How can’t ISIS re-emerge? Weak states and Post-ISIS Challenges
نویسندگان
چکیده
منابع مشابه
Tracking at ISIS
This technical report describes the past, current and future research in tracking at the ISIS group.
متن کاملISIS: Multiprocessor Simulator Library
In this paper, architecture independent software simulation kit for multiprocessors called ISIS is proposed and designed. It includes various small simulators of a hardware device. All functions are implemented in C++ language, and the extension of them is also easy. Execution speed of a sample simulator was measured. Execution time of the simulator with four R3000 processors is 22,000 times of...
متن کاملExplaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya)
Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of fundamentalist terrorist groups has attracted a large part of the world's security literature. Over the past decade, Southwest Asia and North Africa have emerged from domestic crises and transnational power interference, the focus of the emergence and expansion of radical ideas that i...
متن کاملRFC 5120 M - ISIS February
This document describes an optional mechanism within Intermediate System to Intermediate Systems (IS-ISs) used today by many ISPs for IGP routing within their clouds. This document describes how to run, within a single IS-IS domain, a set of independent IP topologies that we call Multi-Topologies (MTs). This MT extension can be used for a variety of purposes, such as an in-band management netwo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Horizon Insights
سال: 2018
ISSN: 2593-3582,2593-3590
DOI: 10.31175/hi.2018.01.04