首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   55篇
  免费   0篇
  2021年   1篇
  2020年   1篇
  2019年   10篇
  2018年   7篇
  2017年   2篇
  2016年   4篇
  2015年   2篇
  2014年   2篇
  2013年   17篇
  2012年   1篇
  2010年   1篇
  2009年   2篇
  2008年   2篇
  2007年   2篇
  2004年   1篇
排序方式: 共有55条查询结果,搜索用时 15 毫秒
41.
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.  相似文献   
42.
43.
44.
We study the scheduling situation in which a set of jobs subjected to release dates and deadlines are to be performed on a single machine. The objective is to minimize a piecewise linear objective function ∑jFj where Fj(Cj) corresponds to the cost of the completion of job j at time Cj. This class of function is very large and thus interesting both from a theoretical and practical point of view: It can be used to model total (weighted) completion time, total (weighted) tardiness, earliness and tardiness, etc. We introduce a new Mixed Integer Program (MIP) based on time interval decomposition. Our MIP is closely related to the well‐known time‐indexed MIP formulation but uses much less variables and constraints. Experiments on academic benchmarks as well as on real‐life industrial problems show that our generic MIP formulation is efficient. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
45.
This article intends to explain the outstanding sequence of success and failure exhibited by the FARC, the main Colombian guerrilla since the 1980s. It claims that such sequence is unintelligible unless the adoption by the FARC of a militaristic organizational blueprint at its 1982 7th Conference is taken into account. By building itself like an army, the FARC could boost its combat capacity, maintain its structural integrity, and develop powerful mechanisms that held the whole structure together. At the same time, the militarization of the FARC also entailed significant risks and costs like political isolation and high personnel turnover. After describing the militaristic blueprint, the article compares the FARC with other irregular forces that operated in the Colombian context – a comparison which is important to understand the specificity of the FARC trajectory, as well as the benefits and costs involved in it. The analysis highlights the critical role of organizational dimensions in the explanation of civil war outcomes, and suggests that at least for some problems organizational dynamics should be observed at a low level of granularity.  相似文献   
46.
47.
There is currently a lack of knowledge about how elites rule post-civil war societies without strong state institutions. This paper argues that elites oftentimes overcome such institutional deficiencies by engaging in governance through brokerage. According to this perspective, elites outsource central state functions to influential broker figures. This is particularly true when dealing with war-affected groups that possess much violent agency. By functioning as social membranes, brokers can help elites and war-affected groups to redefine a new social contract. Liberia is employed as an example to illustrate the paper’s central arguments.  相似文献   
48.
We investigate the problem in which an agent has to find an object that moves between two locations according to a discrete Markov process (Pollock, Operat Res 18 (1970) 883–903). At every period, the agent has three options: searching left, searching right, and waiting. We assume that waiting is costless whereas searching is costly. Moreover, when the agent searches the location that contains the object, he finds it with probability 1 (i.e. there is no overlooking). Waiting can be useful because it could induce a more favorable probability distribution over the two locations next period. We find an essentially unique (nearly) optimal strategy, and prove that it is characterized by two thresholds (as conjectured by Weber, J Appl Probab 23 (1986) 708–717). We show, moreover, that it can never be optimal to search the location with the lower probability of containing the object. The latter result is far from obvious and is in clear contrast with the example in Ross (1983) for the model without waiting. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
49.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   
50.
Strategic studies deals intimately with the topic of power. Most scholars in the discipline work with a concept of power as an adversarial zero-sum competition. This is natural and necessary. However, other conceptions of power developed within political science and sociology could enrich strategic studies. Approaching two typical, traditional tasks of strategy – alliance building and war-fighting – this article demonstrates the heuristic mileage of theories of collective power. In particular, we can shed new light on the post-Cold War transformation of NATO as well as state-building as a strategy in counter-insurgencies with new ideas of power. Broadening the palette of theories of power is thus valuable if strategic studies is to prosper as an independent field of study.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号