We use cookies in order to improve the quality and usability of the HSE website. More information about the use of cookies is available here, and the regulations on processing personal data can be found here. By continuing to use the site, you hereby confirm that you have been informed of the use of cookies by the HSE website and agree with our rules for processing personal data. You may disable cookies in your browser settings.

  • A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Article
An Approach to Estimating the Economic Expediency of Developing a New Cargo Transport Hub by a Regional Public Administration

Belenky A., Fedin G., Kornhauser A.

International Journal of Public Administration. 2021. Vol. 44. No. 13. P. 1076-1089.

Book chapter
A note on subspaces of fixed grades in Clifford algebras

Shirokov D.

In bk.: AIP Conference Proceedings. Vol. 2328: ICMM-2020. AIP Publishing LLC, 2021. Ch. 060001. P. 060001-1-060001-4.

Working paper
On compact 4th order finite-difference schemes for the wave equation

Zlotnik A., Kireeva O.

math. arXiv. Cornell University, 2020. No. arXiv:2011.14104v2[math.NA].

Contacts

109028, Moscow, Pokrovsky Boulevard 11, T423
Phone: +7 (495) 621 13 42,
+ 7(495) 772 95 90 *27200; *27212.
Email: dhm-econ@hse.ru; shatskaya@hse.ru

Administration
School Head Fuad T. Aleskerov
Manager Oksana Kolotvina
Svetlana Shatskaya
Senior Administrator Svetlana Shatskaya

Tag "cyberwarfare" – News

HSE Seminar on Political Economy: Ethan Bueno de Mesquita (University of Chicago) about cyberwarfare models

Ethan Bueno de Mesquita studied deterrence in a world where attacks cannot be perfectly attributed to attackers. In his model, each of n attackers may attack the defender. The defender observes an imperfect signal that probabilistically attributes the attack. The defender may retaliate against one or more attackers, and wants to retaliate against the guilty attacker only. He uncover an endogenous strategic complementarity among the attackers: if one attacker becomes more aggressive, that attacker becomes more “suspect” and the other attackers become less suspect, which leads the other attackers to become more aggressive as well.