LEADER 05188nam 22007335 450 001 9910483539503321 005 20240112141002.0 010 $a3-540-87563-8 024 7 $a10.1007/978-3-540-87563-5 035 $a(CKB)1000000000491045 035 $a(SSID)ssj0000320457 035 $a(PQKBManifestationID)11215099 035 $a(PQKBTitleCode)TC0000320457 035 $a(PQKBWorkID)10268652 035 $a(PQKB)11191418 035 $a(DE-He213)978-3-540-87563-5 035 $a(MiAaPQ)EBC3063302 035 $a(MiAaPQ)EBC6283951 035 $a(PPN)129062928 035 $a(EXLCZ)991000000000491045 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTransactions on Computational Science II /$fedited by Yingxu Wang, Yiyu Y. Yao, Guoyin Wang 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XI, 250 p.) 225 1 $aTransactions on Computational Science,$x1866-4733 ;$v5150 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-87562-X 320 $aIncludes bibliographical references and index. 327 $aRegular Papers -- Perspectives on Denotational Mathematics: New Means of Thought -- On Contemporary Denotational Mathematics for Computational Intelligence -- Mereological Theories of Concepts in Granular Computing -- On Mathematical Laws of Software -- Rough Logic and Its Reasoning -- On Reduct Construction Algorithms -- Attribute Set Dependence in Reduct Computation -- A General Model for Transforming Vague Sets into Fuzzy Sets -- Quantifying Knowledge Base Inconsistency Via Fixpoint Semantics -- Contingency Matrix Theory I: Rank and Statistical Independence in a Contigency Table -- Applying Rough Sets to Information Tables Containing Possibilistic Values -- Toward a Generic Mathematical Model of Abstract Game Theories -- A Comparative Study of STOPA and RTPA. 330 $aThe LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. Transactions on Computational Science II is devoted to the subject of denotational mathematics for computational intelligence. Denotational mathematics, as a counterpart of conventional analytic mathematics, is a category of expressive mathematical structures that deals with high-level mathematical entities beyond numbers and sets, such as abstract objects, complex relations, behavioral information, concepts, knowledge, processes, granules, and systems. This volume includes 12 papers covering the following four important areas: foundations and applications of denotational mathematics; rough and fuzzy set theories; granular computing; and knowledge and information modeling. 410 0$aTransactions on Computational Science,$x1866-4733 ;$v5150 606 $aSoftware engineering 606 $aComputer science?Mathematics 606 $aComputers 606 $aComputer science$xMathematics 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aMathematics of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I17001 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aComputational Science and Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/M14026 615 0$aSoftware engineering. 615 0$aComputer science?Mathematics. 615 0$aComputers. 615 0$aComputer science$xMathematics. 615 14$aSoftware Engineering/Programming and Operating Systems. 615 24$aMathematics of Computing. 615 24$aTheory of Computation. 615 24$aComputational Science and Engineering. 676 $a502.85 702 $aWang$b Yingxu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYao$b Yiyu Y$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Guoyin$f1970-$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483539503321 996 $aTransactions on Computational Science II$9774017 997 $aUNINA LEADER 03915nam 2200697Ia 450 001 9910220137503321 005 20200520144314.0 010 $a1-282-28301-4 010 $a9786612283017 010 $a0-8330-3234-8 035 $a(CKB)111056486806456 035 $a(EBL)227840 035 $a(OCoLC)475935239 035 $a(SSID)ssj0000215359 035 $a(PQKBManifestationID)11216853 035 $a(PQKBTitleCode)TC0000215359 035 $a(PQKBWorkID)10184190 035 $a(PQKB)10042563 035 $a(Au-PeEL)EBL227840 035 $a(CaPaEBR)ebr10505578 035 $a(OCoLC)50869638 035 $a(MiAaPQ)EBC227840 035 $a(oapen)doab114493 035 $a(EXLCZ)99111056486806456 100 $a20010614d2001 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aOperations against enemy leaders /$fStephen T. Hosmer 205 $a1st ed. 210 $aSanta Monica, CA $cRand$d2001 215 $a1 online resource (178 p.) 300 $a"Prepared for the United States Air Force." 300 $a"Project Air Force." 311 08$a0-8330-3028-0 320 $aIncludes bibliographical references (p. 137-151). 327 $aPREFACE; TABLE; SUMMARY; ACKNOWLEDGMENTS; ABBREVIATIONS; Chapter One INTRODUCTION; OBJECTIVES OF LEADERSHIP ATTACKS; STUDY APPROACH; SOURCES; ORGANIZATION OF THE REPORT; Chapter Two ATTACKING LEADERS DIRECTLY; ASSUMPTIONS UNDERLYING DIRECT ATTACKS; CONSTRAINTS ON LEADERSHIP ATTACKS; SITUATIONS IN WHICH DIRECT ATTACKS ARE LIKELY TO BE SANCTIONED; ASSESSING THE RISKS AND BENEFITS OF DIRECT ATTACKS; DIRECT ATTACKS RARELY PRODUCE WANTED POLICY CHANGES; DIRECT ATTACKS OFTEN FAIL TO DETER UNWANTED ENEMY BEHAVIOR; DIRECT ATTACKS CAN SOMETIMES PRODUCE HARMFUL UNINTENDED CONSEQUENCES 327 $aDIRECT ATTACKS FREQUENTLY FAIL TO NEUTRALIZE THEIR INTENDED TARGETSPREREQUISITES OF EFFECTIVE AIR ATTACKS ON ENEMY LEADERS; Chapter Three FACILITATING COUPS OR REBELLIONS; ASSUMPTIONS UNDERLYING SUPPORT TO COUPS OR REBELLIONS; A POOR SUCCESS RATE WITH COUPS AND REBELLIONS; SUPPORT OF REBELLION TO CHANGE HOSTILE POLICY; WHY U.S. ADVERSARIES HAVE BEEN DIFFICULT TO OVERTHROW AND INTIMIDATE; COERCIVE AND DETERRENT EFFECTS OF DIRECT ATTACKS, COUPS, AND REBELLIONS; PREREQUISITES OF EFFECTIVE AIR SUPPORT TO COUPS AND REBELLIONS; Chapter Four TAKING DOWN REGIMES WITH EXTERNAL MILITARY FORCE 327 $aRATIONALE FOR MAINTAINING CAPABILITIES TO TAKE DOWN ENEMY REGIMESPOTENTIAL CONSTRAINTS ON CONDUCTING TAKEDOWNS; PREREQUISITES OF EFFECTIVE AIR SUPPORT TO EXTERNAL OVERTHROW; ENHANCING THE THREAT OF EXTERNAL OVERTHROW; Chapter Five CONCLUDING OBSERVATIONS; REMOVING ENEMY LEADERS WILL BE NEITHER EASY NOR ALWAYS BENEFICIAL; WHEN LEADERSHIP ATTACKS ARE MOST LIKELY TO BE SANCTIONED; PREREQUISITES OF THE EFFECTIVE USE OF AIR POWER IN DIRECT ATTACKS, COUPS, REBELLIONS, AND TAKEDOWNS; THE DETERRENT AND COERCIVE EFFECTS OF THREATS TO REMOVE LEADERS; BIBLIOGRAPHY 330 $aAn examination of a number of leadership attacks from World War II to the 21st century. It offers insights into the comparative efficacy of various forms of leadership attacks, their potential coercive and deterrent value, and the possible unintended consequences of their ill-considered use. 606 $aInsurgency 606 $aCoups d'e?tat 606 $aAssassination 607 $aUnited States$xMilitary policy 615 0$aInsurgency. 615 0$aCoups d'e?tat. 615 0$aAssassination. 676 $a327.1273 700 $aHosmer$b Stephen T$0910140 712 02$aUnited States.$bAir Force. 712 02$aRand Corporation. 712 02$aProject Air Force (U.S.) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910220137503321 996 $aOperations against enemy leaders$92047536 997 $aUNINA