Skip to main content

Abstract

This chapter describes the methodology and the algorithm used to automatically compute policy options. It provides a mathematical definition of a policy against LeT and then proves the LeT Violence Non-Eliminability Theorem that shows there is no policy that will stop all of LeT’s terrorist actions. The reason for this is that attacks on holidays are carried out in situations that are inconsistent with situations when LeT carries out other types of attacks. The chapter presents an algorithm to compute all policies (in accordance with the mathematical definition of policy) that have good potential to significantly reduce all types of attacks carried out by LeT (except for attacks on holidays). Readers who do not wish to wade through the technical details can skip directly to Sect. 10.5 which summarizes the results of this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Only violent acts considered in this book are included here.

  2. 2.

    In other words, if we stated that a specific literal cannot possibly be made true (e.g., the variable which says LeT stops being a religious organization cannot possible be made true), then this must be respected.

References

  • Alon, N., Moshkovitz, D., & Safra, S. (2006). Algorithmic construction of sets for k-restrictions. The ACM Transactions on Algorithms, 2(2), 153–177.

    Article  MathSciNet  Google Scholar 

  • Baral, C., Kraus, S., Minker, J., & Subrahmanian, V. S. (1992). Combining knowledge bases consisting of first order theories. Computational Intelligence, 8(1), 45–71.

    Article  Google Scholar 

  • Bell, C., Nerode, A., Ng, R., & Subrahmanian, V. S. (1994a). Implementing deductive databases by mixed integer programming. ACM Transactions on Database Systems, 21(2), 238–269.

    Article  Google Scholar 

  • Bell, C., Nerode, A., Ng, R., & Subrahmanian, V. S. (1994b). Mixed integer methods for computing non-monotonic deductive databases. Journal of the ACM, 41(6), 1178–1215.

    Article  MathSciNet  MATH  Google Scholar 

  • Cook, S. (1971). The complexity of theorem proving procedures, Proceedings of the third annual ACM symposium on Theory of computing. pp. 151–158.

    Google Scholar 

  • EĂ©n, N., & Sörensson, N. (2004). An extensible SAT-solver. In Theory and applications of satisfiability testing (pp. 333–336). Berlin: Springer.

    Google Scholar 

  • Hamadi, Y., Jabbour, S., & Sais, L. (2009). ManySAT: A parallel SAT solver. Int. Journal on Satisfiability, Boolean Modeling and Computation (JSAT), 6, 245–262 IOS Press.

    Google Scholar 

  • Karp, R. (1972). Reducibility among combinatorial problems. In R. E. Miller & J. W. Thatcher (Eds.), Complexity of computer computations (pp. 85–103). New York: Plenum.

    Chapter  Google Scholar 

  • Mendelson, E. (2009). Introduction to mathematical logic (5th ed.). London: Chapman and Hall/CRC Press

    Google Scholar 

  • Minker, J. (1982). On indefinite databases and the closed-world assumption, Proceedings of 6th international conference on automated deduction, Lecture Notes in Computer Science Vol. 138, pages 292–308

    Google Scholar 

  • Lund, C., & Yannakakis, M. (1994). On the hardness of approximating minimization problems. Journal of the ACM, 41(5), 960–981.

    Article  MathSciNet  MATH  Google Scholar 

  • Robinson, J. A. (1965). A machine-oriented logic based on the resolution principle. Journal of the ACM, 12(1), 23–41.

    Article  MATH  Google Scholar 

  • Subrahmanian, V. S., Nau, D. S., & Vago, C. (1995). WFS + branch and bound = stable models. IEEE Transactions on Knowledge and Data Engineering, 7(3), 362–377.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. S. Subrahmanian .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Subrahmanian, V.S., Mannes, A., Sliva, A., Shakarian, J., Dickerson, J.P. (2013). Computing Policy Options. In: Computational Analysis of Terrorist Groups: Lashkar-e-Taiba. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4769-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-4769-6_10

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-4768-9

  • Online ISBN: 978-1-4614-4769-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics