[1]Manuel C, Ivan C B, Luca D. On the Analysis of Vulnerability Chains in Industrial Networks[C]// Proceedings of International Workshop on Factory Communication Systems. Dresden, Germany, 2008: 215-224.
[2]广州市统计局,宏观经济数据库[DB/OL].[2011-09-10]http://www.gzstats.gov.cn/tjsj/.
[3]Thomas Y C,Daniel R K. The Supply Base and its Complexity Impliactions for Transaction Costs, Risks, Responsiveness and Innovation [J]. Journal of Operations Management, 2006,24 (5) : 637-652.
[4]Barabasi A L, Albert R. Emergence of Scaling in Random Networks [J]. Science, 1999,286 (5439): 509-512.
[5]Latora V, Marchiori M. Vulnerability and Protection of Infrastructure Networks[J]. Physical Review E, 2005,71(1):015103.
[6]姜洪权[1],高建民[1],陈富民[1],高智勇[1].基于网络特性的分布式复杂机电系统脆弱性分析[J].计算机集成制造系统,2009,15(4):791-796.
[7]闫妍[1],刘晓[2],庄新田[1].基于复杂网络理论的供应链级联效应检测方法[J].上海交通大学学报,2010(3):322-325.
[8]Camarinha M L,Afsarmanesh H. Collaborative Net-works a New Scientific Discipline[J]. Journal of Intelligent Manufacturing, 2005,16 (5) : 439-452.
[9]Camarinha M L, Afsarmanesh H,Galeano N, et al. Collaborative Networked Organizations Concepts and Practice in Manufacturing Enterprises[J]. Computers Industrial Engineering, 2009,57 ( 1 ) : 46-60.
[10]Opricovis S, Tzeng G H. Defuzzification Within a Multicriteria Decision Model[J]. Journal of Uncertainty,Fuzziness and Knowlege-based Systems, 2003,11(5):635-652. |