Additive and Non-Additive Risk Factors in Multiple Causation
نویسندگان
چکیده
منابع مشابه
Non-additive Risk and the Risk-Incentives Tradeo¤
Use of additive risk has been the standard approach in the analysis of moral hazard models. However, this approach clouds the more complex role risk can play in the determination of incentive strength. When risk is non-additive, it will potentially start inuencing action choice and thus have productive consequences as well. We provide a simple characterization of the avenues through which unce...
متن کاملMapping QTL with additive effects and additive x additive epistatic interactions for plant architecture in wheat (Triticum aestivum L.)
In bread wheat (Triticum aestivum L.), crop height is an important determinant of agronomic performance. To map QTLs with additive effects and additive×additive epistatic interactions, 148 recombinant inbred lines and their parents, (‘YecoraRojo’ and Iranian landrace (No. #49)) were evaluated under normal and water deficit conditions. The experiments were carried out on research farms of Mahaba...
متن کاملPositive-additive functional equations in non-Archimedean $C^*$-algebras
Hensel [K. Hensel, Deutsch. Math. Verein, {6} (1897), 83-88.] discovered the $p$-adic number as a number theoretical analogue of power series in complex analysis. Fix a prime number $p$. for any nonzero rational number $x$, there exists a unique integer $n_x inmathbb{Z}$ such that $x = frac{a}{b}p^{n_x}$, where $a$ and $b$ are integers not divisible by $p$. Then $|x...
متن کاملNon-Additive Security Games
Security agencies have found security games to be useful models to understand how to better protect their assets. The key practical elements in this work are: (i) the attacker can simultaneously attack multiple targets, and (ii) different targets exhibit different types of dependencies based on the assets being protected (e.g., protection of critical infrastructure, network security, etc.). How...
متن کاملNon-additive Security Game
Strategically allocating resources to protect targets against potential threats in an efficient way is a key challenge facing our society. From the classical interdiction game to the recently proposed Stackelberg Security Game, applying computational game models to the security domain has made a real-world impact on numerous fields including military attack and defense, financial system securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Review of Law & Economics
سال: 2009
ISSN: 1555-5879
DOI: 10.2202/1555-5879.1340