Results 41 to 50 of about 672,495 (309)
Restructuring Sovereign Debt After NML v. Argentina [PDF]
The decade and a half of litigation that followed Argentina’s sovereign bond default in 2001 ended with a great disturbance in the Force. A new creditor weapon had been uncloaked: The prospect of a court injunction requiring the sovereign borrower to pay
Buchheit, Lee C., Gulati, G. Mitu
core +2 more sources
Nuclear Disarmament without the Nuclear-Weapon States: The Nuclear Weapon Ban Treaty
The 2017 Treaty on the Prohibition of Nuclear Weapons (tpnw) represents a daring act of self-empowerment: nuclear have-nots produced an international disarmament treaty without the involvement of the nuclear-weapon states or their allies.
Harald Müller, Carmen Wunderlich
semanticscholar +1 more source
Under-actuated USV path following control under multiple constraints
The path following control of an under-actuated unmanned surface vehicle (USV) under the constraints of rudder angle, rudder velocity, and rudder response time in the disturbing environment is studied, and a cascaded path following control system based ...
Hongbin Wang+4 more
doaj +1 more source
Securities Regulation: Shareholder Derivative Actions Against Insiders Under Rule 10b-5 [PDF]
After a general examination of Rule 10b-5 in the context of its traditional application, this comment focuses on the recent developments concerning the rule\u27s function as a weapon for the enforcement of controlling insiders\u27 duties to their ...
Caidahl, Kenneth+4 more
core +4 more sources
Supercavitating vehicles have received significant attention in military applications due to their high underwater speed. This paper aims to establish analytic models of the encounter probability between a supercavitating vehicle and its target in two ...
Yang Guang+4 more
doaj +1 more source
The ant colony optimization (ACO) algorithm is improved and further integrated with the immune algorithm (IA) to address its problems, such as slow convergence, local optimum, and premature convergence in the path planning.
Hongbin Wang, Jianqiang Zhang, Jiao Dong
doaj +1 more source
This paper investigates the threat assessment method and target assignment algorithm in multi-UAV cooperative air combat decision-making. To address the uncertainty and dynamic changes in multiple threat attributes and attribute information of UAV ...
Yiyuan Li+4 more
doaj +1 more source
Trade and Currency Weapons [PDF]
AbstractThe debate on trade and currency wars has reemerged since the Global Financial Crisis. We study the two forms of noncooperative policies within a single framework. First, we compare the elasticity of trade flows to import tariffs and to the real exchange rate, based on product‐level data for 110 countries over the 1989–2013 period. We find that
Bénassy-Quéré, Agnès+2 more
openaire +8 more sources
"Out of the loop": autonomous weapon systems and the law of armed conflict [PDF]
The introduction of autonomous weapon systems into the “battlespace” will profoundly influence the nature of future warfare. This reality has begun to draw the attention of the international legal community, with increasing calls for an outright ban on ...
Schmitt, Michael N.+1 more
core
Sibling violence: validating a two-factor model of severity in nonoffender populations [PDF]
Objective: Despite a recent surge of academic and clinical interest in sibling violence (SV), valid measures of severity have not been psychometrically established using non-offender populations. This study examined the factor-structure of intentional SV
Khan, Roxanne
core +1 more source