A Generalized Stochastic Dominance Program for the IBM PC

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generalized Almost Stochastic Dominance

Almost stochastic dominance allows small violations of stochastic dominance rules to avoid situations where most decision makers prefer one alternative to another but stochastic dominance cannot rank them. However, the commonly used integral condition for almost seconddegree stochastic dominance does not map into the corresponding classes of increasing concave utility functions with bounded der...

متن کامل

Generalized stochastic dominance and bad outcome aversion

Incomplete preferences over lotteries on a finite set of alternatives satisfying, besides independence and continuity, a property called bad outcome aversion are considered. These preferences are characterized in terms of their specific multi-expected utility representations (cf. Dubra et al., 2004), and can be seen as generalized stochastic dominance preferences. JEL-classification: C0, D0

متن کامل

Membrane potential simulation program for IBM-PC-compatible equipment for physiology and biology students.

MEMPOT is an interactive graphic simulation program, written in Turbo C for IBM-PC-compatible equipment and designed to teach students in the physiological and biological sciences about the measurement and ion dependence of cell membrane potentials. Different external salt solution values can be chosen and an intracellular electrode can be moved on the screen to impale one of a group of cells a...

متن کامل

DNA sequence analysis on the IBM-PC

We have developed, for the IBM-PC microcomputer, a menu driven, interactive set of programs which provide the functions routinely used for DNA sequence data analyses.

متن کامل

Exponentiation Cryptosystems on the IBM PC

Several cryptosystems based on exponentiation have been proposed in recent years. Some of these are of the public key variety and offer notable advantages in cryptographic key management, both for secret c o m munication and for message authentication. The need for extensive arithmetic calculations with very large integers (hundreds of digits long) is a drawback of these systems. This paper des...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Agricultural and Applied Economics

سال: 1989

ISSN: 1074-0708,2056-7405

DOI: 10.1017/s008130520000128x