Skip to main content
. 2008 Feb 29;82(3):794–796. doi: 10.1016/j.ajhg.2008.02.001

Table 2.

Two Examples of Penetrance Configurations

Haplotype M1 M2
A1B1 x x
A1B2 y y
A2B1 x + δ1 y ± δ1
A2B2 y − δ2 x ± δ2