排序方式: 共有20条查询结果,搜索用时 750 毫秒
1.
Alex Wilner 《战略研究杂志》2018,41(3):410-437
States employ extended deterrence to shield third parties from aggression. The concept is traditionally applied to interstate relations, collective security arrangements, and strategic considerations. The protective relationship that exists between a state sponsor of terrorism and its non-state militant proxy is rarely considered. This article will introduce and explore the sponsor–proxy relationship in the context of extended deterrence, and relate it to Iran’s support and sponsorship of political violence, militancy, and terrorism in Europe. The article reviews the rationale states have for sponsoring terrorism, and illustrates the promises and pitfalls associated with extending deterrence to non-state militants. 相似文献
2.
Marshall Rose 《海军后勤学研究》1973,20(1):147-159
This paper demonstrates how to determine the minimal cost combination of end products and repair service capability in order to maintain a given level of operating end products. It is shown that the general rule for optimal resource allocation requires simply that the absolute value of the marginal factor cost of repair services divided by the marginal factor cost of end products be equal to the arrival rate of end products to repair. The model is applied to the problem of determining the resources required to support an operating level of Navy F-4 aircraft. 相似文献
3.
Clifford W. Marshall 《海军后勤学研究》1969,16(4):531-541
This paper presents a quantitative index of the level of risk assumed by a contractor in various contract type situations. The definition includes expression of real world uncertainty and contractor's utility for money. Examples are given for the major contract types and special applications are discussed. 相似文献
4.
Although cycling in the simplex method has long been known, a number of theoretical questions concerning cycling have not been fully answered. One of these, stated in [3], is to find the smallest example of cycling, and Beale's example with three equations and seven variables is conjectured to be the smallest one. The exact bounds on dimensions of cycling examples are established in this paper. We show that Beale's example is the smallest one which cycles at a non-optimal solution, that a smaller one can cycle at the optimum, and that, in general (including the completely degenerate case), a cycling example must have at least two equations, at least six variables, and at least three non-basic variables. Examples and geometries are given for the extreme cases, showing that the bounds are sharp. 相似文献
5.
Alex S. Wilner 《战略研究杂志》2013,36(1):3-37
This article argues that deterrence theory can be applied to counterterrorism. Doing so requires broadening the traditional concept of deterrence by punishment, expanding deterrence by denial to include defense, mitigation, and strategic hindrance, and developing deterrence by delegitimization to influence the political, ideological, and religious rationales informing terrorist behavior. In practice, deterring terrorism requires tailoring threats against state and individual facilitators, diffusing the intended consequences of terrorism, and manipulating terrorist self–restraints. When these and other deterrent leverages are applied simultaneously against various actors and processes involved in terrorism, coercion can be achieved. 相似文献
6.
7.
In this paper we study the impact of cancellations of customer orders on an inventory system. We develop a periodic review (s, S) inventory model with Poisson demands, deterministic demand leadtimes and supply leadtimes. When no set up cost is present for replenishment, the behavior of the system cost can be studied analytically. For the case with a fixed set up cost, we derive the operating characteristics of the model via an embedded Markov chain analysis. Based on this, we formulate the total cost function and suggest a two‐phase approach to optimization. Our model can be used to compute cancellation fees and to evaluate the impacts of various conditions of cancellation. We find that cancellations, as major sources of inventory information distortion, increase total system costs, and the magnitude of the cost impact depends on the probability of cancellation and the expected cancellation time. Other relevant lessons and insights are also discussed. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 213–231, 1999 相似文献
8.
A manpower planning model is presented that exploits the longitudinal stability of manpower cohorts. The manpower planning process is described. An infinite horizon linear program for calculating minimum cost manpower input plans is presented and found to have a straightforward solution in a great many cases and to yield an easily implemented approximation technique in other cases. 相似文献
9.
Alex Marshall 《Small Wars & Insurgencies》2013,24(2):233-258
Since 9/11, counterinsurgency is back in fashion; the ‘war on terror’ has even been branded a ‘global counterinsurgency’. However the context within which counterinsurgency originally arose is critical to understanding the prospects for its present success; the radically changed environment in which it is currently being conducted casts into considerable doubt the validity of the doctrine's application by many national militaries currently ‘rediscovering’ this school of military thought today. Above all, classical counterinsurgency was a profoundly imperial, state-centric phenomenon; consequently it only rarely faced the thorny issue of sovereignty and legitimacy which bedevils and may doom these same efforts today. 相似文献
10.