{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:31:40Z","timestamp":1777491100845,"version":"3.51.4"},"reference-count":34,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2014,7,8]],"date-time":"2014-07-08T00:00:00Z","timestamp":1404777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Concurrent Engineering"],"published-print":{"date-parts":[[2014,9]]},"abstract":"<jats:p>This research proposes an innovative buffer sizing method based on optimizing attributes in order to improve the efficiency of buffer management and optimize the estimation accuracy of a project buffer. The Monte Carlo simulation results show that the buffer obtained using this method is smaller than the cut and paste method, but larger than the root square error method. These findings indicate that the proposed method gives full consideration to the interdependencies between the activities, thus avoiding the excessive protection provided by the cut and paste method and overcoming the insufficient consideration of root square error method project attributes based on the central limit theorem. The proposed method can provide the project with effective protection, along with an appropriate buffer size.<\/jats:p>","DOI":"10.1177\/1063293x14541286","type":"journal-article","created":{"date-parts":[[2014,7,9]],"date-time":"2014-07-09T01:06:07Z","timestamp":1404867967000},"page":"253-264","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":22,"title":["Buffer sizing of critical chain based on attribute optimization"],"prefix":"10.1177","volume":"22","author":[{"given":"Junguang","family":"Zhang","sequence":"first","affiliation":[{"name":"Dongling School of Economics and Management, University of Science & Technology Beijing, Beijing, P.R. China"}]},{"given":"Xiwei","family":"Song","sequence":"additional","affiliation":[{"name":"Dongling School of Economics and Management, University of Science & Technology Beijing, Beijing, P.R. China"}]},{"given":"Estrella","family":"D\u00edaz","sequence":"additional","affiliation":[{"name":"Law and Social Sciences School, University of Castilla-La Mancha, Ciudad Real, Spain"}]}],"member":"179","published-online":{"date-parts":[[2014,7,8]]},"reference":[{"key":"bibr1-1063293X14541286","first-page":"1037","volume-title":"IEEE international conference on industrial engineering and engineering management","author":"Ashtiani B","year":"2007"},{"key":"bibr2-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40630-0_32"},{"key":"bibr3-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2008.06.006"},{"issue":"6","key":"bibr4-1063293X14541286","first-page":"35","volume":"11","author":"Chen C","year":"2003","journal-title":"China Journal of Management Science"},{"issue":"5","key":"bibr5-1063293X14541286","first-page":"1029","volume":"14","author":"Chu C","year":"2008","journal-title":"Computer Integrated Manufacturing Systems"},{"key":"bibr6-1063293X14541286","volume-title":"Critical Chain","author":"Goldratt EM","year":"1997"},{"key":"bibr7-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2012.163"},{"key":"bibr8-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(99)00019-8"},{"key":"bibr9-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1016\/S0272-6963(01)00054-7"},{"key":"bibr10-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.04.002"},{"issue":"2","key":"bibr11-1063293X14541286","first-page":"43","volume":"40","author":"Hoel K","year":"1999","journal-title":"Production and Inventory Management Journal"},{"key":"bibr12-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X07078931"},{"key":"bibr13-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X03038568"},{"key":"bibr14-1063293X14541286","first-page":"1068","volume-title":"IEEE international conference on industrial engineering and engineering management","author":"Li K","year":"2007"},{"key":"bibr15-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2007.09.012"},{"key":"bibr16-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1201\/b18205"},{"key":"bibr17-1063293X14541286","author":"Peng W","year":"2013","journal-title":"International Journal of Production Research"},{"key":"bibr18-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-5273(97)00131-X"},{"key":"bibr19-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2009.67"},{"key":"bibr20-1063293X14541286","first-page":"26","volume":"8","author":"Shan MY","year":"2009","journal-title":"Soft Science"},{"key":"bibr21-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1109\/AICI.2009.192"},{"issue":"8","key":"bibr22-1063293X14541286","first-page":"1739","volume":"32","author":"Shi Q","year":"2012","journal-title":"Systems Engineering: Theory & Practice"},{"key":"bibr23-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIT.2000.917313"},{"key":"bibr24-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X9800600103"},{"key":"bibr25-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(00)00054-5"},{"key":"bibr26-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.10.019"},{"key":"bibr27-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.11.004"},{"key":"bibr28-1063293X14541286","first-page":"11","volume":"1","author":"Yang L","year":"2009","journal-title":"Industrial Engineering and Management"},{"key":"bibr29-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.1805"},{"key":"bibr30-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X12438701"},{"key":"bibr31-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1177\/106329303034503"},{"key":"bibr32-1063293X14541286","volume-title":"The Study on Risk Evaluation of the Strategies in Software Enterprise","author":"Yin H","year":"2012"},{"key":"bibr33-1063293X14541286","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CO.1943-7862.0000209"},{"issue":"7","key":"bibr34-1063293X14541286","first-page":"48","volume":"28","author":"Zhong G","year":"2009","journal-title":"Technology Economics"}],"container-title":["Concurrent Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1063293X14541286","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1063293X14541286","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1063293X14541286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T14:48:46Z","timestamp":1777387726000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1063293X14541286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,8]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["10.1177\/1063293X14541286"],"URL":"https:\/\/doi.org\/10.1177\/1063293x14541286","relation":{},"ISSN":["1063-293X","1531-2003"],"issn-type":[{"value":"1063-293X","type":"print"},{"value":"1531-2003","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,8]]}}}