: When resources are limited, the usual concepts of critical path and job slack basic to these methods (CPM and PERT) lose their normal meaning. Jobs may be delayed by the unavailability of resources as well as by technological orderings ( ) A new procedure for calculating slack values lead to the identification of critical sequence of jobs ( ) a notion analogous to that of critical path in the unlimited resources case He also pointed out at the relation between his critical sequence and the concept of active chain of operations in a job scheduling problem (Giffler and Tompson, 1960). (Aquilano and Smith, 1980) present a combination of CPM and MRP as a possible vehicle to overcome the shortcomings of CPM in dealing with limited resources. (Woodworth and Shanahan, 1988) propose an algorithm for identifying the critical sequence in a resource constrained project. Goldratt method to determine the critical chain of a project is not completely well-defined, as it depends very much on the heuristics used to level the resources, a step that lies at the core of the procedure to define the critical chain. Critical Chain authors (Goldratt, 1997), (Newbold, 1998) and (Leach, 2000) do not provide a clear answer on the best way to define the critical chain, and often refer to using strategic considerations when determining it. This is similar to the approach taken by Goldratt himself in the development of the TOC 2 In order to avoid the cumbersome his/her and he/she along the text, we have decided to use only the masculine form, even though we refer indistinctively to both female and male managers and workers. 4

when he declared that a process bottleneck (or constraint) must be a strategic decision and not be based on the accidental situation of a plant at a given time. 3. Definition, positioning and sizing of buffers CCPM proposes the use of three types of buffers: (1) project buffer, located at the end of the critical chain to protect the project completion date from the uncertainty in the critical chain activities, (2) feeding buffers, placed whenever a non-critical chain joints the critical chain, intended to protect the critical chain from interferences due to uncertainties in the duration of the activities of non-critical chains, and (3) resource buffers, which take the form of an advanced warning, placed whenever a resource is needed for an activity on the critical chain and the previous chain activity did not require the same resource. Resource buffers are quite different, both in concept and treatment, from the other two and we will discuss them later, in the resources management section. Project and feeding buffers could be seen as special situations in the buffer map (Figure 2), where we can picture CPM as a deterministic planning tool that incorporates no buffers, followed by PERT, already incorporating a project buffer (PB) which takes in to account the uncertainty along the critical path (which is the same as the critical chain when there are no active constraints on the resources). CCPM includes feeding buffers to protect the critical chain (FB), and we could continue by defining and adding feeding buffers to the previous feeding chains (FB 2 ), and then feeding buffers to the previous ones (FB 3 ), and so on (Figure 3 illustrates this concept with a specific project network). We can also envision CPM as the limit when every activity incorporates its own buffer, which is the practitioner s approach when using CPM and there is uncertainty in the activities durations. CPM (deterministic) PERT (PB) CCPM (PB, FB) CCPM 2 (PB, FB2) CCPM 3 (PB, FB3) Figure 2 Buffer map.etc CPM (uncertain) 5

FB 3 (Feeding Chain 3) FB 2 (Feeding Chain 2) FB (FeedingChain 1) PB (Critical Chain) Figure 3 Feeding buffers at different levels After adding these buffers, it is very likely that the critical chain is no longer the longest chain in the project, especially if the uncertainty in some feeding chain activities is larger than the uncertainty in the critical chain ones. This effect can already appear in the case of a single feeding chain. With respect to the size of the buffers, Goldratt proposes using a buffer equivalent to 50% of the contingency times removed from the corresponding chain. That is, planning is done using the activities expected duration, and half of the activity buffer (safe time expected time) is moved and aggregated to the end of the chain. (Newbold, 1998) and (Herroelen and Leus, 2001) perform buffer computation under the assumption of independent lognormal distributions of activity durations. Goldratt s rule of thumb usually overestimates the size of the buffer. See Figure 4 for the resulting safety when aggregating a number of activities, when compared to a normal distribution of the chain duration, as done in PERT. It must be noted that compared to the traditional CPM where a buffer is included in each activity, Goldratt s rule of thumb turns out to generate shorter plans with a much higher probability of success. We have found in practice that activities owners are more willing to accept showing and removing the contingency of their tasks when this whole contingency is moved to the end of the chain. Even though this would not result on shorter plans, it has proven to be a very useful first step when changing the mentality of a company from traditional contingency to critical chain. Once the contingency has been made transparent and shared, the project manager can push to achieve more important aspects, such as the roadrunner mentality described in the next section. 4. Assignment of resources CCPM stresses that activities should be planned to start as late as possible (ALAP) but resources should be ready to start the activities as soon as the technological and constraints and precedence relationships are met. This practice has two important consequences: first of all, it does not distinguish between cost generating activities (or chains) and margin generating activities. Our survey revealed that 60% of practitioners do make this consideration when scheduling activities. Second, by scheduling every activity ALAP, it eliminates the concept of slack, which is an important concept in project management, not 6

to be confused with buffer size. It is worth remembering that the original critical sequence of (Wiest, 1964) was created with the intend of preserving for the project scheduler the operational utility of the slack concept. 100% 95% Chain Safety level 90% 85% 80% 75% 70% Individual activities safety level 70% 80% 90% 65% 60% 0 5 10 15 20 25 30 No. of activities in chain Figure 4 Chain safety level using Goldratt s rule of thumb The literature of CCPM does not make a distinction between the technological uncertainty of an activity and the possible delay due to unavailability of the required resources at the time the activity is due to start. This delay is the waiting time in queue for the required resources. In the case of a single project with low (or no) uncertainty about the execution duration, the resource levelling phase would eliminate most of the queuing effect; however, when resources are multitasking among different projects and/or the uncertainty about the execution time of some activities is high, queuing accounts for a significant share of the activity perceived duration. We believe it is not appropriate to handle queuing time as extra uncertainty and deal with it via buffers. Traditional network queuing concepts and limiting the number of active projects (Anavi-Isakow and Golany, 2003) can prove more useful. The assumption of no multitasking by resources in CCPM is critical to the roadrunner mentality of resources, that is, start an activity as soon as the predecessor activities are finished. However, we have found in practice that multitasking is quite common (Figure 5), some of the rationale behind it being the large periods of idleness that would occur otherwise due to the dependency of some activities on third party resources, or the need to change the focus outside of the current activity to foster creativity in some development projects. 7

10 9 8 7 No. of projects 6 5 4 3 2 1 0 Project manager Project worker Functional manager Figure 5 Multitasking at different levels The other critical factor on the roadrunner mentality is the sharing of information between activity owners, implemented in CCPM via the resource buffers, notifying resources needed in coming activities of the advance or delay of the execution of preceding activities. (Hameri and Heikkilä, 2002) provide a related advice when they stress that project schedules need to be managed by putting special emphasis on the time-use within individual tasks and ensuring that work proceeds smoothly along the critical chain of tasks. To achieve this, high transparency is needed on how time is used in project organizations. 5. Project monitoring via buffer penetration An important attribute of CCPM is the simplicity of monitoring via buffer penetration. CCPM practitioners insist that the Critical Chain must remain constant during the execution of the project and that buffer penetration (an activity variation that consumes a buffer by a certain amount) provide proactive warnings to the project manager, who can plan and execute some actions to recover the buffer. These actions may involve expediting, working overtime, subcontracting, reducing the project scope, etc.). We believe that this issue has not yet been thoroughly studied and that further research is needed. (Herroelen and Leus, 2001) discuss a phenomenon that often occurs simultaneously with buffer penetration, namely, the creation of new resource conflicts, and therefore the need to recomputed the critical chain, in opposition to CCPM rules, but do not offer any alternative. Practitioners are attracted to the simplicity of buffer penetration monitoring, using the fever chart, standard to CCPM software packages (e.g., Prochain, Concerto). It is our experience that they maintain the old monitoring tools (Gantt baselines, Earned Value, etc.) in order to obtain different complementary views of project evolution. 8

CONCLUSION The core concepts of CCPM have been examined. Some of them have been around for more than four decades, but have been back to the stage thanks to Goldratt s work. When compared to traditional project management practices, CCPM proves very successful in practice, but more research is needed in evaluating the impact of its different elements and solving some of its problems. In a limited set of simulation experiments we have found that some of the concepts are more critical than others. For instance, the transparency of the individual activities time contingencies is more important than the definition of the buffer to allocate at the end of the chain. Similarly, the roadrunner mentality has produced more impact than the definition of the critical and feeding chains and the inclusion of the corresponding buffers. REFERENCES Anavi-Isakow, S., Golany, B., (2003), Managing multi-project environments through constant work-inprogress, International Journal of Project Management Vol. 21 pp. 9-18. Aquilano, N. J., Smith, D. E. (1980), A formal set of algorithms for project scheduling with critical path scheduling/materials requirements planning, Journal of Operations Management, Vol. 1, No. 2, pp. 57-67. Cook, S. C. (1998), Applying Critical Chain to Improve the Management of Uncertainty in Projects, Master of Business Administration and Master of Science in Electrical Engineering and Computer Science Thesis, Massachusetts Institute of Technology, Cambridge. Elton, J., Roe, J., (1998) Bringing Discipline to Project Management, Harvard Business Review. Gallagher, C. (1987), A Note on Pert Assumptions, Management Science, Vol. 33, No. 10, pp. Giffler B., Thompson G. L. (1960), Algorithms for Solving Production Scheduling Problems, Operations Research, Vol. 8, No. 4, pp. 487-503. Goldratt, E. (1992), The Goal: A Process of Ongoing Improvement, North River Press Publishing Corporation, 2n. Ed. Goldratt, E. (1999), Theory of Constraints, The North River Press, Great Barrington. Goldratt, E. (1997), Critical Chain, The North River Press, Great Barrington. Gray and Larson, (2002), Project Management: the Managerial Process, Mc. Graw-Hill, 2n. Ed. Herroelen, W., Leus, R. (2001), On the Merits and Pitfalls of Critical Chain Scheduling, International Journal of Project Management, Vol. 19, pp. 559-577. Leach, L. (2000) Critical Chain Project Management, Artech House. Leach, L., (1997), Critical Chain Project Management Improves Project Performance, Advance Project Institute, Idaho Falls. Mascitelli, R. (2002), Building a Project-Driven Enterprise, Technology Perspectives, Northridge, CA. Maylor, H. (2003), Project Management, FT Prentice Hall. Newbold, R. C. (1998). Project Management in the Fast Lane- Applying the Theory of Constraints. The St. Lucie Press, Boca Raton. Pinto, J. K. (1999), "Some Constraints on the Theory of Constraints- Taking a Critical Look at the Critical Chain". PM Network, pp. 49-51. Rand, G. K. (2000), Critical Chain: the Theory of Constraints Applied to Project Management, International Journal of Project Management, Vol. 18, pp. 173-177. 9

Ribera, J., Grasas, A. (2003a), IZAR, Case Study, IESE Publishing, Barcelona. Ribera, J., Grasas, A. (2003b), Survey on project management practices, Working report, IESE Business School, Barcelona. Saseini, M. W. (1986), A Note on PERT Times, Management Science, Vol. 32, No. 12. Steyn, H. (2000), An investigation into the fundamentals of critical chain project management, International Journal of Project Management, Vol. 19, pp. 363-369. Wei, C., Liu, P., Tsai, Y. (2002), Resource-constrained project management using enhanced theory of constraint, International Journal of Project Management, Vol. 20 pp. 561 567. Wiest, J. (1964), Some Properties of Schedules for Large Projects with Limited Resources, Operations Research, Vol. 12, No. 3, pp. 395-418. Woodworth, B. M., Shanahan, S. (1988), Identifying the critical sequence in a resource constraint project, International Journal of Project Management, Vol. 6, No. 2, pp. 89-96. 10