scispace - formally typeset
Search or ask a question
Topic

Proxy (statistics)

About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.


Papers
More filters
Journal ArticleDOI
TL;DR: This article examined a model of precautionary saving and showed that the fact that people may insure against income risk makes it difficult to evaluate the extent of the precautionary accumulation by simply looking at the relationship between wealth and earnings variance.

211 citations

Journal ArticleDOI
TL;DR: The authors used a real options approach to evaluate the performance of several proxy variables for a firm's investment opportunity set and found that the market-to-book assets ratio has the highest information content with respect to investment opportunities.
Abstract: We use a real options approach to evaluate the performance of several proxy variables for a firm's investment opportunity set. The results show that, on a relative scale, the market-to-book assets ratio has the highest information content with respect to investment opportunities. Although both the market-to-book equity and the earnings–price ratios are related to investment opportunities, they do not contain information that is not already contained in the market-to-book assets ratio. Consistent with this finding, a common factor constructed from several proxy variables does not improve the performance of the market-to-book assets ratio.

210 citations

Journal ArticleDOI
TL;DR: In this paper, the authors introduce a framework for differentiating between and understanding HRQL assessments according to rater viewpoint, i.e., the difference between patient self-assessment and the proxy-patient perspective is defined as the inter-rater gap, whereas the differences between the proxypatient and proxy-proxy perspective is described as the intra-proxy gap.
Abstract: Proxy assessment of health-related quality of life (HRQL) may be sought to substitute for, or to complement, patient self-assessment. The viewpoint from which the proxy is asked to assess the patient is a subtle yet important aspect of proxy assessment. Proxy assessments can be elicited by asking a proxy to assess the patient as they think the patient would respond (ie, proxy-patient perspective) or for the proxy to provide their own perspective on the patient's HRQL (ie, proxy-proxy perspective). In this article, we introduce a framework for differentiating between and understanding HRQL assessments according to rater viewpoint. The difference between patient self-assessment and the proxy-patient perspective is defined as the inter-rater gap, whereas the difference between the proxy-patient and proxy-proxy perspective is described as the intra-proxy gap. The inter-rater gap represents the difference between patient self-assessed HRQL and the proxy ability to comprehend the patient view. The extent to which the proxy-proxy perspective is informative will depend upon the proxy's ability to provide reinforcing or complementary information, ie, represented by the intra-proxy gap, on the HRQL of the patient. We refer to the framework to emphasize the importance of delineating between proxy perspectives in study design and HRQL measurement and to guide inquiries into the validity and interpretation of the meaningfulness of the proxy HRQL assessments from each viewpoint. Future research and use of proxy raters of HRQL in clinical trials, population health monitoring, resource allocation, and clinical management can be informed by explicit consideration of the suggested framework.

210 citations

Proceedings Article
01 Jan 2005
TL;DR: In 1998, Blaze, Bleumer and Strauss (BBS) proposed an application called atomic proxy re-encryption, in which a semitrusted proxy converts a ciphertext for Alice into a cipher text for Bob without seeing the underlying plaintext as mentioned in this paper.
Abstract: In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and secure re-encryption will become increasingly popular as a method for managing encrypted file systems. Although efficiently computable, the wide-spread adoption of BBS re-encryption has been hindered by considerable security risks. Following recent work of Dodis and Ivan, we present new re-encryption schemes that realize a stronger notion of security and demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system. Performance measurements of our experimental file system demonstrate that proxy re-encryption can work effectively in practice.

210 citations

Journal ArticleDOI
TL;DR: In this article, a longer data series is used, an improved tariff discrimination proxy is employed, and "predicted sales" are estimated and used as the output variable in the empirical work, a variable to capture the effect of the US capital control programs is also included.

205 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,242
20222,473
2021334
2020262
2019250
2018282