Supplementary Material

Supplement to “Minimum distance estimators for dynamic games” (Quantitative Economics, Vol. 4, No. 3, November 2013, 549–583) Sorawoot Srisuma School of Economics, University of Surrey

This supplementary material contains Appendices A and B. Appendix A illustrates the theoretical issue of consistent estimation related to Bajari, Benkard, and Levin’s (2007) inequality approach, as well as providing some remedies for discrete action games. Appendix B contains the proofs of Theorems 1 and 2 in the main paper.

Appendix A: Consistent estimation with BBL’s methodology This appendix illustrates a potential problem with the inequality approach of Bajari, Benkard, and Levin’ (2007, hereafter BBL). We provide two examples in Section A.1, each showing a scenario where the inequality restrictions imposed by the equilibrium are satisfied by a unique element in the parameter space and the uniqueness can be lost when a strict subclass of inequalities is considered. The first example has no conditioning variables so as to emphasize that the source of information loss here differs from the instrumental variable model in Domínguez and Lobato (2004). The second example corresponds to Design 2 of the simulation study in Section 5. In Section A.2, we provide a class of inequalities that retains the identifying information of the (identified) parameters of some discrete action games. We conclude with a brief discussion in Section A.3. A.1 Mathematical examples Single agent problem Consider a simple optimization problem where an economic agent maximizes the payoff function uθ (a ε) = −a2 + 2θaε Here a and ε denote the action and state variables, respectively, and θ belongs to Θ, some positive subset of R. The model is generated from some distribution of εn that is absolutely continuous with respect to the Lebesgue measure and has finite second moment. Notice that the current setup satisfies conditions in Section 2.3 as a special case of a single agent static decision problem (β = 0 and I = 1). Since the payoff function Sorawoot Srisuma: [email protected] Copyright © 2013 Sorawoot Srisuma. Licensed under the Creative Commons Attribution-NonCommercial License 3.0. Available at http://www.qeconomics.org. DOI: 10.3982/QE266

2 Sorawoot Srisuma

Supplementary Material

is concave, the optimal strategy follows from the first order condition αθ (εn ) = θεn

a.s. for all θ ∈ Θ

It is clear that the distribution of αθ (εn ) is identified. Let θ0 denote the true parameter and suppose we observe a random sample {an }N n=1 , where an = αθ0 (εn ) for each n. The inequality approach of BBL defines an estimator for θ0 that satisfies the system of moment inequalities in the limit,       α(εn ) εn E uθ αθ0 (εn ) εn ≥ E uθ 

for all  α ∈ A0 

(SA1)

where A0 is some user-chosen class of functions (of alternative strategies). We first consider a popular class of strategies based on additive perturbations and show that it cannot be used to identify θ0 . Formally, let S be some subset of R. Then define A0 (S) = { α(·; η) for η ∈ S :  α(ε; η) = αθ0 (ε) + η for all ε ∈ E }.1 It follows from some simple algebra that, for any η,       α(εn ; η) εn = η2 + 2η(θ0 − θ)E[εn ] E uθ αθ0 (εn ) εn − E uθ  When εn has mean zero, A0 (S) has no identifying information for θ0 in the sense that, for all θ ∈ Θ       E uθ αθ0 (εn ) εn ≥ E uθ  α(εn ) εn

for all  α ∈ A0 (S)

even if S = R. Therefore, A0 (S) cannot be used to consistently estimate θ0 . However, the set of inequalities that considers all alternative strategies can actually identify θ0 . To see this, we begin by calculating the difference between the expected reα: turns from αθ0 and a generic alternative strategy         2    α(εn ) εn = −(θ − θ0 )2 E εn2 + E θεn −  α(εn )  E uθ αθ0 (εn ) εn − E uθ  α(·; η) If we consider an inequality based on multiplicative perturbation, say A1 (S) = { α from A1 (S), the difference for η ∈ S :  α(ε; η) = ηαθ0 (ε) for all ε ∈ E }, then by choosing  above simplifies to ((θ − ηθ0 )2 − (θ − θ0 )2 )E[εn2 ]. It is easy to see that whenever θ = θ0 , the inequality in (SA1) will be violated for some range of values of η sufficiently close to 1: more precisely, if θ > θ0 , then violation occurs for η ∈ (1 θ/θ0 ); otherwise take η ∈ (θ/θ0  1). Therefore, the class of multiplicative perturbations has sufficient identifying power for θ0 in the sense that when S contains any open ball centered at 1, then       α(εn ) εn E uθ αθ0 (εn ) εn ≥ E uθ 

for all  α ∈ A1 (S) if and only if θ = θ0 

1 In an application of the BBL methodology, the user puts a distribution on η that has support S. A random sequence from this distribution is then drawn to construct the objective function; for instance, if S = R, then η can be drawn from a normal distribution.

Supplementary Material

Minimum distance estimators for dynamic games 3

Cournot game Consider the setup of Design 2 in Section 5. Here we give a slightly more informal argument for why inequalities based on additive perturbation lose some identifying information on the data generating parameter while multiplicative perturbations can preserve it. Consider player 1. For any given a2  x ε1 , u1θ (a1  a2  x ε1 ) is concave in a1 since θ1 > 0. Taking the first derivative gives ∂ u1θ (a1  a2  x ε1 ) = x − θ2 ε1 − θ1 x(2a1 + a2 ) ∂a1 Since a1 and a2 enter the first derivative linearly and separately, the expected (symmetric) optimal action, which we denote by γθ , can be obtained by finding the zero to solve the first order condition   ∂ γθ (xn ) = arg zero E u1θ (a1  a2  xn  ε1n )|xn  ∂a1 a∈A a1 =a2 =a Given that ε1n is a random variable with mean 0 and variance 1, it then follows that γθ (xn ) = 3θ1 . Therefore, for any x ε1 , player 1’s optimal choice, αθ (x ε1 ), can be char1

θ 2 ε1 . It is clear that acterized by the zero of ∂a∂ u1θ (a1  γθ (x) x ε1 ) that is equal to 3θ1 − 2xθ 1 1 1 the distribution of αθ (x εn ) is identified. Suppose the data are generated from a random sample of {a1n  a2n  x}N n=1 , where ain = αθ0 (xn  εin ) for i = 1 2 and every n, for some θ0 = (θ01  θ02 ) ∈ R+ × R+ . To study whether additive perturbations can be used to construct objective functions that identify θ0 , we consider u1θ (a1 + η γθ0 (x) x ε1 ) for some η. Through some tedious algebra, it can be shown that   u1θ a1 + η γθ0 (x) x ε1       = u1θ a1  γθ0 (x) x ε1 + η x − θ1 xγθ0 (x) − θ2 ε − θ1 x 2a1 η + η2 

Comparing the expected returns from using the optimal strategy and a perturbed one gives         E u1θ αθ (s1n ) γθ0 (xn ) s1n |xn = x − E u1θ αθ0 (s1n ) + η γθ0 (xn ) s1n |xn = x     = −η x − θ1 xγθ0 (x) + θ1 x 2γθ0 (x)η + η2

θ1 = −ηx 1 − + θ1 xη2  θ01 Clearly, θ = (θ01  θ2 ) satisfies the necessary condition implied by the equilibrium for all values of θ2 . Therefore, the objective functions constructed using additive perturbations cannot identify θ02 in the limit. Next, we consider the multiplicative perturbation. For the calculations, it is convenient to write the multiplicative factor as (1 + η). Then it can be shown that   u1θ a1 (1 + η) γθ0 (x) s1       = u1θ a1  γθ0 (x) s1 + ηa1 x − θ1 xγθ0 (x) − θ2 ε − θ1 x 2η + η2 a21 

4 Sorawoot Srisuma

Supplementary Material

Taking conditional expectation and comparing the expected returns gives     E u1θ αθ0 (s1n ) γθ0 (xn ) s1n |xn = x     − E u1θ αθ0 (s1n ) + η γθ0 (xn ) s1n |xn = x



2

2 1 η x θ02 θ02  δ1 + (δ1 θ02 + δ2 ) + θ1 xη2 =− + θ01 3 2x 3θ01 2θ01 x where δ1 = 1 − θθ1 and δ2 = θ2 − θ02 . For any δ1  δ2 = 0, with a small enough |η|, the 01 squared (second) term above is of smaller order and the first term will be strictly negative for some state x with either η > 0 or η < 0. Therefore, we expect { α(·; η) for η ∈ S : α(si ; η) = ηαθ0 (si ) for all si ∈ Si } to be able to preserve the identifying information of θ0 when S contains an open ball centered at 1. A.2 Perturbations for discrete action games We first consider a binary action game that satisfy Assumptions M1, M2, M3, and D in Section 2, where D is the parameterized version of D that replaces ui everywhere with uiθ . To keep the calculation of the expected returns tractable, we only use the class of alternative strategies where players only deviate from the equilibrium action in the first stage; BBL (see p. 1348) also suggested this among other ways to construct inequalities. In particular, we can, therefore, adopt the framework of the pseudo-model constructed in Section 3.1. Suppose the data {(ain  a−in  xn  xn )}N n=1 are generated from a pure strategy Markov equilibrium when θ = θ0 . In the limit, the pseudo-objective function (see equation (8)) is   Λiθ (ai  x εi ) = E uiθ (ai  a−in  xn  εi )|xn = x + βi giθ (ai  x) = viθ (ai  x) + εi (ai ) where viθ (ai  x) = E[πiθ (ai  a−in  xn )|xn = x] + βi giθ (ai  x); Pesendorfer and SchmidtDengler (2008) called viθ the continuation value net of the payoff shocks. Since we only focus on identification, viθ is taken as known; conditions for consistent estimation of viθ and other details can be found in Aguirregabiria and Mira (2007) and Pesendorfer and Schmidt-Dengler (2008). It is also convenient to define the differences between the choice-specific continuation values and private values. Let Λiθ (ai  ai  si ) = Λiθ (ai  si ) − Λiθ (ai  si ), and also let viθ (x) = viθ (1 x) − viθ (0 x) and ωin = εin (0) − εin (1). Note that under Assumption D(iii), ωin is absolutely continuous with respect to the Lebesgue measure with support on R. The pseudo-best response is characterized by a cutoff rule,   αiθ (sin ) = 1 viθ (xn ) > ωin a.s. for all θ ∈ Θ and i = 1     I −1 (P (1|x)), where P (1|x) denotes the underlying Then viθ0 (x) is identified from Qω i i i −1 is the inverse of the disequilibrium choice probability of choosing action 1 and Qω i tribution function of ωin . We assume that θ0 is identified (see Definition 3 in Section 4.1) and we claim that a class of alternative strategies that consists of perturbing the cutoff values has sufficient identifying power for θ0 . More formally, let AU αi (·; η) for η ∈ S : αi (si ; η) = i (S) = {

Supplementary Material

Minimum distance estimators for dynamic games 5

1[viθ0 (x) + η > ωi ] for all si ∈ Si }. Then AU i (S) has sufficient identifying power for θ0 in the sense that         E Λiθ αiθ0 (sin ) sin |xn = x ≥ E Λiθ  αi (sin ) sin |xn = x (SA2) for all i x and  αi ∈ AU (S) if and only if θ = θ  0 i for some appropriate S. To see this, we first show that whenever θ = θ0 , we can find some i si , and η such that Λiθ (αiθ0 (si ) αi (si ; η) si ) < 0. Since θ0 is identified, for any θ = θ0 , there exists some i x and ξ = 0 such that viθ (x) = viθ0 (x) + ξ. Suppose ξ > 0. Then any η ∈ (0 ξ) implies   αi (si ; η) si Λiθ αiθ0 (si )     − viθ (x) − ωi < 0 for ωi ∈ viθ0 (x) viθ0 (x) + η  = 0 otherwise By an analogous argument, when ξ < 0, choosing any η ∈ (ξ 0) implies that αi (si ; η) si ) takes strictly negative values for all ωi ∈ (viθ0 (x) + η Λiθ (αiθ0 (si ) viθ0 (x)) and is 0 otherwise. Since ωin has a continuous distribution on R, αi (sin ; η) sin )|xn = x] < 0 for all η on either (−ξ 0) or (0 ξ) with small E[Λiθ (αiθ0 (sin ) enough ξ > 0. Therefore, the class of perturbations at the cutoff value has sufficient identifying power for θ0 if S contains any open ball that is centered at 0. Although we do not provide any formal details, due to nontrivial additional notational complexity, an analogous idea can be used for multinomial action games. Suppose Ki = K for all i. Then the optimality condition for the (K + 1) choice problem can be characterized, for each player and state, by K inequality constraints that partition RK —the support of the normalized private values. The role of a cutoff value is then replaced by a locus point in RK , which is uniquely identified by the inversion result of Hotz and Miller (1993) subject to the choice of a normalization action. Then analogous alternative strategies can be constructed by additively perturbing the locus point using a K-dimensional variable whose support includes a ball in RK that contains the origin. The intuition used in the unordered binary action game can also be applied to the class of discrete monotone action games. Specifically, we now assume M1, M2, M3, S1 , S2, and S3 , and let the data {(ain  a−in  xn )}N n=1 be generated from a pure strategy Markov equilibrium when θ = θ0 . Recall that αiθ (x ·) is a nondecreasing function on Ei (by the arguments of Lemmas 1 and 2). For notational simplicity, suppose that Ai = {0 1} for all i. Then the pseudo-best response is uniquely characterized by a cutoff rule   αiθ (sin ) = 1 Ciθ (xn ) ≥ εin a.s. for all θ ∈ Θ and i = 1     I for some Ciθ such that εi ≤ Ciθ (x) ≤ ε¯ i for all i, x, θ. In particular, when Pr[αiθ (sin ) = 1|xn = x] = 0, set Ciθ (x) = εi , and when Pr[αiθ (sin ) = 1|xn = x] = 1, set Ciθ (x) = ε¯ i . As seen previously, Ciθ0 (x) is identified by Qi−1 (Pi (1|x)), where Qi−1 denotes the inverse of the distribution function of εin . If θ0 is identified, then the class of alternative strategies αi (·; η) for η ∈ S : αi (si ; η) = 1[Ciθ0 (x) + η > εi ] for all si ∈ Si } has sufficient idenAO i = { tifying power for θ0 in the sense described in equation (SA2). When there are more than

6 Sorawoot Srisuma

Supplementary Material

two actions, suppose Ki = K for all i, then the data generating best response is generally characterized by K − 1 boundary points on Ei for each player and state. These boundary points can be identified from Fi and Qi . Since Ei ⊆ R, a simple way to apply the same technique used in binary action games above is to choose the set of alternative strategies that perturb only one of the boundary points at a time and leave all other boundary points the same as those identified by the data. A.3 A discussion The inequality moment restrictions imposed by the equilibrium condition considered in BBL is indexed by a class of functions of alternative strategies. Our examples in Section A.1 illustrate a general point that some alternative strategies may have no identifying information for a subset of the parameter of interest (or the entire parameter space in some cases). In contrast to the examples in Domínguez and Lobato (2004), objective functions constructed from certain classes of alternative strategies not only lack global identification (i.e. do not have a unique optimum), they cannot even distinguish between different parameters locally. We only provide an example when the inequality approach suggested by BBL can fail for a point-identified model (most known applications of their methodology proceed under this assumption). Although BBL also suggested a set estimator for partially identified models, it is intuitively clear that their set estimation approach is exposed to the same criticism as above, in which case some classes of inequalities may only be able to identify a strict superset of the identified set. We consider dynamic games in Section A.2. We focus on alternative strategies where each player only deviates in the first stage since it provides a more tractable starting point to study identification. It enables us to show that when the parameter is identified in binary action games, inequalities generated from additively perturbing the cutoff values preserve the identifying information. We also explain how such technique can be applied to multinomial choice games as well as discrete action games where players play monotone strategies. However, it is clearly impractical to extend the suggested perturbation method for discrete action games to a continuous action game. Finally, all of our analytical arguments above only apply to the limiting case where equilibrium and alternative strategies are perfectly known and there are no simulation errors. As the Monte Carlo study in Section 5 shows, it is always possible to obtain an estimate in finite samples, even when the objective function cannot identify the parameter of interest in the limit. Our main message is the choice of alternative strategies, which can be viewed as tuning parameters, is very important since it affects not only efficiency, but also consistency. It remains an interesting issue to find some sufficiency theory for choosing inequalities in a continuous action game. Appendix B: Proofs of theorems

N (θ), Since the first stage estimators are defined implicitly in our objective function M it suffices to show that Assumptions A1 and A2 imply some familiar conditions from large sample theorems for parametric estimators. For Theorem 1, we make use of a

Supplementary Material

Minimum distance estimators for dynamic games 7

well known consistency result for extremum estimators; for instance, see Theorem 2.1 of Newey and McFadden (1994). For Theorem 2, we show that A1 and A2 are sufficient for the conditions of Theorem 7.1 of Newey and McFadden (1994), who provided a high level condition for the asymptotic normality of an extremum estimator that maximizes a nonsmooth objective function. Proof of Theorem 1. Under A1(i), Θ is compact. Assumption A1(ii)–(iv) ensure that M(θ) has a well separated minimum at θ0 . Next, we show that the sample objective function converges uniformly in probability to its limit. By the triangle inequality,  M 

N (θ) − M(θ) ≤ 4

iθ (ai |x) μix (dai ) Fiθ (ai |x) − F i∈I x∈X Ai

 +4 Fiθ (ai |x) − Fiθ (ai |x) μix (dai ) i∈I x∈X Ai

 Fi (ai |x) − Fi (ai |x) μix (dai ) +4 i∈I x∈X Ai

iθ are iθ  F asymptotically since distribution functions are bounded above by 1 and F uniformly consistent under A1(v)–(vii). Under A1(iv), the measures are finite, hence

N (θ) − M(θ)| = op (1) by A1(v)–(vii). Consistency then follows by a standard supθ∈Θ |M argument.  Proof of Theorem 2. Conditions (i)–(iii) of Newey and McFadden (1994, Theorem 7.1) are trivially satisfied by the definition of our estimator and condition A2(i) and (ii). It remains to show that there exists a sequence CN that has an asymptotic normal distribution at the root-N rate, which satisfies the (stochastic differentiability) condition DN (θ) = op (1) sup √ θ−θ0 <δN 1 + Nθ − θ0  for any positive sequence δN = o(1), where DN (θ) =

N (θ) − M

N (θ0 ) − (M(θ) − M(θ0 )) − (θ − θ0 ) CN √ M  N θ − θ0 

We show that  

N (θ0 ) − M(θ)

0 ) − (θ − θ0 ) CN

N (θ) − M − M(θ M

1 θ − θ0  2 = op θ − θ0  + √ + N N

(SA3)

holds uniformly for θ − θ0  ≤ δN . The additional op (N −1 ) term added in (SA3) does not affect Newey and McFadden’s results as it is the rate that our estimator (approximately) minimizes the objective function, which coincides with condition (i) of their theorem.

8 Sorawoot Srisuma

Supplementary Material

N (θ) − M

N (θ0 ) − (M(θ) − M(θ0 )) as a sum, For θ in a neighborhood of θ0 , we write M E1 (θ) + E2 (θ), where   E1 (θ) = MN (θ) − MN (θ0 ) − M(θ) − M(θ0 )   

N (θ) − M

N (θ0 ) − MN (θ) − MN (θ0 )  E2 (θ) = M Under A2(ii), MN and M are twice continuously differentiable in a neighborhood of θ0 . By Taylor’s theorem, E1 (θ) = (θ − θ0 )

   ∂ ∂2  1 MN (θ0 ) + (θ − θ0 )

MN (θ) − M θ (θ − θ0 )

∂θ 2 ∂θ ∂θ 

for some mean value functions θ, θ that depend on (i ai  x). Note that ∂ when θ = θ0 under A1(ii). For ∂θ MN (θ0 ), we have ∂ MN (θ0 ) ∂θ  =2

i∈I x∈X Ai

=2



i∈I x∈X Ai

∂ ∂θ M(θ) vanishes

  ∂

iθ (ai |x) − F

i (ai |x) μix (dai ) Fiθ0 (ai |x) F 0 ∂θ

  ∂

iθ (ai |x) − F

i (ai |x) μix (dai ) + op √1  Fiθ0 (ai |x) F 0 ∂θ N

where the second equality follows from the finiteness of {μix }i∈I x∈X and A2(ii), (iv), √ ∂ and (ix). Importantly, by A2(ix) and the continuous mapping theorem, N ∂θ MN (θ0 ) ⇒ N(0 V ), where V is defined in (17). For the Hessians of MN and M,  ∂2 M (θ) = N ∂θ ∂θ



i∈I x∈X Ai

+



i∈I x∈X Ai

 ∂2 M(θ) = ∂θ ∂θ



i∈I x∈X Ai

+

  ∂2

iθ (ai |x) − F

i (ai |x) μix (dai ) F (a |x) F iθ i ∂θ ∂θ

∂ ∂ Fiθ (ai |x) F iθ (ai |x)μix (dai ) ∂θ ∂θ

  ∂2 F (a |x) F (a |x) − F (a |x) μix (dai ) iθ i iθ i i i ∂θ ∂θ



i∈I x∈X Ai

∂ ∂ Fiθ (ai |x) Fiθ (ai |x)μix (dai ) ∂θ ∂θ

By repeated applications of the triangle inequality, and making use of A2(ii), (iv), and 2  (v), it is straightforward to show that | ∂θ ∂∂θ  (MN (θ) − M(θ ))| = op (1) for all (l l ) as l l θ − θ0  → 0. Therefore, we have E1 (θ) = (θ − θ0 )

  ∂ MN (θ0 ) + op θ − θ0 2  ∂θ

Minimum distance estimators for dynamic games 9

Supplementary Material

N (θ) − MN (θ), so that E2 (θ) = ξ(θ) − ξ(θ0 ). From the definitions of M

N and Let ξ(θ) = M MN ,   

iθ (ai |x) iθ (ai |x) − F ξ(θ) = F i∈I x∈X Ai

  iθ (ai |x) + F

iθ (ai |x) − 2F

i (ai |x) μix (dai ) × F

By repeatedly adding nulls, we can write ξ(θ) = ξ1 (θ) + ξ2 (θ) + ξ3 (θ) + ξ4 (θ) where   

iθ (ai |x) 2 μix (dai ) iθ (ai |x) − F ξ1 (θ) = F i∈I x∈X Ai

ξ2 (θ) = 2 ξ3 (θ) = 2

  i∈I x∈X Ai

 

iθ (ai |x) F

iθ (ai |x) − F

iθ (ai |x) μix (dai ) iθ (ai |x) − F F 0

  i∈I x∈X Ai

ξ4 (θ) = −2

  iθ (ai |x) − F

iθ (ai |x) F

iθ (ai |x) − Fiθ (ai |x) μix (dai ) F 0 0

  i∈I x∈X Ai

 

iθ (ai |x) F

i (ai |x) − Fi (ai |x) μix (dai ) iθ (ai |x) − F F

In sum, ξ(θ) is op (N −1/2 θ − θ0  + N −1 ) since ξ1 (θ) is op (N −1 ) by A2(vi); ξ2 (θ) is op (N −1/2 θ − θ0 ), using a mean value expansion in θ and then applying A2(ii), (iv), and (vi); ξ3 (θ) is op (N −1 ) by A2(iv) and (vii); ξ4 (θ) is op (N −1 ) by A2(vi) and (viii). Therefore, E2 (θ) = op (N −1/2 θ − θ0  + N −1 ). Thus, condition (SA3) is satisfied uniformly for 2

∂ θ − θ0  ≤ δN with CN = ∂θ MN (θ0 ). Since ∂θ∂ ∂θ M(θ0 ) equals W (defined in equation (18)), the desired limiting distribution of θ follows from applying Theorem 7.1 of Newey and McFadden (1994). 

References Aguirregabiria, V. and P. Mira (2007), “Sequential estimation of dynamic discrete games.” Econometrica, 75 (1), 1–53. [4] Bajari, P., C. L. Benkard, and J. Levin (2007), “Estimating dynamic models of imperfect competition.” Econometrica, 75, 1331–1370. [1] Domínguez, M. A. and I. N. Lobato (2004), “Consistent estimation of models defined by conditional moment restrictions.” Econometrica, 72, 1601–1615. [1, 6] Hotz, V. and R. A. Miller (1993), “Conditional choice probabilities and the estimation of dynamic models.” Review of Economic Studies, 60, 497–531. [5] Newey, W. K. and D. McFadden (1994), “Large sample estimation and hypothesis testing.” In Handbook of Econometrics, Vol. 4 (R. F. Engle and D. McFadden, eds.), NorthHolland, Amsterdam. [7, 9]

10 Sorawoot Srisuma

Supplementary Material

Pesendorfer, M. and P. Schmidt-Dengler (2008), “Asymptotic least squares estimators for dynamic games.” Review of Economic Studies, 75, 901–928. [4]

Submitted April, 2012. Final version accepted October, 2012.

Supplement to "Minimum distance estimators for ...

the Lebesgue measure with support on R. The pseudo-best response is characterized ... Then AU i (S) has sufficient identifying power for θ0 in the sense that. E.

106KB Sizes 1 Downloads 201 Views

Recommend Documents

Minimum Distance Estimators for Dynamic Games
Oct 5, 2012 - Lewbel, Martin Pesendorfer, Carlos Santos, Marcia Schafgans, Philipp Schmidt-Dengler, Myung Hwan Seo, and seminar participants at ...

Supplement to - GitHub
Supplemental Table S6. .... 6 inclusion or exclusion of certain genetic variants in a pharmacogenetic test ..... http://aidsinfo.nih.gov/contentfiles/AdultandAdolescentGL.pdf. .... 2.0 are expected to exhibit higher CYP2D6 enzyme activity versus ...

Improving Resource Utilization by Minimum Distance ...
The concept of cloud computing is linked closely with those of Information as a ... Platform as a service (PaaS), Software as service (SaaS) all of which means a ...

Minimum Distance Estimation of Search Costs using ...
Sep 9, 2016 - The innovation of HS is very useful since price data are often readily available, for ... defining the distance function using the empirical measure that leads to a ... (2002), who utilize tools from empirical process theory to derive .

minimum
May 30, 1997 - Webster's II NeW College Dictionary, Houghton Mif?in,. 1995, p. .... U.S. Patent. Oct. 28,2003. Sheet 10 0f 25. US RE38,292 E. Fl 6. I4. 200. 220.

supplement to study material - ICSI
Ensure that advertisement giving details relating to oversubscription, basis ... Ensure that no advertisement or distribution material with respect to the issue.

supplement to study material - ICSI
(ii) the issuer undertakes to provide market-making for at least two years from ..... buyers if an issuer has not satisfied the basic eligibility criteria and undertakes ...... buyers on proportionate basis as per illustration given in Part C of Sche

SUPPLEMENT TO “PREFERENCE FOR FLEXIBILITY AND RANDOM ...
Jan 8, 2013 - THEOREM S1: The relation ≽ satisfies Axioms DLR 1–5 if and only if there .... equivalent to maximizing a random utility function that assigns ...

Supplement to “Optimal Two-sided Invariant Similar Tests for ...
seminar and conference participants at Harvard/MIT, Michigan, Michigan ... natives is to impose a necessary condition for unbiasedness–what we call a local- ... literature and is a standard way to derive optimal tests for two-sided alternatives.

Supplement to “Two-Sided Tests for Instrumental ...
Kronecker product: Σ = Ω ⊗ diag (ς1). For the non-Kronecker ... MM1 (dash-dot green line), MM1-SU (dotted black line), MM1-LU (solid light blue line with bars), ...

Asymptotic distribution theory for break point estimators in models ...
Feb 10, 2010 - illustrated via an application to the New Keynesian Phillips curve. ... in the development of statistical methods for detecting structural instability.1.

Minimum Requirements For Effective Food Safety Interventions to ...
New Processing methods. ▫ Education / training ... Capital investment in new buildings and new equipment ? ... Three Broad Themes. • Provide Zones of ...

Proposed Minimum qualifications for admission to various courses ...
Feb 1, 2014 - Integrated Master's degree courses (5-year Integrated). Course ... of science subjects with Physics as one of the main subjects in combination ..... or Computer Sciences or B.Pharmacy, B.Tech. with a minimum of 60% marks.

Proposed Minimum qualifications for admission to various courses ...
Jan 2, 2014 - interview. M.A.. English. 45. At least 50% marks in the Bachelor's degree with at .... their answer scripts at the time of entrance examination. ... The admission of candidates into MBA for the year 2014-15 is under process which ...Mis

Supplement to "Robust Nonparametric Confidence ...
Page 1 ... INTERVALS FOR REGRESSION-DISCONTINUITY DESIGNS”. (Econometrica ... 38. S.2.6. Consistent Bandwidth Selection for Sharp RD Designs .

Estimators Also Need Shared Values to Grow Together
The goal of CEDAR is to provide real-time scalable counter estimates. CEDAR gathers ...... Hasso Plattner Center for Scalable Computing. REFERENCES.

Supplement to "Efficient Repeated Implementation"
the definition of ψ of ˆg) but induces regime Dj in which, by (A.1), j obtains vj j > πθ(t) θt j . But this is a contradiction. Q.E.D. ... Next define ρ ≡ maxi θ a a [ui(a θ)−ui(a θ)] and ¯δ ≡ ρ ρ+ε . Mechanism ˜g = (M ψ) is def

A Family of Computationally Efficient and Simple Estimators for ...
It is often the case that the statistical model related to an estimation ... Kullback-Leibler divergence between the data and the ...... cal analysis of lattice systems.

Asymptotic Inference for Dynamic Panel Estimators of ...
T. As an empirical illustration, we estimate the SAR of the law of one price (LOP) deviations .... plicity of the parametric finite order AR model while making the effect of the model ...... provides p = 8, 10 and 12 for T = 25, 50 and 100, respectiv

Algorithms for estimating information distance with application to ...
Page 1. Algorithms for Estimating Information Distance with Application to ... 0-7803-8253-6/04/$17.00 02004 IEEE. - 2255 -. Page 2. To express function E,(x,y) ...

Minimum educational qualification for open market recruitment.PDF ...
Page 2 of 2. Minimum educational qualification for open market recruitment.PDF. Minimum educational qualification for open market recruitment.PDF. Open.