Additive and Non-Additive Risk Factors in Multiple Causation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Non-additive Risk and the Risk-Incentives Tradeo¤

Use of additive risk has been the standard approach in the analysis of moral hazard models. However, this approach clouds the more complex role risk can play in the determination of incentive strength. When risk is non-additive, it will potentially start in‡uencing action choice and thus have productive consequences as well. We provide a simple characterization of the avenues through which unce...

متن کامل

Mapping QTL with additive effects and additive x additive epistatic interactions for plant architecture in wheat (Triticum aestivum L.)

In bread wheat (Triticum aestivum L.), crop height is an important determinant of agronomic performance. To map QTLs with additive effects and additive×additive epistatic interactions, 148 recombinant inbred lines and their parents, (‘YecoraRojo’ and Iranian landrace (No. #49)) were evaluated under normal and water deficit conditions. The experiments were carried out on research farms of Mahaba...

متن کامل

Positive-additive functional equations in non-Archimedean $C^*$-‎algebras

‎Hensel [K‎. ‎Hensel‎, ‎Deutsch‎. ‎Math‎. ‎Verein‎, ‎{6} (1897), ‎83-88.] discovered the $p$-adic number as a‎ ‎number theoretical analogue of power series in complex analysis‎. ‎Fix ‎a prime number $p$‎. ‎for any nonzero rational number $x$‎, ‎there‎ ‎exists a unique integer $n_x inmathbb{Z}$ such that $x = ‎frac{a}{b}p^{n_x}$‎, ‎where $a$ and $b$ are integers not divisible by ‎$p$‎. ‎Then $|x...

متن کامل

Non-Additive Security Games

Security agencies have found security games to be useful models to understand how to better protect their assets. The key practical elements in this work are: (i) the attacker can simultaneously attack multiple targets, and (ii) different targets exhibit different types of dependencies based on the assets being protected (e.g., protection of critical infrastructure, network security, etc.). How...

متن کامل

Non-additive Security Game

Strategically allocating resources to protect targets against potential threats in an efficient way is a key challenge facing our society. From the classical interdiction game to the recently proposed Stackelberg Security Game, applying computational game models to the security domain has made a real-world impact on numerous fields including military attack and defense, financial system securit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Review of Law & Economics

سال: 2009

ISSN: 1555-5879

DOI: 10.2202/1555-5879.1340