Decision Framework for Assessing WMD Threats Using Social Agent Models
暂无分享,去创建一个
[1] Edward M. Hundert,et al. The Cement of the Universe , 1990 .
[2] Paul Humphreys,et al. Why Propensities Cannot Be Probabilities , 1985, Philosophical Papers.
[3] E. F. Codd,et al. A relational model of data for large shared data banks , 1970, CACM.
[4] L. Festinger,et al. A Theory of Cognitive Dissonance , 2017 .
[5] Graham Allison,et al. Nuclear Terrorism: The Ultimate Preventable Catastrophe , 2004 .
[6] Dennis McLeod,et al. The semantic data model: a modelling mechanism for data base applications , 1978, SIGMOD Conference.
[7] G. Mann. The Quark and the Jaguar: adventures in the simple and the complex , 1994 .
[8] M. Howard. War in European history , 1976 .
[9] C. Hempel. The Function of General Laws in History , 1942 .
[10] S. Garrett,et al. The Chemical Weapons Taboo , 1999 .
[11] Raymond A. Eve,et al. Chaos, complexity, and sociology : myths, models, and theories , 1998 .
[12] P. Collier,et al. Greed and Grievance in Civil War , 1999 .
[13] D. North. Structure and Change in Economic History , 1983 .
[14] N. Chater,et al. Précis of Bayesian Rationality: The Probabilistic Approach to Human Reasoning , 2009, Behavioral and Brain Sciences.
[15] M. Willrich. The Treaty on Non-Proliferation of Nuclear Weapons: Nuclear Technology Confronts World Politics , 1968 .
[16] I. Gilboa,et al. Case-Based Decision Theory , 1995 .
[17] B. Ramberg. Attacks on Nuclear Reactors: The Implications of Israel's Strike on Osiraq , 1982 .
[18] Peter R. Monge,et al. Theories of Communication Networks , 2003 .
[19] Karl R. Popper,et al. A World of Propensities , 1993, Popper's Views on Natural and Social Science.
[20] J. Milton,et al. The Rosenberg file , 1997 .
[21] W. Salmon. Dynamic Rationality: Propensity, Probability, and Credence , 1988 .
[22] Michael Wooldridge,et al. Game theoretic and decision theoretic agents , 2000, The Knowledge Engineering Review.
[23] Ned Hall,et al. Causation and counterfactuals , 2004 .
[24] Robert W. Blanning,et al. Metagraphs: a tool for modeling decision support systems , 1994 .
[25] J. Kingman. Terrifying Landscapes : A Study of Scientific Research Into Understanding Motivations of Non-State Actors to Acquire and / or Use Weapons of Mass Destruction , 2007 .
[26] Patrick Y. K. Chau,et al. Designing Effective Simulation-based Decision Support Systems: An Empirical Assessment of Three Types of Decision Support Systems , 1995 .
[27] Joshua M Epstein,et al. Modeling civil violence: An agent-based computational approach , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[28] C. Henry. Shrewd Sanctions: Statecraft and State Sponsors of Terrorism , 2003 .
[29] D. Deutsch. Quantum theory, the Church–Turing principle and the universal quantum computer , 1985, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[30] Michael J. Prietula,et al. Simulating organizations: computational models of institutions and groups , 1998 .
[31] H. Gerard. Dissonance Theory: A Cognitive Psychology With an Engine , 1992 .
[32] D. L. Sallach. Comparing objects composed by abstract relationships , 1989, [1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume III: Decision Support and Knowledge Based Systems Track.
[33] J. Rosenthal,et al. Markov Chain Monte Carlo , 2018 .
[34] John H. Miller,et al. Complex adaptive systems - an introduction to computational models of social life , 2009, Princeton studies in complexity.
[35] Kathleen M. Carley,et al. Dynamic Network Analysis for Counter-Terrorism , 2005 .
[36] Samina Ahmed. Security dilemmas of nuclear-armed Pakistan , 2000 .
[37] Richard P. Mitchell,et al. The Society of the Muslim Brothers , 1972 .
[38] David A. Hartley,et al. A Hypergame Approach to Crisis Decision-Making: The 1973 Middle East War , 1982 .
[39] W. E. Morris. Hume’s Refutation of Inductive Probabilism , 1988 .
[40] Lars-Erik Cederman,et al. Emergent Actors in World Politics , 1997 .
[41] Peter Bennett,et al. Hypergames and What They Do: A ‘Soft O.R.’ Approach , 1982 .
[42] Barton C. Hacker,et al. The Transformation of War , 1992 .
[43] Malcolm Dando,et al. Deadly cultures: biological weapons since 1945. , 2006 .
[44] Craig Calhoun,et al. Explanation in Historical Sociology: Narrative, General Theory, and Historically Specific Theory1 , 1998, American Journal of Sociology.
[45] Steve Smith,et al. Lessons of October: historians, political scientists, policy-makers and the Cuban missile crisis , 1994 .
[46] Z. Maoz,et al. Israel and the Bomb , 2004, International Security.
[47] Richard L. Russell,et al. We Now Know: Rethinking Cold War History , 1998 .
[48] J. Wirtz. Deterring America: Rogue States and the Proliferation of Weapons of Mass Destruction , 2007, Perspectives on Politics.
[49] G. Nigel Gilbert,et al. Simulation for the social scientist , 1999 .
[50] J. Pearl. Causality: Models, Reasoning and Inference , 2000 .
[51] Samir Okasha,et al. Philosophical Theories of Probability , 2002 .
[52] Joshua M. Epstein,et al. Growing Artificial Societies: Social Science from the Bottom Up , 1996 .
[53] J Moffat,et al. Representing the command and control process in simulation models of conflict , 2000, J. Oper. Res. Soc..
[54] Shivanand Balram,et al. Integrating Geographic Information Systems and Agent-Based Modeling Techniques for Simulating Social and Ecological Processes , 2003, The Professional Geographer.
[55] W. Heath. The Difference: How the Power of Diversity Creates Better Groups, Firms, Schools, and Societies , 2008 .
[56] B. D'espagnat. Veiled Reality: An Analysis Of Present-day Quantum Mechanical Concepts , 1995 .
[57] Jeffrey M. Bale,et al. Deadly Connections: States That Sponsor Terrorism , 2006 .
[58] John M. Swales,et al. Consilience: The Unity of Knowledge , 1999 .
[59] Paul E. Lehner,et al. Using Hypergames to Increase Planned Payoff and Reduce Risk , 2002, Autonomous Agents and Multi-Agent Systems.
[60] Scott D. Sagan,et al. Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb , 1996, International Security.
[61] Ray Takeyh. Hidden Iran: Paradox and Power in the Islamic Republic , 2006 .
[62] G. Allen Greb,et al. Strategic arms limitation , 2008 .
[63] M. R. Dando,et al. Complex Strategic Analysis: A Hypergame Study of the Fall of France , 1979 .
[64] Charles M. Macal,et al. Managing Business Complexity: Discovering Strategic Solutions with Agent-Based Modeling and Simulation , 2007 .
[65] John F. Sowa,et al. Knowledge representation: logical, philosophical, and computational foundations , 2000 .
[66] Keith W. Hipel,et al. A Conflict Analysis of the Armenian-Azerbaijani Dispute , 1990 .
[67] Stanislaw Raczynski. Simulation of The Dynamic Interactions Between Terror and Anti-Terror Organizational Structures , 2004, J. Artif. Soc. Soc. Simul..
[68] T. A. May. Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterrorism , 2005 .
[69] E. Durkheim. Suicide: A Study in Sociology , 1897 .
[70] Paul Collier,et al. Rebellion as a Quasi-Criminal Activity , 2000 .
[71] Joseph Y. Halpern,et al. Redoing the Foundations of Decision Theory , 2006, KR.
[72] N. Tannenwald. The Nuclear Taboo: The United States and the Normative Basis of Nuclear Non-Use , 1999, International Organization.
[73] J. Keegan,et al. A History of Warfare. , 1995 .
[74] N. Foo. Conceptual Spaces—The Geometry of Thought , 2022 .
[75] Arthur L. Stinchcombe,et al. Theoretical methods in social history , 1980 .
[76] Joseph M. Whitmeyer,et al. Social Emergence: Societies as Complex Systems , 2006 .