LEADER 03102nam 2200625Ia 450 001 9910970867903321 005 20251117065225.0 010 $a9786613096173 010 $a9781283096171 010 $a128309617X 010 $a9780300168525 010 $a0300168527 024 7 $a10.12987/9780300168525 035 $a(CKB)2670000000079609 035 $a(MiAaPQ)EBC3420660 035 $a(DE-B1597)485690 035 $a(OCoLC)1024047142 035 $a(DE-B1597)9780300168525 035 $a(Au-PeEL)EBL3420660 035 $a(CaPaEBR)ebr10451031 035 $a(CaONFJC)MIL309617 035 $a(OCoLC)923595669 035 $a(Perlego)1089718 035 $z(OCoLC)1024047142 035 $a(EXLCZ)992670000000079609 100 $a20100616d2011 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aOutsourcing war and peace $epreserving public values in a world of privatized foreign affairs /$fLaura A. Dickinson 205 $a1st ed. 210 $aNew Haven $cYale University Press$dc2011 215 $axi, 271 p. $cill 311 0 $a9780300144864 311 0 $a0300144865 320 $aIncludes bibliographical references and index. 327 $tFront matter --$tContents --$tAcknowledgments --$t1. Introduction --$t2. Key Moments in U.S. Military and Security Outsourcing, from Vietnam to Iraq --$t3. Too Many Gaps? Catching Private Contractors in the Web of Litigation --$t4. The Unexplored Promise of Contract --$t5. Public Participation / Private Contract --$t6. Uniformed Military Lawyers, Organizational Structure and Culture, and the Impact of Privatization --$t7. Conclusion --$tNotes --$tIndex 330 $aOver the past decade, states and international organizations have shifted a surprising range of foreign policy functions to private contractors. But who is accountable when the employees of foreign private firms do violence or create harm? This timely book describes the services that are now delivered by private contractors and the threat this trend poses to core public values of human rights, democratic accountability, and transparency. The author offers a series of concrete reforms that are necessary to expand traditional legal accountability, construct better mechanisms of public participation, and alter the organizational structure and institutional culture of contractor firms. The result is a pragmatic, nuanced, and comprehensive set of responses to the problem of foreign affairs privatization. 606 $aContracting out$zUnited States 606 $aDefense contracts$zUnited States 606 $aPrivate military companies$zUnited States 615 0$aContracting out 615 0$aDefense contracts 615 0$aPrivate military companies 676 $a355.6/2120973 700 $aDickinson$b Laura A$g(Laura Anne)$01813736 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910970867903321 996 $aOutsourcing war and peace$94367145 997 $aUNINA LEADER 05153nam 22006615 450 001 9911049093403321 005 20260102122648.0 010 $a981-9663-51-2 024 7 $a10.1007/978-981-96-6351-4 035 $a(CKB)44770151200041 035 $a(MiAaPQ)EBC32470490 035 $a(Au-PeEL)EBL32470490 035 $a(DE-He213)978-981-96-6351-4 035 $a(EXLCZ)9944770151200041 100 $a20260102d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of the Eleventh International Conference on Mathematics and Computing $eICMC 2025, Volume 2 /$fedited by Debasis Giri, Indrakshi Ray, S. Ponnusamy, Rakesh M. Verma, James B D. Joshi 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (677 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1404 311 08$a981-9663-50-4 327 $aAn Improved Collusion Resistant Certificateless Aggregate Signature Scheme for VANETs -- Hybrid Chaotic Image Encryption with Non-Linear Feedback Shift Register and Key-Sensitive S-Box -- A fusion 2D Logistic-cosine-sine Map based Secure Colour Image Communication -- The First and Second Kinds of Thabit Numbers Expressed as Sums, Differences or Products of Two Generalized Lucas Sequences -- Shadower-Shadowee Dynamics in Target Tracking: A Honey Bee Brain-Guided Control System -- A Comprehensive Study of Glioma Brain Tumor Detection with Combined Deep Learning Models LSTM and Bi-LSTM -- A Simplified Attribute-Based Signature Scheme Using RSA Algorithm -- CNN Based Response Adaptive Randomization for Treatment Allotment Using Biomarker Information -- Deep Learning based Distinguisher of Stream Ciphers -- Malware Classification using Kolmogorov-Arnold Network -- Optimizing Authentication Path Computation time in the Merkle Signature Scheme for Post-Quantum Security -- ViT-RES: Attention Exploitation for Breast Cancer Image Classification -- Deep Learning based Multiclass Classification of Pneumonia, COVID-19, and Tuberculosis from Chest X-ray Images -- Deep Learning based Multiclass Classification of Pneumonia, COVID-19, and Tuberculosis from Chest X-ray Images -- Solving Percentage-based Financial Word Problems -- Local convergence analysis of a family of third order iterative methods using majorant function in Riemannian Manifold -- A Hybrid Improved Particle swarm optimization and Genetic algorithm for energy efficient task offloading in Industrial IoT -- Non-modal Linear Stability Analysis of Fluid Flow in a Rotating Channel Containing Porous Media -- A Robust Regression Estimation Technique Using Direct Weights Based on Median -- Game Theory-based Resource Allocation in Edge Environment -- Effect of interfacial imperfection on Love wave propagation in flexomagnetic composite -- AI-Optimized EV Battery Management with Solar and Swapping -- Ramanujan-Hardy-Littlewood Type Identity Involving Modified Bessel's Function -- Real Paley-Wiener theorem for multi-dimensional quadratic phase Fourier transform -- Simplified High-Performance Approach for Optic Disk Segmentation from Fundus Image -- Weighted-II least square algorithm and its consistency. 330 $aThis book features selected papers from the 11th International Conference on Mathematics and Computing (ICMC 2025), held at IIT Bhilai, India during January 09 ? 11, 2025. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cyber security, machine learning, data analytics and blockchain technology in computer science and information technology. The book is divided into two volumes. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1404 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aComputational Intelligence 606 $aArtificial Intelligence 606 $aMobile and Network Security 606 $aData and Information Security 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aMobile and Network Security. 615 24$aData and Information Security. 676 $a006.3 700 $aGiri$b Debasis$01380213 701 $aRay$b Indrakshi$0882265 701 $aPonnusamy$b S$0666562 701 $aVerma$b Rakesh M$01886560 701 $aJoshi$b James B. D$01235796 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911049093403321 996 $aProceedings of the Eleventh International Conference on Mathematics and Computing$94522103 997 $aUNINA