Lecture 9. sup. Exercise 1.3 Use characteristic functions to show that if µ is infinitely divisible, and for each

Size: px
Start display at page:

Download "Lecture 9. sup. Exercise 1.3 Use characteristic functions to show that if µ is infinitely divisible, and for each"

Transcription

1 Lecture 9 1 Infinitely Divisible Distributions Given a triangular array of independent random variables, X ) 1 i n, we have previously given sufficient conditions for the law of S n := n X to converge to the normal distribution, resp. the Poisson distribution. A natural question is: what other types of distributions can be the limiting distribution of S n as n? To have a non-trivial answer to this question, it is important to assume that no single X is significant in its contribution to S n when n is large. More precisely, we assume that δ > 0, lim 1 i n P X δ) = 0, 1.1) which is known as the uniform infinitesimality condition. In other words, X ) 1 i n converge uniformly to 0 in probability as n. Under the assumption 1.1), we will give a complete characterization of possible limiting distributions for S n as n, which are known as infinitely divisible distributions. Similar to the relation between Poisson distribution and Poisson process, Gaussian distribution and Brownian motion, each infinitely divisible distribution can be realized as the marginal distribution of a Markov process X t ) t 0 with stationary independent increments, known as a Lévy process. Definition 1.1 [Infinitely Divisible Distributions] A probability distribution µ is called infinitely divisible if for every n N, there exist i.i.d. random variables X ) 1 i n with common distribution µ n, such that µ is the distribution of X n,1 + X n,2 + + X n,n. In other words, µ = µ n n, the n-fold convolution of µ n with itself for some distribution µ n. Exercise 1.2 Show that the normal distribution, the exponential distribution, the Poisson distribution, and the compound Poisson distribution are all infinitely divisible. Exercise 1.3 Use characteristic functions to show that if µ is infinitely divisible, and for each n N, µ n n = µ for some distribution µ n, then µ n 0 as n. Exercise 1.3 shows that if µ is infinitely divisible, then X ) 1 i n in Definition 1.1 satisfy 1.1), and hence µ is the limiting distribution of S n for a uniformly infinitesimal triangular array. The non-trivial part is the converse. Theorem 1.4 [Limits for Triangular Arrays] If X ) 1 i n is a triangular array of independent random variables satisfying the uniform infinitesimality condition 1.1), and the distribution of S n := n X converges weakly to a limit µ as n, then µ is infinitely divisible. We will prove Theorem 1.4 by first proving that we can replace X ) 1 i n by shifted compound Poisson distributed random variables Y ) 1 i n without affecting the limiting distribution µ. Since compound distributions are infinitely divisible, we will then show that the set of infinitely divisible distributions is closed under convolution and weak limits, which then 1

2 implies that µ is also infinitely divisible. This proof will also facilitate a complete characterization of infinitely divisible distributions. Given a triangular array X ) 1 i n, we will replace X by a shifted compound Poisson random variable Y defined as follows. Let a := E[X 1 { X 1}]. We then define N Y = a + j=1 X j), 1.2) j) where N is a Poisson random variable with mean 1, and X ) j N is a collection of i.i.d. random variables equally distributed with X := X a. Note that Y is a compound Poisson random variable shifted by the constant a. Ignoring the shift by a for the moment, the heuristic justification for the compound Poissonization is that, if X is close to 0 in probability, then its characteristic function φ t) is close to 1, and hence φ t) e 1 φt)), which is precisely the characteristic function of the compound Poissonization of X. Theorem 1.5 [Accompanying Laws] Let X ) 1 i n be a triangular array of independent random variables satisfying 1.1), and let Y ) 1 i n be defined as in 1.2). Then the distribution of S n := n X converges weakly to a limit µ as n if and only if the distribution of Ξ n := n Y converges weakly to the same limit µ. Proof. Let X := X a, and let Ỹ := N j=1 be the compound Poissonization of X as in 1.2). Let S n := n X and Ξ n := n Ỹ. Let φ n, ψ n, φ n, and ψ n denote respectively the characteristic functions of S n, Ξ n, S n and Ξ n. The theorem amounts to the statement that φ n and ψ n must converge to the same limit when either limit exists. Since which implies that it suffices to show that S n S n = Ξ n Ξ n = X j) a =: A n, φ n t) ψ n t) = e iant φ n t) ψ n t)) φ n t) ψ n t), lim φ n t) ψ n t) = 0 t R. 1.3) First we note that for any δ > 0, a E[ X 1 { X [δ,1]}]+e[ X 1 ) { X 0,δ)}] P X δ)+δ) δ 1 i n 1 i n 1 i n by the uniform infinitesimality condition 1.1). Therefore lim 1 i n a = 0, 1.4) which implies that X ) 1 i n also satisfies the uniform infinitesimality condition 1.1). Next we explain the advantage of shifting X to X = X a. By 1.4), we can choose n sufficiently large such that 1 i n a 1/4. For such n, we have ã := E[ X 1 { X 1} ] = E[X a )1 { X a 1}] = E[X 1 { X a 1}] a P[ X a 1] = E[X 1 { X a 1}] a + a P[ X a > 1] = E[X 1 { X a 1}] E[X 1 { X 1}] + a P[ X a > 1]. 2

3 Therefore ã E[ X 1 {X [ 1, 1+a ] [1,1+a ]}] P[ X a > 1] 3P X 3/4) 3P X 1/2). 1.5) We note that such a bound on the truncated mean ã = E[ X 1 { X 1} ] for X could not have been obtained for X. We will use this bound later. Let φ be the characteristic function of X. Then the characteristic function of Ỹ is ψ t) = e 1 φ t)). We then have log φ n t) log ψ n t) = log φ t) log ψ t) ) = log φ t) + 1 φ t) ) log φ t) + 1 φ t) C 1 φ t) 2 Taylor expansion) C max 1 i n 1 φ t) which can be justified provided we show that To establish 1.6), note that 1 φ t) 0, max t) 0, 1 i n 1.6) 1 φ t) <. 1.7) max 1 φ t) max E[ 1 e it X ] 1 i n 1 i n = max E [ 1 e it X [ 1 1 i n { X >δ}] + E 1 e it X ] ) 1 { X δ} max 2P X > δ) + E [ t X ]) 1 1 i n { X δ} Taylor expansion) 2 max 1 i n P X > δ) + tδ tδ uniform infinitesimality). Since δ > 0 can be chosen arbitrarily, this implies 1.6), in fact it implies that for any T > 0, t [ T,T ] max 1 φ t) ) 1 i n On the other hand, φ e it t) 1 = E[ X 1 ) [ E e 1 { X 1}] + it X 1 ) 1 { X >1}] e it E[ X 1 it X ) e 1{ X 1}] + it tã + E[ X 1 ) 1 { X >1}] C 1 t 2 E[ X 2 1 { X 1} ] + 3 t P X 1/2) + 2P X 1) C 1 t 2 E[ X 2 1 { X 1} ] + 3 t + 2)P X 1/2). Therefore to prove 1.7), it suffices to prove that n E[ X 2 1 { X 1} ] <, 1.9) n P[ X 1/2] <. 1.10) 3

4 To prove 1.9) 1.10), we need to use the assumption that either S n or Ξ n converges weakly to a limit, i.e., either φ n or ψ n converges to a limiting characteristic function. Assume first ψ n s) = e isan ψ n s) = e isan n 1 φ s)) fs) for a limiting characteristic function f. We leave it as an exercise to show that the convergence is in fact uniform on bounded intervals. Exercise 1.6 Let φ n be a sequence of characteristic functions converging pointwise to a characteristic function φ. Use Arzela-Ascoli theorem to show that φ n converges uniformly to φ on any bounded interval. Since f0) = 1 and f is continuous at 0, on some interval [ T, T ] with T > 0, f is uniformly bounded away from 0, and hence the same must be true for ψ n uniformly in large n N, i.e., s [ T,T ] Re1 φ s)) = s [ T,T ] E[1 cos s X )] < C T <. 1.11) Since 1 cos x cx 2 for some c > 0 uniformly in x 1, 1), we can choose s [ T, T ] with 0 < s < 1 such that for all n N sufficiently large, C T E[1 cos s X )1 { X 1} ] cs2 E[ X 1 2 { X 1} ], which implies 1.9). In fact, the same argument shows that for any A > 0, E[ X 1 2 { X A} ] <. 1.12) To prove 1.10), we repeat an argument used in the proof of Lévy s continuity theorem, where we control the tail probability in terms of the characteristic function. More precisely, we integrate the inequality in 1.11) over s [ T, T ] and then divide by 2T to obtain [ E 1 sint X ) ] T X < C T. Since inf x a 1 sin x x ) = c > 0 for any a > 0, for all n N sufficiently large, we have C T [ E 1 sint X ) ] T X [ E 1 sint X ) ) ] T X 1 { X 1/2} c which implies 1.10). In fact, the same argument shows that for any δ > 0, P X 1/2), P X δ) <. 1.13) Lastly we need to verify 1.9) and 1.10) under the assumption that φ n s) = e isan φ n s) = e isan n φ s) fs) 4

5 for some characteristic function f. By the same reasoning as in 1.11), there exists T > 0 such that lim inf inf φ n n s) 2 = lim inf inf φ s) 2 > 0. s [ T,T ] s [ T,T ] By 1.8), uniformly in n N and s [ T, T ], we can use Taylor expansion to bound n φ n s) 2 = 1 1 φ s) 2 )) e C n 1 φ s) 2 ) for some C > 0, and hence s [ T,T ] 1 φ s) 2 ) < C T <. Note that φ s) 2 is the characteristic function of X X, where X is an independent copy of X. Therefore we are in the same framework as in 1.11), and hence the following analogues of 1.12) and 1.13) hold: A > 0, E[ X X ) 2 1 { X A}] <, 1.14) δ > 0, P X X δ) <. 1.15) Note that by the uniform infinitesimality of X ) 1 i n, X X X. More precisely, by 1.15), which establishes 1.10). P X 1/2) = = P X 1/2) P X 1/4) P X 1/2, X 1/4) P X X 1/4) < To exploit 1.14) to prove 1.9), we note that E [ X X ) 2 1 { X X 2} ] E [ X X ) 2 1 { X 1} 1 { X 1} ] Therefore by 1.5), = 2P X 1) E[ X 2 1 { X 1} ] 2E[ X 1 { X 1} ]2 = 2P X 1) E[ X 2 1 { X 1} ] 2ã2. 2P X 1) E[ X 2 1 { X 1} ] E[ X X ) 2 1 { X X 2} ] + 18P X 1/2) 2. The uniform infinitesimality of X ) 1 i n implies that 2 min 1 i n P X 1) 1 for all n N large enough, therefore E[ X 1 2 { X 1} ] E[ X X ) 2 1 { X X 2}] + 18 P X 1/2) < 5

6 by 1.14) and 1.10). This finally concludes the proof of Theorem 1.5. Theorem 1.5 shows that every distribution µ which arises as the weak limit of a uniformly infinitesimal triangular array of independent random variables is also the weak limit of an accompanying triangular array of independent compound Poisson random variables shifted by constants. It is easy to see that the distribution of a compound Poisson random variable, shifted by a constant, is infinitely divisible. Therefore Theorem 1.4, i.e., the claim that µ is infinitely divisible, will follow from the next two lemmas. Lemma 1.7 If µ and ν are infinitely divisible distributions, then their convolution µ ν is also infinitely divisible. Lemma 1.8 If µ m), m N, is a sequence of infinitely divisible distributions converging weakly to µ, then µ is also infinitely divisible. Proof of Lemma 1.7. If µ and ν are infinitely divisible, then for each n N, there exist i.i.d. random variables X ) 1 i n with common distribution µ n, and i.i.d. random variables Y ) 1 i n with common distribution ν n, such that n X has distribution µ while n Y has distribution ν. Therefore n X + Y ) has distribution µ ν. Since X + Y ) 1 i n are i.i.d., it follows that µ ν is also infinitely divisible. Proof of Lemma 1.8. Since each µ m) is infinitely divisible, for every n N, there exist i.i.d. random variables X m) ) 1 i n such that S m) := n Xm) has distribution µ m). Let S be a random variable with distribution µ. Then by assumption, S m) S. To show that µ is infinitely divisible, we need to find i.i.d. random variables X ) 1 i n such that S has the same distribution as n X. We claim that it suffices to prove that {X m) n,1 } m N is a tight family of random variables. Indeed, tightness implies that along a subsequence m k, X m k) n,1 converges weakly to a limit X n,1, and hence X m k) ) 1 i n converges weakly to a collection of i.i.d. random variables X ) 1 i n. In particular, S mk) = n Xm k) converges weakly to n X. On the other hand, S mk) converges weakly to S. Therefore S has the same distribution as n X, which proves the infinite divisibility of µ. Recall that the tightness of {X m) n,1 } m N is equivalent to Note that P X m) n,1 A) = ) PX m) n,1 A)n = PX m) A for all 1 i n) PS m) na), and a similar bound holds for PX m) n,1 A). We then have P X m) n,1 A) PSm) na) 1 n + PS m) na) 1 n 2P S m) na) 1 n. Since S m) S, {S m) } m N is a tight family for which the analogue of 1.16) holds. We then have P X m) n,1 A) 2 P S m) na) 1 n which proves the tightness of {X m) n,1 } m N. = 2 P S m) na) ) 1 n = 0, 6

THE CENTRAL LIMIT THEOREM TORONTO

THE CENTRAL LIMIT THEOREM TORONTO THE CENTRAL LIMIT THEOREM DANIEL RÜDT UNIVERSITY OF TORONTO MARCH, 2010 Contents 1 Introduction 1 2 Mathematical Background 3 3 The Central Limit Theorem 4 4 Examples 4 4.1 Roulette......................................

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

IEOR 6711: Stochastic Models I Fall 2012, Professor Whitt, Tuesday, September 11 Normal Approximations and the Central Limit Theorem

IEOR 6711: Stochastic Models I Fall 2012, Professor Whitt, Tuesday, September 11 Normal Approximations and the Central Limit Theorem IEOR 6711: Stochastic Models I Fall 2012, Professor Whitt, Tuesday, September 11 Normal Approximations and the Central Limit Theorem Time on my hands: Coin tosses. Problem Formulation: Suppose that I have

More information

From Binomial Trees to the Black-Scholes Option Pricing Formulas

From Binomial Trees to the Black-Scholes Option Pricing Formulas Lecture 4 From Binomial Trees to the Black-Scholes Option Pricing Formulas In this lecture, we will extend the example in Lecture 2 to a general setting of binomial trees, as an important model for a single

More information

x a x 2 (1 + x 2 ) n.

x a x 2 (1 + x 2 ) n. Limits and continuity Suppose that we have a function f : R R. Let a R. We say that f(x) tends to the limit l as x tends to a; lim f(x) = l ; x a if, given any real number ɛ > 0, there exists a real number

More information

Gambling and Data Compression

Gambling and Data Compression Gambling and Data Compression Gambling. Horse Race Definition The wealth relative S(X) = b(x)o(x) is the factor by which the gambler s wealth grows if horse X wins the race, where b(x) is the fraction

More information

The Ergodic Theorem and randomness

The Ergodic Theorem and randomness The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete

More information

An example of a computable

An example of a computable An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept

More information

The Exponential Distribution

The Exponential Distribution 21 The Exponential Distribution From Discrete-Time to Continuous-Time: In Chapter 6 of the text we will be considering Markov processes in continuous time. In a sense, we already have a very good understanding

More information

I. Pointwise convergence

I. Pointwise convergence MATH 40 - NOTES Sequences of functions Pointwise and Uniform Convergence Fall 2005 Previously, we have studied sequences of real numbers. Now we discuss the topic of sequences of real valued functions.

More information

Stochastic Inventory Control

Stochastic Inventory Control Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the

More information

Master s Theory Exam Spring 2006

Master s Theory Exam Spring 2006 Spring 2006 This exam contains 7 questions. You should attempt them all. Each question is divided into parts to help lead you through the material. You should attempt to complete as much of each problem

More information

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails

A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails 12th International Congress on Insurance: Mathematics and Economics July 16-18, 2008 A Uniform Asymptotic Estimate for Discounted Aggregate Claims with Subexponential Tails XUEMIAO HAO (Based on a joint

More information

Estimating the Degree of Activity of jumps in High Frequency Financial Data. joint with Yacine Aït-Sahalia

Estimating the Degree of Activity of jumps in High Frequency Financial Data. joint with Yacine Aït-Sahalia Estimating the Degree of Activity of jumps in High Frequency Financial Data joint with Yacine Aït-Sahalia Aim and setting An underlying process X = (X t ) t 0, observed at equally spaced discrete times

More information

Asymptotics of discounted aggregate claims for renewal risk model with risky investment

Asymptotics of discounted aggregate claims for renewal risk model with risky investment Appl. Math. J. Chinese Univ. 21, 25(2: 29-216 Asymptotics of discounted aggregate claims for renewal risk model with risky investment JIANG Tao Abstract. Under the assumption that the claim size is subexponentially

More information

Lectures 5-6: Taylor Series

Lectures 5-6: Taylor Series Math 1d Instructor: Padraic Bartlett Lectures 5-: Taylor Series Weeks 5- Caltech 213 1 Taylor Polynomials and Series As we saw in week 4, power series are remarkably nice objects to work with. In particular,

More information

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

More information

IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS

IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS There are four questions, each with several parts. 1. Customers Coming to an Automatic Teller Machine (ATM) (30 points)

More information

LECTURE 15: AMERICAN OPTIONS

LECTURE 15: AMERICAN OPTIONS LECTURE 15: AMERICAN OPTIONS 1. Introduction All of the options that we have considered thus far have been of the European variety: exercise is permitted only at the termination of the contract. These

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

The Black-Scholes pricing formulas

The Black-Scholes pricing formulas The Black-Scholes pricing formulas Moty Katzman September 19, 2014 The Black-Scholes differential equation Aim: Find a formula for the price of European options on stock. Lemma 6.1: Assume that a stock

More information

The Cost of Offline Binary Search Tree Algorithms and the Complexity of the Request Sequence

The Cost of Offline Binary Search Tree Algorithms and the Complexity of the Request Sequence The Cost of Offline Binary Search Tree Algorithms and the Complexity of the Request Sequence Jussi Kujala, Tapio Elomaa Institute of Software Systems Tampere University of Technology P. O. Box 553, FI-33101

More information

Notes from Week 1: Algorithms for sequential prediction

Notes from Week 1: Algorithms for sequential prediction CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

More information

Tiers, Preference Similarity, and the Limits on Stable Partners

Tiers, Preference Similarity, and the Limits on Stable Partners Tiers, Preference Similarity, and the Limits on Stable Partners KANDORI, Michihiro, KOJIMA, Fuhito, and YASUDA, Yosuke February 7, 2010 Preliminary and incomplete. Do not circulate. Abstract We consider

More information

CHAPTER IV - BROWNIAN MOTION

CHAPTER IV - BROWNIAN MOTION CHAPTER IV - BROWNIAN MOTION JOSEPH G. CONLON 1. Construction of Brownian Motion There are two ways in which the idea of a Markov chain on a discrete state space can be generalized: (1) The discrete time

More information

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)! Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following

More information

8.1 Min Degree Spanning Tree

8.1 Min Degree Spanning Tree CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

More information

How To Understand The Theory Of Hyperreals

How To Understand The Theory Of Hyperreals Ultraproducts and Applications I Brent Cody Virginia Commonwealth University September 2, 2013 Outline Background of the Hyperreals Filters and Ultrafilters Construction of the Hyperreals The Transfer

More information

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory

More information

Chapter 2: Binomial Methods and the Black-Scholes Formula

Chapter 2: Binomial Methods and the Black-Scholes Formula Chapter 2: Binomial Methods and the Black-Scholes Formula 2.1 Binomial Trees We consider a financial market consisting of a bond B t = B(t), a stock S t = S(t), and a call-option C t = C(t), where the

More information

Linear Risk Management and Optimal Selection of a Limited Number

Linear Risk Management and Optimal Selection of a Limited Number How to build a probability-free casino Adam Chalcraft CCR La Jolla dachalc@ccrwest.org Chris Freiling Cal State San Bernardino cfreilin@csusb.edu Randall Dougherty CCR La Jolla rdough@ccrwest.org Jason

More information

. (3.3) n Note that supremum (3.2) must occur at one of the observed values x i or to the left of x i.

. (3.3) n Note that supremum (3.2) must occur at one of the observed values x i or to the left of x i. Chapter 3 Kolmogorov-Smirnov Tests There are many situations where experimenters need to know what is the distribution of the population of their interest. For example, if they want to use a parametric

More information

Wald s Identity. by Jeffery Hein. Dartmouth College, Math 100

Wald s Identity. by Jeffery Hein. Dartmouth College, Math 100 Wald s Identity by Jeffery Hein Dartmouth College, Math 100 1. Introduction Given random variables X 1, X 2, X 3,... with common finite mean and a stopping rule τ which may depend upon the given sequence,

More information

Separation Properties for Locally Convex Cones

Separation Properties for Locally Convex Cones Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam

More information

n k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +...

n k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +... 6 Series We call a normed space (X, ) a Banach space provided that every Cauchy sequence (x n ) in X converges. For example, R with the norm = is an example of Banach space. Now let (x n ) be a sequence

More information

Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics

Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics Undergraduate Notes in Mathematics Arkansas Tech University Department of Mathematics An Introductory Single Variable Real Analysis: A Learning Approach through Problem Solving Marcel B. Finan c All Rights

More information

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

t := maxγ ν subject to ν {0,1,2,...} and f(x c +γ ν d) f(x c )+cγ ν f (x c ;d).

t := maxγ ν subject to ν {0,1,2,...} and f(x c +γ ν d) f(x c )+cγ ν f (x c ;d). 1. Line Search Methods Let f : R n R be given and suppose that x c is our current best estimate of a solution to P min x R nf(x). A standard method for improving the estimate x c is to choose a direction

More information

LOGNORMAL MODEL FOR STOCK PRICES

LOGNORMAL MODEL FOR STOCK PRICES LOGNORMAL MODEL FOR STOCK PRICES MICHAEL J. SHARPE MATHEMATICS DEPARTMENT, UCSD 1. INTRODUCTION What follows is a simple but important model that will be the basis for a later study of stock prices as

More information

Influences in low-degree polynomials

Influences in low-degree polynomials Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known

More information

We study cross-selling operations in call centers. The following questions are addressed: How many

We study cross-selling operations in call centers. The following questions are addressed: How many MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol. 12, No. 3, Summer 2010, pp. 470 488 issn 1523-4614 eissn 1526-5498 10 1203 0470 informs doi 10.1287/msom.1090.0281 2010 INFORMS When Promotions Meet Operations:

More information

Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk

Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk Corrected Diffusion Approximations for the Maximum of Heavy-Tailed Random Walk Jose Blanchet and Peter Glynn December, 2003. Let (X n : n 1) be a sequence of independent and identically distributed random

More information

17.3.1 Follow the Perturbed Leader

17.3.1 Follow the Perturbed Leader CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.

More information

Asymptotics for a discrete-time risk model with Gamma-like insurance risks. Pokfulam Road, Hong Kong

Asymptotics for a discrete-time risk model with Gamma-like insurance risks. Pokfulam Road, Hong Kong Asymptotics for a discrete-time risk model with Gamma-like insurance risks Yang Yang 1,2 and Kam C. Yuen 3 1 Department of Statistics, Nanjing Audit University, Nanjing, 211815, China 2 School of Economics

More information

ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING. 0. Introduction

ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING. 0. Introduction ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING Abstract. In [1] there was proved a theorem concerning the continuity of the composition mapping, and there was announced a theorem on sequential continuity

More information

MODELING RANDOMNESS IN NETWORK TRAFFIC

MODELING RANDOMNESS IN NETWORK TRAFFIC MODELING RANDOMNESS IN NETWORK TRAFFIC - LAVANYA JOSE, INDEPENDENT WORK FALL 11 ADVISED BY PROF. MOSES CHARIKAR ABSTRACT. Sketches are randomized data structures that allow one to record properties of

More information

F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein)

F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein) Journal of Algerian Mathematical Society Vol. 1, pp. 1 6 1 CONCERNING THE l p -CONJECTURE FOR DISCRETE SEMIGROUPS F. ABTAHI and M. ZARRIN (Communicated by J. Goldstein) Abstract. For 2 < p

More information

Hydrodynamic Limits of Randomized Load Balancing Networks

Hydrodynamic Limits of Randomized Load Balancing Networks Hydrodynamic Limits of Randomized Load Balancing Networks Kavita Ramanan and Mohammadreza Aghajani Brown University Stochastic Networks and Stochastic Geometry a conference in honour of François Baccelli

More information

Gambling Systems and Multiplication-Invariant Measures

Gambling Systems and Multiplication-Invariant Measures Gambling Systems and Multiplication-Invariant Measures by Jeffrey S. Rosenthal* and Peter O. Schwartz** (May 28, 997.. Introduction. This short paper describes a surprising connection between two previously

More information

Lecture 13: Factoring Integers

Lecture 13: Factoring Integers CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method

More information

Lecture 10. Finite difference and finite element methods. Option pricing Sensitivity analysis Numerical examples

Lecture 10. Finite difference and finite element methods. Option pricing Sensitivity analysis Numerical examples Finite difference and finite element methods Lecture 10 Sensitivities and Greeks Key task in financial engineering: fast and accurate calculation of sensitivities of market models with respect to model

More information

ON SOME ANALOGUE OF THE GENERALIZED ALLOCATION SCHEME

ON SOME ANALOGUE OF THE GENERALIZED ALLOCATION SCHEME ON SOME ANALOGUE OF THE GENERALIZED ALLOCATION SCHEME Alexey Chuprunov Kazan State University, Russia István Fazekas University of Debrecen, Hungary 2012 Kolchin s generalized allocation scheme A law of

More information

Principle of Data Reduction

Principle of Data Reduction Chapter 6 Principle of Data Reduction 6.1 Introduction An experimenter uses the information in a sample X 1,..., X n to make inferences about an unknown parameter θ. If the sample size n is large, then

More information

OPTIMAL CONTROL OF FLEXIBLE SERVERS IN TWO TANDEM QUEUES WITH OPERATING COSTS

OPTIMAL CONTROL OF FLEXIBLE SERVERS IN TWO TANDEM QUEUES WITH OPERATING COSTS Probability in the Engineering and Informational Sciences, 22, 2008, 107 131. Printed in the U.S.A. DOI: 10.1017/S0269964808000077 OPTIMAL CONTROL OF FLEXILE SERVERS IN TWO TANDEM QUEUES WITH OPERATING

More information

Walrasian Demand. u(x) where B(p, w) = {x R n + : p x w}.

Walrasian Demand. u(x) where B(p, w) = {x R n + : p x w}. Walrasian Demand Econ 2100 Fall 2015 Lecture 5, September 16 Outline 1 Walrasian Demand 2 Properties of Walrasian Demand 3 An Optimization Recipe 4 First and Second Order Conditions Definition Walrasian

More information

Supplement to Call Centers with Delay Information: Models and Insights

Supplement to Call Centers with Delay Information: Models and Insights Supplement to Call Centers with Delay Information: Models and Insights Oualid Jouini 1 Zeynep Akşin 2 Yves Dallery 1 1 Laboratoire Genie Industriel, Ecole Centrale Paris, Grande Voie des Vignes, 92290

More information

Notes on metric spaces

Notes on metric spaces Notes on metric spaces 1 Introduction The purpose of these notes is to quickly review some of the basic concepts from Real Analysis, Metric Spaces and some related results that will be used in this course.

More information

CPC/CPA Hybrid Bidding in a Second Price Auction

CPC/CPA Hybrid Bidding in a Second Price Auction CPC/CPA Hybrid Bidding in a Second Price Auction Benjamin Edelman Hoan Soo Lee Working Paper 09-074 Copyright 2008 by Benjamin Edelman and Hoan Soo Lee Working papers are in draft form. This working paper

More information

Some stability results of parameter identification in a jump diffusion model

Some stability results of parameter identification in a jump diffusion model Some stability results of parameter identification in a jump diffusion model D. Düvelmeyer Technische Universität Chemnitz, Fakultät für Mathematik, 09107 Chemnitz, Germany Abstract In this paper we discuss

More information

Tail inequalities for order statistics of log-concave vectors and applications

Tail inequalities for order statistics of log-concave vectors and applications Tail inequalities for order statistics of log-concave vectors and applications Rafał Latała Based in part on a joint work with R.Adamczak, A.E.Litvak, A.Pajor and N.Tomczak-Jaegermann Banff, May 2011 Basic

More information

e.g. arrival of a customer to a service station or breakdown of a component in some system.

e.g. arrival of a customer to a service station or breakdown of a component in some system. Poisson process Events occur at random instants of time at an average rate of λ events per second. e.g. arrival of a customer to a service station or breakdown of a component in some system. Let N(t) be

More information

Review Horse Race Gambling and Side Information Dependent horse races and the entropy rate. Gambling. Besma Smida. ES250: Lecture 9.

Review Horse Race Gambling and Side Information Dependent horse races and the entropy rate. Gambling. Besma Smida. ES250: Lecture 9. Gambling Besma Smida ES250: Lecture 9 Fall 2008-09 B. Smida (ES250) Gambling Fall 2008-09 1 / 23 Today s outline Review of Huffman Code and Arithmetic Coding Horse Race Gambling and Side Information Dependent

More information

Aggregate Loss Models

Aggregate Loss Models Aggregate Loss Models Chapter 9 Stat 477 - Loss Models Chapter 9 (Stat 477) Aggregate Loss Models Brian Hartman - BYU 1 / 22 Objectives Objectives Individual risk model Collective risk model Computing

More information

Exact Nonparametric Tests for Comparing Means - A Personal Summary

Exact Nonparametric Tests for Comparing Means - A Personal Summary Exact Nonparametric Tests for Comparing Means - A Personal Summary Karl H. Schlag European University Institute 1 December 14, 2006 1 Economics Department, European University Institute. Via della Piazzuola

More information

Factoring & Primality

Factoring & Primality Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

More information

Mechanisms for Fair Attribution

Mechanisms for Fair Attribution Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

DEFINABLE TYPES IN PRESBURGER ARITHMETIC

DEFINABLE TYPES IN PRESBURGER ARITHMETIC DEFINABLE TYPES IN PRESBURGER ARITHMETIC GABRIEL CONANT Abstract. We consider the first order theory of (Z, +,

More information

Concentration inequalities for order statistics Using the entropy method and Rényi s representation

Concentration inequalities for order statistics Using the entropy method and Rényi s representation Concentration inequalities for order statistics Using the entropy method and Rényi s representation Maud Thomas 1 in collaboration with Stéphane Boucheron 1 1 LPMA Université Paris-Diderot High Dimensional

More information

Marshall-Olkin distributions and portfolio credit risk

Marshall-Olkin distributions and portfolio credit risk Marshall-Olkin distributions and portfolio credit risk Moderne Finanzmathematik und ihre Anwendungen für Banken und Versicherungen, Fraunhofer ITWM, Kaiserslautern, in Kooperation mit der TU München und

More information

THIS paper deals with a situation where a communication

THIS paper deals with a situation where a communication IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 973 The Compound Channel Capacity of a Class of Finite-State Channels Amos Lapidoth, Member, IEEE, İ. Emre Telatar, Member, IEEE Abstract

More information

CS 103X: Discrete Structures Homework Assignment 3 Solutions

CS 103X: Discrete Structures Homework Assignment 3 Solutions CS 103X: Discrete Structures Homework Assignment 3 s Exercise 1 (20 points). On well-ordering and induction: (a) Prove the induction principle from the well-ordering principle. (b) Prove the well-ordering

More information

Critical points of once continuously differentiable functions are important because they are the only points that can be local maxima or minima.

Critical points of once continuously differentiable functions are important because they are the only points that can be local maxima or minima. Lecture 0: Convexity and Optimization We say that if f is a once continuously differentiable function on an interval I, and x is a point in the interior of I that x is a critical point of f if f (x) =

More information

FIRST YEAR CALCULUS. Chapter 7 CONTINUITY. It is a parabola, and we can draw this parabola without lifting our pencil from the paper.

FIRST YEAR CALCULUS. Chapter 7 CONTINUITY. It is a parabola, and we can draw this parabola without lifting our pencil from the paper. FIRST YEAR CALCULUS WWLCHENW L c WWWL W L Chen, 1982, 2008. 2006. This chapter originates from material used by the author at Imperial College, University of London, between 1981 and 1990. It It is is

More information

Fluid Approximation of Smart Grid Systems: Optimal Control of Energy Storage Units

Fluid Approximation of Smart Grid Systems: Optimal Control of Energy Storage Units Fluid Approximation of Smart Grid Systems: Optimal Control of Energy Storage Units by Rasha Ibrahim Sakr, B.Sc. A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment

More information

Mathematics for Econometrics, Fourth Edition

Mathematics for Econometrics, Fourth Edition Mathematics for Econometrics, Fourth Edition Phoebus J. Dhrymes 1 July 2012 1 c Phoebus J. Dhrymes, 2012. Preliminary material; not to be cited or disseminated without the author s permission. 2 Contents

More information

arxiv:1112.0829v1 [math.pr] 5 Dec 2011

arxiv:1112.0829v1 [math.pr] 5 Dec 2011 How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

More information

OPTIMAL SELECTION BASED ON RELATIVE RANK* (the "Secretary Problem")

OPTIMAL SELECTION BASED ON RELATIVE RANK* (the Secretary Problem) OPTIMAL SELECTION BASED ON RELATIVE RANK* (the "Secretary Problem") BY Y. S. CHOW, S. MORIGUTI, H. ROBBINS AND S. M. SAMUELS ABSTRACT n rankable persons appear sequentially in random order. At the ith

More information

1 Formulating The Low Degree Testing Problem

1 Formulating The Low Degree Testing Problem 6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,

More information

MA4001 Engineering Mathematics 1 Lecture 10 Limits and Continuity

MA4001 Engineering Mathematics 1 Lecture 10 Limits and Continuity MA4001 Engineering Mathematics 1 Lecture 10 Limits and Dr. Sarah Mitchell Autumn 2014 Infinite limits If f(x) grows arbitrarily large as x a we say that f(x) has an infinite limit. Example: f(x) = 1 x

More information

Exponential Distribution

Exponential Distribution Exponential Distribution Definition: Exponential distribution with parameter λ: { λe λx x 0 f(x) = 0 x < 0 The cdf: F(x) = x Mean E(X) = 1/λ. f(x)dx = Moment generating function: φ(t) = E[e tx ] = { 1

More information

The Heat Equation. Lectures INF2320 p. 1/88

The Heat Equation. Lectures INF2320 p. 1/88 The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)

More information

Choosing Probability Distributions in Simulation

Choosing Probability Distributions in Simulation MBA elective - Models for Strategic Planning - Session 14 Choosing Probability Distributions in Simulation Probability Distributions may be selected on the basis of Data Theory Judgment a mix of the above

More information

Online Learning, Stability, and Stochastic Gradient Descent

Online Learning, Stability, and Stochastic Gradient Descent Online Learning, Stability, and Stochastic Gradient Descent arxiv:1105.4701v3 [cs.lg] 8 Sep 2011 September 9, 2011 Tomaso Poggio, Stephen Voinea, Lorenzo Rosasco CBCL, McGovern Institute, CSAIL, Brain

More information

Math 526: Brownian Motion Notes

Math 526: Brownian Motion Notes Math 526: Brownian Motion Notes Definition. Mike Ludkovski, 27, all rights reserved. A stochastic process (X t ) is called Brownian motion if:. The map t X t (ω) is continuous for every ω. 2. (X t X t

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Overview of Monte Carlo Simulation, Probability Review and Introduction to Matlab

Overview of Monte Carlo Simulation, Probability Review and Introduction to Matlab Monte Carlo Simulation: IEOR E4703 Fall 2004 c 2004 by Martin Haugh Overview of Monte Carlo Simulation, Probability Review and Introduction to Matlab 1 Overview of Monte Carlo Simulation 1.1 Why use simulation?

More information

Lecture 13: Martingales

Lecture 13: Martingales Lecture 13: Martingales 1. Definition of a Martingale 1.1 Filtrations 1.2 Definition of a martingale and its basic properties 1.3 Sums of independent random variables and related models 1.4 Products of

More information

Chapter 1: Financial Markets and Financial Derivatives

Chapter 1: Financial Markets and Financial Derivatives Chapter 1: Financial Markets and Financial Derivatives 1.1 Financial Markets Financial markets are markets for financial instruments, in which buyers and sellers find each other and create or exchange

More information

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié.

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié. Random access protocols for channel access Markov chains and their stability laurent.massoulie@inria.fr Aloha: the first random access protocol for channel access [Abramson, Hawaii 70] Goal: allow machines

More information

Random variables, probability distributions, binomial random variable

Random variables, probability distributions, binomial random variable Week 4 lecture notes. WEEK 4 page 1 Random variables, probability distributions, binomial random variable Eample 1 : Consider the eperiment of flipping a fair coin three times. The number of tails that

More information

A PRIORI ESTIMATES FOR SEMISTABLE SOLUTIONS OF SEMILINEAR ELLIPTIC EQUATIONS. In memory of Rou-Huai Wang

A PRIORI ESTIMATES FOR SEMISTABLE SOLUTIONS OF SEMILINEAR ELLIPTIC EQUATIONS. In memory of Rou-Huai Wang A PRIORI ESTIMATES FOR SEMISTABLE SOLUTIONS OF SEMILINEAR ELLIPTIC EQUATIONS XAVIER CABRÉ, MANEL SANCHÓN, AND JOEL SPRUCK In memory of Rou-Huai Wang 1. Introduction In this note we consider semistable

More information

Taylor and Maclaurin Series

Taylor and Maclaurin Series Taylor and Maclaurin Series In the preceding section we were able to find power series representations for a certain restricted class of functions. Here we investigate more general problems: Which functions

More information

Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents

Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents William H. Sandholm January 6, 22 O.. Imitative protocols, mean dynamics, and equilibrium selection In this section, we consider

More information

Probability Generating Functions

Probability Generating Functions page 39 Chapter 3 Probability Generating Functions 3 Preamble: Generating Functions Generating functions are widely used in mathematics, and play an important role in probability theory Consider a sequence

More information

Adaptive Search with Stochastic Acceptance Probabilities for Global Optimization

Adaptive Search with Stochastic Acceptance Probabilities for Global Optimization Adaptive Search with Stochastic Acceptance Probabilities for Global Optimization Archis Ghate a and Robert L. Smith b a Industrial Engineering, University of Washington, Box 352650, Seattle, Washington,

More information