Topic
Proxy (statistics)
About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the authors analyzed 60 proxy contests for seats on the boards of exchange-listed firms during 1978-1985 and found that three years after the contest less than one-fifth of the sample firms remain independent, publicly held corporations run by the same management team.
183 citations
••
TL;DR: In general, agreement and reliability of proxy responses to the PWD tended to be best for relatives, with friends lower, and health care proxies lowest, and individual measures vary from these general results.
Abstract: Objectives: Research and surveillance activities sometimes require that proxy respondents provide key exposure or outcome information, especially for studies of people with disability (PWD). In this study, we compared the health-related quality of life (HRQoL) responses of index PWD to proxies. Methods: Subjects were selected from nursing home, other assisted living residences, and from several clinic samples of PWD. Each index identified one or more proxy respondents. Computer-assisted interviews used a random order of measures. Proxy reliability was measured by intraclass correlation (ICC) and κ statistics. HRQoL measures tested included the surveillance questions of the Behavioral Risk Factor Surveillance System (BRFSS), basic and instrumental activities of daily living (ADLs and IADLs), medical outcomes study short-form 36 and 12 (SF-36 and SF-12). Results: A total of 131 index-proxy sets were completed. In general, agreement and reliability of proxy responses to the PWD tended to be best for relatives, with friends lower, and health care proxies lowest. For example, the ICC for the physical functioning scale of the SF-36 was 0.68 for relatives, 0.51 for friends, and 0.40 for healthcare proxies. There was a tendency for proxies to overestimate impairment and underestimate HRQoL. This pattern was reversed for measures of pain, which proxies consistently underestimated. The pattern among instruments, proxy types, and HRQoL domains was complex, and individual measures vary from these general results. Conclusions: We suggest caution when using proxy respondents for HRQoL, especially those measuring more subjective domains.
181 citations
••
TL;DR: This work shows that, with at least two independent proxy variables satisfying a certain rank condition, the causal effect is nonparametrically identified, even if the measurement error mechanism, i.e., the conditional distribution of the proxies given the confounder, may not be identified.
Abstract: We consider a causal effect that is confounded by an unobserved variable, but with observed proxy variables of the confounder. We show that, with at least two independent proxy variables satisfying a certain rank condition, the causal effect is nonparametrically identified, even if the measurement error mechanism, i.e., the conditional distribution of the proxies given the confounder, may not be identified. Our result generalizes the identification strategy of Kuroki & Pearl (2014) that rests on identification of the measurement error mechanism. When only one proxy for the confounder is available, or the required rank condition is not met, we develop a strategy to test the null hypothesis of no causal effect.
181 citations
••
10 Mar 2009TL;DR: This work formalizes its security model and proposes an efficient C-PRE scheme, whose chosen-ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption.
Abstract: In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-grained delegation is demanded. To overcome the limitation of existing PRE systems, we introduce the notion of conditional proxy re-encryption (C-PRE), whereby only ci-phertext satisfying a specific condition set by Alice can be transformed by the proxy and then decrypted by Bob. We formalize its security model and propose an efficient C-PRE scheme, whose chosen-ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption. We further extend the construction to allow multiple conditions with a slightly higher overhead.
179 citations