Applicability of earned value management for deadline energy constrained applications

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Earned Value Management (EVM) is a progress management method in project management. EVM is used as metrics to analyze execution statuses of projects that need to be accomplished within deadlines and limited budgets. By replacing budgets used in project management with energy used in applications, we can apply EVM as metrics to analyze execution statuses of Deadline Energy Constrained (DEC) applications that execute tasks within deadlines and limited energy. DEC applications are often seen in applications that need to consume energy within limits, for example, Wireless Sensor Networks (WSNs), Electric Cars (ECs), and Unmanned Aerial Vehicle (UAV). In this paper, we introduce new possibilities of applying EVM by showing that EVM can be used to analyze execution statuses of and make changes to DEC applications.

Original languageEnglish
Title of host publication2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017
PublisherIEEE Computer Society
Pages691-695
Number of pages5
Volume2017-December
ISBN (Electronic)9781538609484
DOIs
Publication statusPublished - 2018 Feb 9
Externally publishedYes
Event2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017 - Singapore, Singapore
Duration: 2017 Dec 102017 Dec 13

Other

Other2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017
Country/TerritorySingapore
CitySingapore
Period17/12/1017/12/13

Keywords

  • Earned Value Management
  • Project Management

ASJC Scopus subject areas

  • Business, Management and Accounting (miscellaneous)
  • Industrial and Manufacturing Engineering
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Applicability of earned value management for deadline energy constrained applications'. Together they form a unique fingerprint.

Cite this