REFERENCES
Afsarmanesh, H. and Camarinha-Matos, L. M. (2005). A
framework for management of virtual organization
breeding environments. In Proceedings of the 6th
Working Conference on Virtual Enterprises (PRO-
VE’05), pages 35–48, Valencia, Spain.
Alawamleh, M. and Popplewell, K. (2010). Risk sources
identification in virtual organisation. In Enterprise In-
teroperability IV, pages 265–277. Springer London.
Alawamleh, M. and Popplewell, K. (2012). Analysing vir-
tual organisation risk sources: an analytical network
process approach. International Journal of Network-
ing and Virtual Organisations, 10(1):18–39.
Bentley, J. L. (1975). Multidimensional binary search trees
used for associative searching. Communications of the
ACM, 18(9):509–517.
Caida (2013). Macroscopic topology project. http://www.
caida.org/analysis/ topology/macroscopic/.
Camarinha-Matos, L. M. and Afsarmanesh, H. (2005). Col-
laborative networks: a new scientific discipline. Jour-
nal of Intelligent Manufacturing, 16(4-5):439–452.
Camarinha-Matos, L. M. and Afsarmanesh, H. (2008). On
reference models for collaborative networked orga-
nizations. International Journal of Production Re-
search, 46(9):2453–2469.
Cooper, W. W., Seiford, L. M., and Tone, K. (2007). Data
Envelopment Analysis: A Comprehensive Text with
Models, Applications, References and DEA-Solver
Software. Springer Verlag, New York, USA.
Duan, Z., Zhang, Z. L., and Hou, Y. T. (2003). Service
overlay networks: SLAs, QoS, and bandwidth pro-
visioning. IEEE/ACM Transactions on Networking,
11(6):870–883.
Ericson, C. A. (2005). Hazard analysis techniques for sys-
tem safety. John Wiley & Sons, New York, USA.
Fei, L. and Zhixue, L. (2010). A fuzzy comprehensive eval-
uation for risk of virtual enterprise. In Proceedings of
the 10th International Conference on Internet Tech-
nology and Applications, pages 1–4, Corfu, Greece.
Fiorese, A., Sim
˜
oes, P., and Boavida, F. (2010). OMAN a
management architecture for P2P service overlay net-
works. In Proceedings of the 4th international confer-
ence on Autonomous infrastructure, management and
security (AIMS’10), pages 14–25, Zurich, Switzer-
land.
Fiorese, A., Sim
˜
oes, P., and Boavida, F. (2012). Peer selec-
tion in P2P service overlays using geographical loca-
tion criteria. In Proceedings of the 12th international
conference on Computational Science and Its Applica-
tions (ICCSA’12), pages 234–248, Salvador de Bahia,
Brazil.
Goranson, H. T. (1999). The agile virtual enterprise cases,
metrics, tools. Quorum Books, Westport, CT, USA.
Grabowski, M. and Roberts, K. H. (1998). Risk mitiga-
tion in virtual organizations. Journal of Computer-
Mediated Communication, 3(4):704–721.
Heckerman, D. (1996). A tutorial on learning with bayesian
networks. Technical report, Learning in Graphical
Models.
Holland, J. H. (1973). Genetic algorithms and the optimal
allocation of trials. SIAM J. Comput., 2:88–105.
Junior, O. C. A. and Rabelo, R. J. (2013). A KPI model for
logistics partners’ search and suggestion to create vir-
tual organisations. International Journal of Network-
ing and Virtual Organisations, 12(2):149–177.
Li, Y. and Liao, X. (2007). Decision support for risk anal-
ysis on dynamic alliance. Decision Support Systems,
42(4):2043–2059.
March, J. G. and Shapira, Z. (1987). Managerial perspec-
tives on risk and risk taking. Management Science,
33(11):1404–1418.
Min, H., Xue-Jing, W., Lu, F., and Xing-Wei, W. (2007).
Multi-strategies risk programming for virtual enter-
prise based on ant colony algorithm. In Proceedings
of the 1st International Conference on Industrial En-
gineering and Engineering Management, pages 407–
411, Singapore.
Montgomery, D. C. and Runger, G. C. (2011). Applied
Statistics and Probability for Engineers. John Wiley
& Sons, New Jersey, USA.
Moskowitz, H. and Bunn, D. (1987). Decision and risk
analysis. European Journal of Operational Research,
28(3):247–260.
Mosleh, A., Dias, A., Eghbali, G., and Fazen, K. (2004).
An integrated framework for identification, classifi-
cation, and assessment of aviation systems hazards.
In Proceedings of the 6th International Conference
on Probabilistic Safety Assessment & Management
(PSAM’04), pages 2384–2390, Berlin, Germany.
Mowshowitz, A. (1997). Virtual organization. Communi-
cations of the ACM, 40(9):30–37.
Pidduck, A. B. (2006). Issues in supplier partner selec-
tion. Journal of Enterprise Information Management,
19(3):262–276.
Stingl, D., Gross, C., Ruckert, J., Nobach, L., Kovacevic,
A., and Steinmetz, R. (2011). PeerfactSim.KOM: a
simulation framework for peer-to-peer systems. In
Proceedings of the 13th International Conference
on High Performance Computing and Simulation
(HPCS’11), pages 577–584, Istanbul, Turkey.
Vose, D. (2008). Risk analysis: a quantitative guide. John
Wiley & Sons, New Jersey, USA.
Zhou, S., Hogan, M., Ardon, S., Portman, M., Hu, T., Won-
grujira, K., and Seneviratne, A. (2005). Alasa: When
service overlay networks meet peer-to-peer networks.
In Proceedings of the 11th Asia-Pacific Conference
on Communications (APCC’05), pages 1053–1057,
Perth, Australia.
ICEIS2014-16thInternationalConferenceonEnterpriseInformationSystems
488