How can’t ISIS re-emerge? Weak states and Post-ISIS Challenges

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tracking at ISIS

This technical report describes the past, current and future research in tracking at the ISIS group.

متن کامل

ISIS: Multiprocessor Simulator Library

In this paper, architecture independent software simulation kit for multiprocessors called ISIS is proposed and designed. It includes various small simulators of a hardware device. All functions are implemented in C++ language, and the extension of them is also easy. Execution speed of a sample simulator was measured. Execution time of the simulator with four R3000 processors is 22,000 times of...

متن کامل

Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya)

Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of  fundamentalist terrorist groups has attracted a large part of the world's security literature.  Over the past decade, Southwest Asia and North Africa have emerged from domestic crises and transnational power interference, the focus of the emergence and expansion of radical ideas that i...

متن کامل

RFC 5120 M - ISIS February

This document describes an optional mechanism within Intermediate System to Intermediate Systems (IS-ISs) used today by many ISPs for IGP routing within their clouds. This document describes how to run, within a single IS-IS domain, a set of independent IP topologies that we call Multi-Topologies (MTs). This MT extension can be used for a variety of purposes, such as an in-band management netwo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Horizon Insights

سال: 2018

ISSN: 2593-3582,2593-3590

DOI: 10.31175/hi.2018.01.04