Halloween Costume Ideas for the Wii Game

Size: px
Start display at page:

Download "Halloween Costume Ideas for the Wii Game"

Transcription

1 Algorithica 2001) 30: DOI: /s Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin 4 Abstract This paper is concerned with the tie series search and one-way trading probles In the tie series) search proble a player is searching for the axiu or iniu) price in a sequence that unfolds sequentially, one price at a tie Once during this gae the player can decide to accept the current price p in which case the gae ends and the player s payoff is p Intheone-way trading proble a trader is given the task of trading dollars to yen Each day, a new exchange rate is announced and the trader ust decide how any dollars to convert to yen according to the current rate The gae ends when the trader trades his entire dollar wealth to yen and his payoff is the nuber of yen acquired The search and one-way trading are intiately related Any deterinistic or randoized) one-way trading algorith can be viewed as a randoized search algorith Using the copetitive ratio as a perforance easure we deterine the optial copetitive perforance for several variants of these probles In particular, we show that a siple threat-based strategy is optial and we deterine its copetitive ratio which yields, for realistic values of the proble paraeters, surprisingly low copetitive ratios We also consider and analyze a one-way trading gae played against an adversary called Nature where the online player knows the probability distribution of the axiu exchange rate and that distribution has been chosen by Nature Finally, we consider soe applications for a special case of portfolio selection called two-way trading in which the trader ay trade back and forth between cash and one asset Key Words Tie series search, One-way trading, Two-way trading, Portfolio selection, Online algoriths, Copetitive analysis 1 Introduction 11 Tie Series Search Consider the following eleentary search proble A player is searching for the axiu resp iniu) price of soe asset At each tie period i 1, 2,,n the player obtains a price quotation p i and ust decide whether or not to accept this price Once the player decides to accept soe price p j the gae ends and the player s payoff resp cost) is p j The horizon n ay or ay not be known to the player and if the player has not decided to accept a price during the first n 1 periods he ust accept soe iniu resp axiu) price In essence, in this eleentary search 1 Departent of Coputer Science, Technion Israel Institute of Technology, Haifa 32000, Israel rani@cs techionacil R El-Yaniv is a Marcella S Geltan Acadeic Lecturer 2 Departent of Coputer Science, Tel Aviv University, Raat Aviv 69978, Israel fiat@athtauacil 3 International Coputer Science Institute, 1947 Center St, Berkeley, CA 94704, USA, and Departent of Electrical Engineering and Coputer Sciences, University of California, Berkeley, CA 94720, USA 4 Departent of Coputer Science, University of Toronto, Toronto, Ontario, Canada M5S 1A4 gt@cs torontoedu Received October 19, 1998; revised August 12, 1999 Counicated by Ming-Yang Kao Online publication February 1, 2001

2 102 R El-Yaniv, A Fiat, R M Karp, and G Turpin proble the player is confronting the decision proble of when he has acquired sufficient price sapling so that the accepted price is satisfying given what he already knows The eleentary search proble has any variations and extensions If the horizon n is known resp unknown) to the player, then the proble is tered with known duration resp with unknown duration) In the case of unknown duration the player is infored just before the last period so that he can accept the last offered price Throughout this paper we assue a finite known or unknown) duration A search proble is with recall if soe nuber of the ost recent price offers are retained and at any period the player can choose to accept one of the retained offers In another natural extension of the eleentary search proble the player has to pay a sapling cost c i to obtain the ith price quotation In this case the total payoff or return) of a player that accepts the price p j is p j c i 1 i j Applications of the tie series search decision task are required and perfored by virtually all econoic agents and institutions Therefore, search is a ost fundaental feature of econoic arkets Consider the following straightforward applications Job and eployee search In the job search the player is seeking eployent In each period the job seeker obtains one job offer which ay be viewed as the lifetie earning fro the job A sapling cost ay be associated with the generation of each offer and ay include advertising costs, transportation costs, and perhaps the loss incurred fro being currently uneployed Now consider an eployer searching for an eployee We assue that the eployer can test and quantify the suitability of candidates to the job offered Such quantities correspond to price quotations The sapling cost in this case ay be attributed to advertiseent, qualification tests, etc 5 Search for the lowest price of goods Here the player needs to buy soe goods that are sold at different stores at different prices The player can obtain price quotations after identifying the relevant sellers Here sapling fees ay account for traveling or phone costs and for the tie wasted Like job and eployee search this application is of fundaental iportance because optial search strategies deterine the deand function which in turn deterines the nature of the arket itself 12 One-Way Trading Consider a trader who needs to exchange soe initial wealth w 0, given in soe currency say, dollars), to soe other asset or currency say, yen) At the start of each trading period the trader obtains the current price quotation and ust decide whether to accept it or wait for a better price Typically, the cost of sapling a price quotation is negligible as prices are widely available in quotation services Nevertheless, the trader ay be required to pay soe transaction fees for the exchange eg, to a financial institution) 6 Thus stated, the one-way trading proble is a direct application 5 This eployee search is closely related to the well known secretary proble [16], [1] where typically the objective is to accept one or ore secretaries of best ordinal value aong an ordered set of all secretaries 6 These transaction fees can be a function of the aount traded ie, dollars spent) or a function of the price which is equivalent to the aount of yen received) Alternatively or in addition), the fees can include a fixed cost

3 Optial Search and One-Way Trading Online Algoriths 103 of the tie series search proble Nevertheless, the trader can partition the initial wealth w 0 and exchange it sequentially in parts, each part in a different exchange rate Clearly, this ore general trading schee ay result in higher returns As we shall later see, trading in parts is equivalent to a randoized search One-way trading algoriths can be applied in various econoic situations For instance, consider a fund anager who decides to change the position of soe portfolio and enter or exit) soe arket In this case w 0 is the part of his wealth allocated to the new position Another natural application arises when an individual, for the purpose of eigrating to a foreign country, sells local property in order to exchange the local currency received to the foreign currency 13 Previous Work Related to Tie Series Search The search proble has received considerable attention in atheatical econoics and operations research Traditionally, a Bayesian approach has been eployed: An optial search strategy is sought under the assuption that the prior distribution of prices is given and stationary In order to allow for analytical results it is usually further assued that price quotations are independent observations of this distribution Although the stationarity and independence assuptions are soewhat siplistic, this basic paradig has given rise to a rich theory that relies on tools fro the theory of optial stopping [11] It is beyond the scope of this paper to survey the Bayesian work related to search 7 Not surprisingly, the Bayesian approach derives search algoriths that are heavily dependent on the price prior distribution Nevertheless, one striking feature of Bayesian optial search algoriths applicable to any proble variants) is that they have the following structure Based upon the proble paraeters, and, in particular, the assued prior distribution, there is a single fixed critical nuber called the reservation price such that the optial policy is to reject all prices below the reservation price and to accept any offer above it 8 The least acceptable assuption of classical Bayesian search odels is that the probability distribution of prices is fully known to the player Several odels attept to relax this assuption For exaple, Rosenfield and Shapiro [28] studied cases where the price distribution is itself a rando variable distributed according to probability law with soe known oents eg, the price distribution is known to be noral with ean distributed according to soe other probability law) In this paper we attept to circuvent alost all distributional assuptions by resorting to copetitive analysis defined in Section 14) Our only assuption is that the price generating process has finite known or unknown) support 14 Copetitive Analysis of Online Probles Let P I, F, U) be a profit axiization proble where I is a set of possible inputs; for each I I, FI ) is the set of feasible outputs; U is a utility function such that for all I and O FI ), UI, O) R Consider any algorith ALG for the proble P Given any input I, ALG coputes a feasible output O FI ) We denote the profit or return) of ALG on the input instance 7 The reader is referred to the excellent surveys by Lippan and McCall that discuss Bayesian solutions for a variety of search proble variants [23], [24] 8 In the case of search with known duration the reservation price can change dynaically

4 104 R El-Yaniv, A Fiat, R M Karp, and G Turpin I by ALGI ) UI, O) Typically, each input can be represented as a finite sequence I i 1, i 2,,i n and a feasible output O can also be represented as finite sequence O o 1, o 2,,o n An algorith ALG coputes online if for each j 1,,n 1, ALG ust copute o j before i j+1 is given An algorith is offline if it can produce a feasible output given the entire input sequence We denote an optial offline algorith by OPT By definition, for each input sequence I the return of OPT is OPTI ) sup O FI ) UI, O) An online algorith is c-copetitive if for any I I, 1) ALGI ) 1 OPTI ) c In this case we also say that ALG attains a copetitive ratio c The least copetitive ratio that ALG attains is called the copetitive ratio of ALG The copetitive ratio is thus a worst-case perforance easure Any c-copetitive online algorith is guaranteed to return at least a fraction 1/c of the optial offline profit no atter how unfortunate or erratic the future will be The use of the copetitive ratio to easure perforance of online algoriths is called copetitive analysis 9 Copetitive analysis has been used in the coputer science literature for over 20 years At first it was used iplicitly for the online approxiation of NP-hard probles see, eg, [17], [19], [20], and [30]) Soewhat later, the seinal work of Sleator and Tarjan [29] on virtual eory and dictionary anageent put forth the use of the copetitive ratio as a general perforance easure for online decision aking Soeties it is convenient to view the copetitive analysis of an online) proble as a two-person gae between the online player and an adversary The online player chooses an online algorith ALG and infors the adversary of his choice The adversary then chooses an input sequence I The payoff to the adversary is the resulting perforance ratio OPTI )/ALGI ) and the payoff to the online player is inus this quantity ie, the gae is zero-su) As is generally the case with two-person zero-su gaes, a randoized strategy is required to obtain optial expected) copetitive perforance Extending the definition of the copetitive ratio to randoized algoriths is straightforward We siply substitute in 1) E[ALGI )] for ALGI ) where the expectation is taken with respect to the distributions used by ALG Since in the gae corresponding to this definition the adversary is ignorant of the outcoes of the rando choices ade by the online algorith this adversary is called oblivious 10 Indeed, it is often the case that randoization against an oblivious adversary) draatically iproves the copetitive perforance see the classical results of [8] and [15] regarding etrical task systes and virtual eory anageent) As we shall later see randoization epowers the online player also in the search proble 15 Copetitive Analysis: A Discussion The ain attraction in using the copetitive ratio for analyzing online algoriths is that there is no need to rely on statistical odeling of input sequences Indeed, it is often extreely difficult to devise realistic statistical 9 The ter copetitive ratio was tered by Karlin et al [21] 10 Other kinds of adversaries that generate input sequences adaptively based on the outcoes of the online rando choices) have been considered see [5])

5 Optial Search and One-Way Trading Online Algoriths 105 odels for possible inputs which are always highly dependent on the particular application) This difficulty is often ore extree in coplex dynaical environents such as econoical systes Strategic financial decision aking is therefore a very attractive doain for copetitive analyses Moreover, in financial decision aking it is often desirable to secure soe inial sure profit rather than expecting higher average profits while being exposed to severe risks Essentially, this is what copetitive analysis offers Nevertheless, this risk aversion property of the copetitive ratio is quite often a drawback since this perforance easure can lead to overly defensive algoriths Indeed, whenever decision akers do have soe side inforation or partial statistical) knowledge on the evolution of input sequences it would be a terrible waste to ignore it, which is precisely what the copetitive ratio does Recently, al-binali [2] generalized the pure copetitive analysis so that it can utilize predictions in the for of partial knowledge on future input sequences) while retaining the natural risk aversion of the copetitive ratio In fact, this generalized copetitive analysis fraework allows for trading-off the associated risk with the potential reward 11 This generalized) copetitive analysis offers a robust yet flexible copleentary fraework to the analysis of financial) decision aking under uncertainty An additional advantage of the copetitive ratio is that it offers a unified easure of perforance under which any two strategies are coparable in soe fundaental sense 16 Paper Organization This paper is organized as follows In Section 2 we study the relationship between randoized search and one-way trading In Section 3 we present a siple deterinistic search algorith of a reservation price policy type, which is optial for deterinistic) search We then show how randoization over the reservation price policies can draatically iprove the copetitive ratio In Section 4 we present a general threat-based policy for one-way trading or search) This general policy yields optial algoriths for a nuber of variants of the one-way trading proble We provide in this section detailed analyses of four proble variants In Section 5 we give a few nuerical exaples of the copetitive ratios obtained in the previous sections, showing that for realistic values of the proble paraeters we can obtain surprisingly low ratios In Section 6 we study a proble variant called a gae against Nature We define Nature as an adversary that chooses the probability distribution of the axiu exchange rate the axiu rate is the optial offline return) Although at the outset it sees that Nature is weaker than our ordinary adversary we prove that with respect to one-way trading) Nature and the ordinary adversary are equivalent in a sense to be ade precise later) In Section 7 we apply our results for the one-way trading gae to a two-way trading gae in which the player can trade currencies back and forth Lastly, in Section 8 we suarize our conclusions and indicate soe directions for future work 2 Randoized Search and One-way Trading Notice that in the search proble the online player ust accept one price and in the one-way trading proble the trader 11 To deonstrate the utility of this new technique al-binali has used soe of the results in this paper based on a preliinary version of our paper) showing how the copetitive perforance of a one-way trader can be boosted when he has the knowledge of useful predictions

6 106 R El-Yaniv, A Fiat, R M Karp, and G Turpin can partition his initial wealth and trade the parts sequentially, each part at a different exchange rate Nevertheless, the search and one-way trading probles are closely related Any deterinistic or randoized) one-way trading algorith that trades the initial wealth in parts can be interpreted as a randoized search algorith and vice versa This follows fro the fact that any randoized) one-way trading algorith is equivalent to a randoized trading algorith that trades the entire wealth at once at soe randoly chosen period) Further, any randoized trading algorith that trades the entire wealth at once is equivalent to a deterinistic algorith that trades the initial wealth in parts Forally we have THEOREM 1 i) Let ALG 1 be any randoized one-way trading algorith Then there exists a deterinistic one-way trading algorith ALG 2 such that for any exchange rate sequence σ, E[ALG 1 σ )] ALG 2 σ ) The reverse stateent is also true: ii) Let ALG 2 be any deterinistic one-way trading algorith Then there exists a randoized algorith ALG 1 that akes only a single trade such that E[ALG 1 σ )] ALG 2 σ ) holds for all σ PROOF Let ALG 1 be any randoized one-way trading algorith In particular and using gae-theoretic terinology), ALG 1 ay be a ixed strategy a distribution over deterinistic algoriths) or a behavioral strategy whose daily transactions are chosen randoly) Since in this online gae between the online player and the adversary) the online player has perfect recall she has no eory restrictions), we know that the set of behavioral strategies is a subset of the set of ixed strategies see [3]) Thus, in any case we can assue without loss of generality that ALG 1 is a ixed algorith, which is a probability distribution {wa)} over A, the set of all deterinistic algoriths For any sequence of prices σ p 1, p 2,,p n, the expected return of ALG 1 is E w [ALG 1 σ )] A aσ ) dwa) With respect to σ consider a deterinistic algorith ALG 2 that on period i spends a fraction A si, a)dwa) of its initial wealth where si, a) is the aount spent by the deterinistic algorith a on period i Thus the return of ALG 2 is ALG 2 σ ) n p i i1 A i1 A A si, a) dwa) n si, a)p i dwa) aσ ) dws) E w [ALG 1 σ )] To prove part ii) consider a deterinistic algorith that trades a fraction s i of its initial wealth at the ith period, i s i 1 Now consider a randoized algorith ALG 1 that with probability s i trades its entire wealth at the ith period Clearly, the expected return of ALG 1 equals the return of the deterinistic algorith ALG 2 COROLLARY 2 It follows that a copetitive) optial deterinistic one-way trading algorith has the sae return as an optial randoized search algorith This iplies that randoization cannot iprove the copetitive perforance in one-way trading

7 Optial Search and One-Way Trading Online Algoriths 107 Although randoization cannot help in one-way trading we will see that randoization is advantageous for search As noted earlier, both in the search and one-way trading proble the online player ay be required to pay a sapling cost and/or transaction cost) for each price quotation and/or dollar traded) In this paper we consider sipler proble variants where there are no such costs Also we ake the assuptions that arbitrary fractions of oney units can be traded REMARK 1 In general, the nature of the sapling/transaction fees will affect the copetitive ratio We state without proofs the following observations i) The copetitive ratio of any one-way trading algorith is independent of transaction costs deterined by a fixed percentage applied to the aount spent In this case the equivalence of Theore 1 obviously holds ii) When we introduce transaction fees which are a fixed percentage applied to the prices, the copetitive ratio will iprove but Theore 1 still holds iii) When fixed transaction costs are introduced the deterinistic copetitive ratio increases and there is no longer an equivalence between deterinistic one-way trading algoriths and randoized search algoriths 3 Copetitive Search Algoriths Throughout this paper we assue that prices exchange rates) are chosen by an adversary) fro the real interval [, M] where 0 < M We define the axiu fluctuation ratio of possible prices to be ϕ M/ Copetitive ratios of algoriths will be deterined in ters of ϕ The paraeters, M,orϕ ay or ay not be known to the online player For a start, suppose that both and M are known to the online player In this case the optial deterinistic search strategy is the following reservation price policy RPP): Accept the first price greater than or equal to p M We call p the reservation price Clearly, the optial reservation price should balance the return ratios offline/online) resulting by the following two events: i) the axiu price encountered, p ax,is p in which case the worst-case return ratio is M/p ; ii) p ax < p in which case the worst-case return ratio is p ax / Therefore, the optial reservation price p is the solution of M/p p/ REMARK 2 It is possible to show that if only the fluctuation ratio ϕ is known but not or M), then no better ratio than the trivial one of ϕ is achievable One can draatically iprove the copetitive ratio by using randoized algoriths We now introduce siple randoized algoriths of exponential threshold type that achieve exponentially better copetitive ratios The basic idea of these algoriths is due to Levin [22] Assue, for siplicity, that ϕ 2 k for soe integer k Fori 0, 1,,k 1, let RPPi) be the deterinistic) reservation price policy with reservation price 2 i Define EXPO to be a unifor probability ixture over the set {RPPi)} k 1 i0 That is, before the start of the gae EXPO chooses one of the RPPi) strategies, each with probability 1/k

8 108 R El-Yaniv, A Fiat, R M Karp, and G Turpin THEOREM 3 Levin) Let ϕ 2 k for soe integer k Algorith EXPO is cϕ) log ϕ)- copetitive with cϕ) approaching 1 when ϕ PROOF Let p ax be the posterior axiu price obtained Let j be an integer satisfying 2 j p ax < 2 j+1 The particular choice of p ax and, therefore, of j) is controlled by the adversary Note that j k and since all prices are in [, M], j k if and only if p ax M It will later be ade clear that the choice p ax M and, thus, of j k) is not optial for the adversary so we can assue that j k 1 For any choice of j algorith EXPO will return on average k j + ) 2 i k k 2 j+1 + k j 2) 1 i j Denote by R j) the return ratio, offline to online, obtained for a particular j Since for any choice of j it is optial for the adversary to choose p ax arbitrarily close to 2 j+1, we have 2 j+1 R j) k 2 j+1 + k j 2 It is not hard to see that the real-valued function R j) obtains its axiu at j k 2 + 1/ln 2 and it follows that the coefficient of k in R j) is alost 1 resulting in a copetitive ratio that is greater than but approaching k log ϕ as ϕ and k grow) REMARK 3 Theore 3 can be extended in two ways First, siilar result can be obtained when ϕ is not a power of 2 Second, exactly the sae bound holds if the player does not know and M but only knows ϕ Algorith EXPO can be odified to work even without knowledge of ϕ Let µ {qi)} i0 be any probability distribution over the natural nubers Consider algorith EXPO µ that acts as follows After p 1, the first price, is revealed to the online player algorith EXPO µ chooses the reservation price p 12 i with probability qi) LEMMA 1 Algorith EXPO µ is 2/q log ϕ )-copetitive against an oblivious adversary, where ϕ is the posterior global fluctuation ratio PROOF Let p ax be the axiu price obtained and assue that p 1 2 j p ax < p 1 2 j+1 for soe integer j In the worst case OPT s return is less than, but arbitrarily close to, p 1 2 j+1 and algorith EXPO µ returns at least q j)p 12 j on average It follows that the expected copetitive ratio of EXPO µ is not saller than 2/q j) By definition, ϕ p ax /p 1 and therefore j log ϕ<j + 1, so log ϕ j and the proof is coplete In order to apply Lea 1 and derive sall copetitive ratios for algorith EXPO µ we need to construct an appropriate probability distribution µ Sall copetitive ratios are obtained by taking appropriate converging infinite sus For exaple, we can use

9 Optial Search and One-Way Trading Online Algoriths 109 the Rieann zeta function ζx) i1 1/i x ) Specifically, for every positive ε the infinite su i1 1/i1+ε converges to the constant ζ1 + ε) It follows that µ ε {1/ζ1 + ε)i + 1) 1+ε } i0 is a probability distribution over the natural nubers Hence by Lea 1, EXPO µ ε attains a copetitive ratio of 2ζ1 + ε) j + 1) 1+ε Olog 1+ε ϕ)) with ϕ being the posterior global fluctuation ratio However, we can do even better Consider the infinite su i 1/i log1+ε i) Lea 1 yields the copetitive ratio of 2) O logϕ) log 1+ε log ϕ) ) Notice however that as ε decreases the constant in the big-o increases Hence, the particular choice of the distribution µ ε can only be optiized if soe bounds on ϕ are known REMARK 4 It is possible to generalize the upper bound given by 2) and achieve an upper bound of O logϕ) log 1+ε log log log ϕ) } {{ } k for every integer k 4 Optial Threat-Based Policy for One-Way Trading As can be seen in the previous section the copetitive ratio Olog ϕ) is attainable by the siple EXPO algorith under inor assuptions on possible prices ie, the global fluctuation ratio is known) It turns out that the ratio Olog ϕ) is within a constant factor of the best possible Nevertheless, to obtain an optial copetitive ratio, soewhat ore involved algoriths and analyses are required The optial algoriths are best described as deterinistic) one-way trading algoriths and we focus on the one-way trading proble for the reainder of the paper The optial perforance is obtained by algoriths that obey the following threatbased policy Let c be any copetitive ratio that can be attained by soe one-way trading algorith For a start, assue that c is known to the trader For each such c the corresponding threat-based policy consists of the following two rules RULE 1 so far Consider trading dollars to yen only when the current rate is the highest seen RULE 2 Whenever you convert dollars, convert just enough to ensure that a copetitive ratio c would be obtained if an adversary dropped the exchange rate to the iniu possible rate 12 and kept it there throughout the gae Note that these two rules apply to all but the last trading day when, by the rules of the gae, the trader ust trade all reaining dollars to yen 12 The iniu possible rate is defined with respect to the inforation known to the trader That is, it is if is known, and it is p/ϕ if only ϕ is known and p is highest price seen so far

10 110 R El-Yaniv, A Fiat, R M Karp, and G Turpin At the outset it is not clear how to follow such a policy, in particular, how to follow Rule 2 that requires trading a quantity that equals the aount of just enough dollars in order to ensure a copetitive ratio of c For now assue that it is possible to copute the quantities prescribed by Rule 2 and assue an algorith that follows this policy Such an algorith converts dollars to yen based on the threat that the exchange rate will drop peranently to the iniu possible rate For each attainable copetitive ratio c the corresponding threat-based algorith can be shown to be c-copetitive This can be intuitively justified as follows Consider the first trade exchange rate is p 1 ) Since the current exchange rate is the highest seen so far the algorith considers a trade Since the copetitive ratio c is attainable by soe deterinistic trading algorith, there exists soe s 0 such that the ratio c will still be attainable if s dollars are traded to yen Further, the chosen aount of dollars s is such that the ratio c is so far guaranteed even if there will be a peranent drop of the exchange rate and no further trades will be conducted except for one last trade converting the reaining dollars with the iniu possible exchange rate) In particular, there is no need to consider any exchange rate which is saller than p 1 Siilar arguents can be used to justify the choice of the aounts for the rest of the trades and thus intuitively this policy induces a c-copetitive algorith A foral analysis follows REMARK 5 Denote the iniu possible exchange rate by Notice that as long as the exchange rates are not larger than c, the threat-based trader should not trade any dollars to yen except of course for the last day, when the trader ust trade all reaining dollars to yen) This follows fro Rule 2 because a copetitive ratio of c is always attainable when the axiu rate is c even if all dollars are exchanged at rate We now develop soe basic properties of threat-based trading These properties will facilitate analyses of the threat-based policy for the following variants of the one-way trading gae Variant 1: Known duration ie, n is known) with and M known Variant 2: Unknown duration with and M known Variant 3: Known duration and known ϕ Variant 4: Unknown duration and known ϕ For each of the above variants, we identify the corresponding optial threat-based online algorith and deterine its copetitive ratio Fix any two positive reals and M with < M, and any integer n > 1 An exchange rate sequence, σ, is an eleent of [, M] n Thus, σ p 1, p 2,,p n, and for each 1 i n, p i [, M] is called the exchange rate of the ith day giving the nuber of yen that can be traded for one dollar on that day Let n) denote the set of all such exchange rate sequences A deterinistic one-way trading algorith is a function, D: n) {1, 2,,n} [0, 1], satisfying the following properties: D is nonincreasing; for each σ n), Dσ, 0) 1, and Dσ, n) 0 Dσ, i) is defined to be the nuber of reaining dollars just after the ith day when the algorith trades its dollars in accordance with σ To easure the perforance of D we

11 Optial Search and One-Way Trading Online Algoriths 111 ake use of soe ore definitions For each σ n), let 3) s i def Dσ, i 1) Dσ, i), i 1,,n s i is called the ith transaction and it thus gives the aount of dollars traded to yen on the ith day by the algorith DGivenD ) and the s i, we define Y D as follows: Y D σ, 0) def 0, i Y D σ, i) def s j p j, j1 i 1,,n Thus, Y D σ, i) gives the nuber of accuulated yen just after the ith transaction has been perfored Clearly, Y D is nondecreasing and the onotonicity of D and Y D ) corresponds to the one-way requireent The return of D on the sequence σ, denoted by P D σ ), is defined to be the quantity Y D σ, n) Anonline one-way trading algorith is a one-way trading algorith D such that the ith transaction is solely based on past and present exchange rates, and the paraeters known to the online player Assue that the online player knows that there are at ost n trading days This corresponds to Variant 1 or 3 13 Consider the threat-based strategy Rule 1 requires that once a transaction has been ade at soe exchange rate, further transactions will be ade only at higher exchange rates; rates that are the sae or lower will be ignored Hence, both OPT and the threat-based algorith conduct transactions only when the exchange rate sequence reaches a new high Therefore, in a worst-case analysis of the perforance of the threat-based algorith, we ay assue that the exchange rate sequence consists of an initial segent of successive axia of length k n In addition, we can assue that the first rate p 1 is larger than the iniu possible rate ties r where r is the target copetitive ratio of the threat-based algorith see Reark 5) That is, iniu possible rate) r p 1 < p 2 < < p k axiu possible rate) However, in order to realize a threat, the adversary ay choose k < n and then take p k+1 p k+2 p n iniu possible rate) Given a proble variant 1 or 3), let ALG be the optial threat-based algorith for that variant The algorith ALG will be associated with the function D ), as defined above, and throughout this section we abbreviate Dσ, i) resp Y σ, i))tod i resp Y i ) Recall that the player starts with D 0 1 dollars and Y 0 0 yen Also, recall that s i as defined in 3)) denotes the ith transaction Specifically, s i D i 1 D i It is easy to see that p i s i Y i Y i 1 Let r be the target copetitive ratio that ALG is trying to achieve LEMMA 2 If ALG is an r-copetitive threat-based algorith then for every i 1, 4) s i p i r Y i 1 + D i 1 iniu possible rate)) r p i iniu possible rate)) 13 The results for Variants 2 and 4 will be then derived fro the results for Variants 1 and 3, respectively, by taking the liit n

12 112 R El-Yaniv, A Fiat, R M Karp, and G Turpin and 5) PROOF 6) Y i + D i iniu possible rate) p i r Since ALG is r-copetitive, by Rule 2 it ust be that p i Y i + D i iniu possible rate) r Here the denoinator represents the return of ALG if an adversary dropped the exchange rate to the iniu possible rate, and the nuerator is the return of OPT for such an exchange rate sequence That is, 7) p i Y i 1 + s i p i ) + D i 1 s i ) iniu possible rate) r Since by Rule 2) ALG ust spend the inial s i that satisfies inequality 7) and since the left-hand side in 7) is decreasing with s i we ust replace the inequality with equality: p i Y i 1 + s i p i ) + D i 1 s i ) iniu possible rate) r Equation 4) is obtained by solving this equality for s i Equation 5) is obtained by replacing the inequality in 6) with equality and rearranging 41 Analysis of Variant 1: Known Duration with, M Known To begin our analysis for Variant 1, we ake use of 4) and 5) specializing the to the case in which the iniu possible rate is as assued for Variant 1 This yields the following expressions for the daily transactions: 8) and for i > 1, s 1 1 r p 1 r p 1, s i 1 r pi r Y i 1 + D i 1 ) 9) p i Then, by 5) at i 1 instead of i we have Y i 1 + D i 1 p i 1 /r, so we obtain, for i > 1, 10) s i 1 r pi p i 1 p i In the above forulas for the daily transactions, r is the target copetitive ratio that the algorith is attepting to achieve Clearly the algorith cannot attain an arbitrarily sall r For exaple, if r 1 we see that s 1 1 forula 8)) and the algorith will spend its entire wealth on the first rate thus failing to achieve a copetitive ratio of 1 with any continuation of the exchange rate sequence that increases above the first rate) Hence, we can obtain fro these forulas r-copetitive threat-based) algoriths only by using sufficiently large values r Our goal now is to identify the sallest achievable copetitive ratio

13 Optial Search and One-Way Trading Online Algoriths 113 Let σ be an exchange rate sequence and let r > 1 be any real We say that the threatbased algorith A r, as defined by forulas 8) and 10) applied with r,isr-proper with respect to σ if i) the su of daily transactions coputed by A r, when the exchange rate sequence is σ, is not larger than 1 the initial wealth); and ii) the resulting ratio of optial offline return over online return A r σ ) with respect to σ is not larger than r LEMMA 3 Let σ be any exchange rate sequence If A r is r-proper with respect to σ, then for any r r, A r is r -proper PROOF As noted, and without loss of generality, suppose that σ p 1,,p k,,, with < p 1 < p 2 < < p k For each day i, the daily dollar transactions s i as calculated by A r are not larger than the respective aounts s i as calculated by A r Specifically, for i 1 we have, using 8), s 1 s 1 p 1 1 p 1 r 1 ) 0 r Siilarly, fro 10) we have for i > 1, s i s i p i p i 1 p i 1 r 1 ) 0 r Therefore, i s i i s i, and since A r is r-proper, i s i 1 and, therefore, i s i 1 By the definition of the threat-based algorith and since the copetitive ratio r is attainable, for every day i k, A r chooses a transaction that guarantees a copetitive ratio of r even in a case of a peranent drop to Therefore, A r is r -proper with respect to σ Let σ p 1,,p k,,, be an input sequence For any k, we want the daily transactions to satisfy k i1 s i 1 Suppose for the oent that k is known to the online player In this case, the optial copetitive ratio for a threat-based algorith ust be deterined such that there will be no dollars reaining after the last purchase on day k) In other words, the optial copetitive ratio of the threat-based strategy with k known) has the property that k s i 1 i1 Substituting for the s i fro 8) and 10) we obtain 11) 1 1 r After solving 11) for r we write p 1 r p r k i2 p i p i 1 p i 12) r r k) p 1, p 2,,p k ) def 1 + p 1 k p i p i 1 p 1 p i i2

14 114 R El-Yaniv, A Fiat, R M Karp, and G Turpin As shown in the following lea, we can deterine an attainable copetitive ratio of threat-based algorith in an n-day gae by axiizing r k) p 1,,p k ) over all choices of k n and p 1 < p 2 < < p k M Define 13) r n, M) sup r k) p 1, p 2,,p k ) k n, p 1 <<p k M LEMMA 4 Let σ be any exchange rate sequence Then the threat-based algorith A rn,m) is r n, M)-proper with respect to σ PROOF As usual, suppose that σ p 1,,p k,,, Let r r k) p 1, p 2,, p k ) By construction, the threat-based algorith A r is r-proper for σ Since r n, M) r, by Lea 3 A rn,m) is r n, M)-proper with respect to σ By Lea 4, r n, M) is an achievable copetitive ratio for the proble The rest of this section is devoted to calculating r n, M) Our analysis proceeds as follows: we first fix k, p 1, and p k, and axiize over {p i } k 1 i2 Then we axiize over p k, next over p 1, and, lastly, over k Without loss of generality we assue that k > 1 since for the choice k 1, a copetitive ratio of 1 is trivially achieved The sequence of following leas lead to the evaluation of 13) LEMMA 5 For fixed k > 1, p 1 and p k, k k 1) 1 ax p 1 <p 2 < <p k 1 <p k i2 p i p i 1 p i and the axiu is obtained when for every 2 i k, ) ) p1 1/k 1) p k 14) p i p i 1 p i 1 ) p1 1/k 1) p k PROOF For each i, set x i p i Hence, k i2 p i p i 1 p i k i2 k 1 x i x i 1 x i k However, by the geoetric-arithetic ean inequality, x 1 /x 2 + x 2 /x 3 + +x k 1 /x k ) k 1 ax p i, 2 i k 1 i2 i2 x i 1 x i ) 1/k 1) x1 x2 xk 1 x 2 x 3 x k x1 x k ) 1/k 1), and equality is obtained if and only if all the ters in the left-hand side are equal Hence, k p i p i 1 ) k x i 1 p i x i k 1) in x i, 2 i k 1 i1

15 Optial Search and One-Way Trading Online Algoriths 115 k 1) 1 k 1) 1 x1 x k ) 1/k 1) ) p1 p k ) ) 1/k 1) Fro Lea 5 we iediately obtain sup r k) p 1, p 2,,p k ) sup r k) p 1, p k ), k n, k n, p 1 < <p k M p 1 <p k M where r k) p 1, p k ) def 1 + p 1 k 1) 1 p 1 ) ) p1 1/k 1) p k It is readily seen that r k) p 1, p k ) is increasing with p k Therefore, it is axiized when p k takes its axiu possible value, M, and sup p1,p k rk)p 1, p k ) reduces to sup p1 r k) p 1 ) where 15) r k) p 1 ) def 1 + p 1 k 1) 1 p 1 Abbreviate ax p1 r k) p 1 ) by r k) ) ) p1 1/k 1) M LEMMA 6 ax p1 r k) p 1 ) exists; let p be a nuber in [, M] such that r k) p ) ax p1 r k) p 1 ) Then p is unique and 16) PROOF r k) p ) We use the following substitutions: kp k + p ) u p 1 ) 1/k 1), v M ) 1/k 1) After siplification, we can write the derivative of r k) p 1 ) as follows: 17) dr k) p 1 ) dp 1 uk + ku k 1)v p 2 1 v Consider the nuerator of 17) For every positive v and k > 1, the equation 18) u k + ku k 1)v 0 has a unique positive root, u In other words, there exists p u ) k 1 +, that is, a stationary point of r k) p 1 ) It is straightforward to check that the quantity d 2 r k) p 1 )/dp 2 1 ) p ) is negative and thus r k) p ) is a axiu

16 116 R El-Yaniv, A Fiat, R M Karp, and G Turpin We can rewrite 18) in the for u k 1) v u ) k 1 + k, and if we substitute back for u and v we obtain ) 1/k 1) 19) p M k 1) p + k k 1) p + k 1) The proof of 16) is then coplete by substituting 19) in 15) That is, r k) p ) 1 + p p ) ) 1/k 1) k 1) 1 p M ) 1 + p p k 1) 1 + p )k 1) p + k 1) kp p + k 1) 1 k 1) p + k 1) We can now uniquely characterize the worst-case k-day sequence of exchange rates against the threat-based algorith Let ˆσ k ˆp 1, ˆp 2,, ˆp k denote this sequence By Lea 6, ˆp 1 p We also know, fro an earlier discussion, that ˆp k M In addition, by Lea 5, for all 2 i k 1, 20) so p i p i 1 p i 1 ) p1 1/k 1), p k ) ˆp1 1/k 1) ˆp i 1 ˆp i + 1 M ) ) ˆp1 1/k 1) M The behavior of the threat-based algorith against ˆσ k can also be ade clear now For 1 i k, denote by ŝ i the daily aounts that the threat-based algorith spends when the exchange rate sequence is ˆσ k LEMMA 7 For all 1 i k, ŝ i 1/k PROOF It is readily seen, by Lea 5, that ŝ 2 ŝ 3 ŝ k The proof is copleted by showing that ŝ 1 1/k as follows We substitute the expression of r k) fro 16) for r in 8) That is, ŝ 1 1 r p r k) k) p

17 Optial Search and One-Way Trading Online Algoriths 117 p + k 1) p kp /p + k 1)) kp p p + k 1) p p ) kp p )p + k 1)) 1 k Thus, against the worst-case) exchange rate sequence ˆσ k, the threat-based algorith obeys the conventional wisdo of investent advisers by eploying a dollar-cost averaging strategy, in which an equal nuber of dollars is invested each day The next lea yields a ore inforative characterization of r k) LEMMA 8 21) r k) is the unique solution, r, of ) ) r 1) 1/k r k 1 M PROOF 22) First we show that r k) k 1 ) ) ˆp1 1/k 1) M Consider forula 10) for s i, i > 1 We already know that ŝ i 1/k Therefore, using 20) we obtain 1 k 1 r k) 1 r k) ˆp i ˆp i 1 ˆp i 1 ˆp1 M ) ) 1/k 1) This proves 22) Using 8) we derive the following expression for ˆp 1 : ˆp 1 rk) k 1) 23) k r k) which is obtained when we solve the equation 1/k 1/r k) ) ˆp 1 r k) )/ ˆp 1 )) for ˆp 1 We now substitute the expression for ˆp 1, 23), in 22) and learn that r k) is the solution of the following equation: kr r k) k) ) 1/k 1) ) 1) 24) k 1 k r k) )M ) Starting with 24), the following sequence of equivalent equalities copletes the proof of the lea: 25) r k) kr k) ) 1/k 1) 1) k k, k r k) )M )

18 118 R El-Yaniv, A Fiat, R M Karp, and G Turpin k r k) k k r k) kr k) ) 1) k k r k) )M ) r k) ) 1/k 1) M kr k) ) 1/k 1) 1), k r k) )M ) kr k) ) k/k 1) 1), k r k) )M ) kr k) ) 1/k 1) 1) k r k) )M ) Notice that the right-hand side of 25) is identical to the exponentiated ter of 24) The lea is coplete by using 24) while substituting the left-hand side of 25) for this ter Consider the representation of r k), 21) It is clear that r k) < M/ since the copetitive ratio M/ is attained by the trivial strategy that trades all dollars in the iniu possible rate,, and the threat-based algorith certainly perfors strictly better Hence, r 1)/M ) r 1)/M/ 1) <1, and then it is not hard to see that r k) is strictly increasing with k Therefore, we ust take the pessiistic assuption that k n This yields the following corollary that gives the best attainable copetitive ratio, r n, M), that the threat-based algorith can attain for an n-day conversion gae COROLLARY 4 26) r n, M) is the root, r, of the equation ) ) r 1) 1/n r n 1 M To suarize, we have two ethods of calculating r n, M): Solve dr n) p 1 )/dp 1 0 for its root e as in 17)) and then substitute it into 15) Solve 26) for r The next theore states that r n, M) is the best copetitive ratio that a one-way trading algorith can achieve for the known duration case with n trading days THEOREM 5 Let, M, and n be given Then r n, M) is the lowest possible copetitive ratio for a known duration one-way trading gae with known and M) PROOF Let ALG be any deterinistic algorith different fro the threat-based algorith Using an adversary arguent we show that ALG cannot achieve a ratio saller than r n as defined in 26)) Let ˆσ n ˆp 1, ˆp 2,, ˆp n be the exchange rate sequence that axiizes rp 1, p 2,,p n ) for an n-day gae see the discussion after Lea 6) On the first day we present ˆp 1 to ALGIfALG spends less than 1/n dollars on this rate, then we end the gae Therefore, ALG ust convert the reaining dollars with the iniu possible rate, If this is the case, ALG cannot achieve a ratio saller than r n ; siply because ˆp 1 is chosen such that 1/n is the inial aount that should be spent to guarantee the ratio r n Therefore, we assue that ALG spends on the first day an aount s 1 1/n In this case we continue the gae and present ALG with the next rate, ˆp 2 In general, if

19 Optial Search and One-Way Trading Online Algoriths 119 at the end of the ith day the total aount in dollars that ALG spent is less than i/n we iediately end the gae Otherwise, we continue and present ALG with the next rate, ˆp i+1, etc Let j be the iniu i such that at the end of the ith day, the total aount spent by ALG so far is less than i/n Denote by s i the aount spent by ALG on the ith day, 1 i j Since the gae proceeded to the jth day we know that 1 n s 1, 2 n s 1 + s 2, j 1 n j 1 s i i1 However, by the choice of j, j n > j s i i1 Therefore ALG could have gained ore by spending exactly 1/n on each of the first j 1 days and by spending s j s j + j 1 i1 s i j 1)/n) at the higher rate, ˆp jevenif this is the case, since s j < 1/n, ALG could not guarantee a copetitive ratio of r n since ˆp j is chosen such that exactly 1/n dollars should be spent on the jth day to attain a ratio of r n It follows then that ALG ust coincide with the threat-based algorith, achieving a ratio of r n, or otherwise ALG incurs a higher ratio on this exchange rate sequence REMARK 6 With respect to the proof of Theore 5, notice that the adversary ay end the gae after any day, i, provided that the total aount spent by ALG is less than or equal to i/n For exaple, if ALG spends exactly 1/n dollars on the first day, then by dropping the rest of the sequence to, the adversary forces a copetitive ratio of r n on ALG Thus, there are exactly n types of worst-case sequences against the threat-based algorith Naely, the sequences ˆp 1, ˆp 2,, ˆp i,,,,, i 1, 2,,n } {{ } n i Of course, the adversary ay use other rates saller than ˆp i instead of all the s on the last days, except for the very last day) REMARK 7 It is easy to extend the proof of Theore 5 to the case of randoized algoriths against oblivious adversaries All that is needed is to note that an oblivious adversary can calculate the expected aounts that the algorith will spend on each trading day Then the proof is analogous to the proof of Theore 5 Nevertheless, we already know fro Corollary 2 that randoization cannot help in one-way trading

20 120 R El-Yaniv, A Fiat, R M Karp, and G Turpin 42 A Gae Against a Lenient Adversary As can be seen in the proof of Theore 5, the adversary can always force a copetitive ratio of r n, M) on any algorith Nevertheless, for any practical purpose, it is ost likely the case that we will confront a ore lenient adversary one which deviates fro the worst-case sequence of exchange rates In this section we describe an algorith that always perfor as well as the previous algorith However, on soe exchange rate sequences, those which are not worst-case, the new algorith strictly iproves the offline to online ratio At the start of each trading day, the online player knows the nuber of reaining days, n n and is presented with an exchange rate, x In addition, the player already accuulated Y 0 yen and has D 1 dollars reaining At this stage, the online player can calculate the best attainable copetitive ratio for the reaining days given x, and use it to deterine the aount of dollars to be spent The idea is siply to assue that the current day is the first trading day of an n -day trading period and that the rest of the rates will be chosen by an adversary ie, to axiize the copetitive ratio) Since we consider x to be a first day rate we denote it by p 1 and siilarly, we denote the rest of the worst-case exchange rates by p i, i 2, 3,,n Also, the worst-case) daily transactions will be denoted by s i GivenD, Y, n, and p 1 we now derive a forula for r, the best attainable ratio fro this stage onward, as well as forulas for the s i Note that for usage the online player need only know the quantity s 1 An application of 4) with i 1 yields 27) s 1 p 1 r Y + D) r p 1 ) For i > 1 we obtain fro 10) 28) s i 1 r p i p i 1 p i Since the aounts to be spent su up to D we have n D s 1 + s i i2 p 1 r Y + D) r p 1 ) + 1 r n i2 p i p i 1 p i Solving for r, r p 1 Dp 1 + Y [ 1 + p 1 p 1 n i2 p 1 Dp 1 + Y r n ) p 1,,p n ), p i p i 1 p i ] where r n ) ) is defined by 12) with k n ) Thus, the best ratio, r, is siply written as a noralization of the best ratio for a regular n -day gae D 1, Y 0) with future rates p 2, p 3,,p n To deterine the optial ratio at this stage, we ust optiize over

21 Optial Search and One-Way Trading Online Algoriths 121 all possible future exchange rates Notice however that we need not axiize over p 1 since it is already given Hence, we apply Lea 5 to obtain r r p 1, n, D, Y,, M) def p 1 Dp 1 + Y r n ) p 1 ), where r n ) p 1 ) is given by 15) The iproved, adaptive algorith ay be suarized as follows: Given an exchange rate x when there are l trading days reaining l >0), the online player with D dollars and Y yen calculates r r x,l,d, Y,, M) Ifx r, then the online player akes no transaction see Reark 5) Otherwise, the online player trades s 1 equation 27)) dollars to yen We now exeplify how this adaptive algorith takes advantage of opportunities encountered in the trading period ie, deviations fro the worst-case exchange rate sequence) In this exaple, let n be an arbitrary nuber of days 2), and suppose that the first exchange rate we encounter is the axiu possible rate, M Suppose also that at this stage the algorith holds D dollars and Y yen In contrast to the worst-case algorith described in the previous section, we shall see that the adaptive algorith identifies this opportunity and trades all available D dollars on this fortunate) exchange rate First, by 15), r n ) M) 1, so r M/DM + Y ) Hence, )/ ) s 1 MY + D) MM ) M DM + Y DM + Y MDM ) MM ) D REMARK 8 In general, it can be shown that when using this iproved algorith, the sequence of ratios r that is calculated by the online player in this anner is nonincreasing and if the adversary always deviates fro the worst possible sequence, then the sequence of calculated ratios, r, is strictly decreasing 43 Analysis of Variant 2: Unknown Duration with, M Known Since in this variant the nuber of trading days is not given to the online player, he ust consider an arbitrarily large nuber of days Define r, M) def li n r n, M) Notice that r n is onotone increasing with n Therefore, r is larger than r n for any n and therefore, by Lea 3 the threat-based algorith calculated with r A r )is r -proper for any input sequence σ and therefore r is an attainable copetitive ratio for any finite trading period On the other hand, as r n is the lower bound for each n-day trading gae, the lower bound for Variant 2 approaches fro below) r, M) since the adversary ay choose arbitrarily large n

22 122 R El-Yaniv, A Fiat, R M Karp, and G Turpin Using eleentary calculus we calculate r as follows Using the abbreviation P r 1)/M ) we calculate the liit li n n 1 P 1/n ) li n r n, M) Notice that n 1 P 1/n ) 1 P 1/n )/1/n),sobyL Hôpital s rule li n 1 n P1/n ) Hence, r, M) is the unique solution, r,of P 1/n ln P/n 2 li n 1/n 2 li n P1/n ln P ln P 29) r ln M r 1) It is not hard to see that r ln ϕ) where ϕ M/ 44 Analysis of Variant 3: Known Duration with ϕ Known Here, the online player knows only the quantity ϕ M/ but not the actual bounds on possible exchange rates, and M Notice that the inforation about the iniu possible rate available to the online player varies online A siple observation is that at the ith day the iniu possible rate at this stage) is p i /ϕ; here we assue that p i is an eleent of the initial segent of exchange rate axia Therefore, as in the analysis of the second variant, we now ake use of 4) and 5) specializing the to the case in which the iniu possible rate is p i /ϕ as inferred fro the above observation First, fro 5) we have Y i + D i p i ϕ p i r Solving for D i we obtain 30) 1 D i ϕ r Y ) i p i Then, fro 4) we obtain 31) s i p i ry i 1 + D i 1 p i /ϕ) r p i p i /ϕ) Since Y 0 0 and D 0 1, we have for the case i 1, 32) s 1 ϕ r r ϕ 1) Consider 30) for the case i 1 and substitute it for D i 1 in 31) After soe siplification the resulting equation can, for i > 1, be written as s i Y i 1ϕ 1 ϕ 1 1 ) 33) p i 1 p i

23 Optial Search and One-Way Trading Online Algoriths 123 By definition, Y i Y i 1 + p i s i If we use 33) to substitute for s i we obtain the following recurrence relation for Y k, k > 1: 34) Y k Y k 1 + p k s k Y k 1 + p ky k 1 ϕ 1 ϕ 1 1 ) p k 1 p k ) 1 Y k 1 ϕ 1 p k ϕ 1 p k 1 Recall that the base case for this recurrence relation is given by Y 1 s 1 p 1 Using 32) we obtain 35) 1 Y k Y 1 ϕ 1 ) k 1 k i2 ϕ p ) 1ϕ r) 1 k 1 rϕ 1) ϕ 1 ) p i 1 p i 1 k i2 ϕ ) p i 1 p i 1 When k is known to the online player, the optial online algorith ust convert all dollars by the end of the kth day Therefore, D k should equal 0 Thus, using 30), 1 ϕ r Y ) k 0 p k Hence, r p k /Y k, and if we substitute 35) for Y k we obtain r p k Y k p k /p 1 ϕ r)/rϕ 1)) 1/ϕ 1)) k 1 k i2 ϕ p i/p i 1 ) 1) After solving for r and siplifying we obtain 36) r r k) p 1, p 2,,p k ) def p k /p 1 ) ϕ 1) k ϕ k i2 ϕ p i/p i 1 ) 1) Hence, it reains to calculate LEMMA 9 For fixed p 1 and p k, r n ϕ) def ax r k) p 1,,p k ) k n, p 1 <p 2 < <p k ax r k) p 1, p 2,,p k ) p 1 <p 2 < <p k occurs when, for every 2 j k, p j p j 1 pk p 1 ) 1/k 1)

24 124 R El-Yaniv, A Fiat, R M Karp, and G Turpin PROOF If we fix p 1 and p k in r k) p 1, p 2,,p k ) it only reains to axiize P k i2 ϕ p i/p i 1 ) 1) First notice that since ϕ 1 and 0 < p 1 < p 2 < < p k, every ter in P is positive Now, for any 2 j k 1, p j contributes to the product P only in the ultiplication of two ters which we abbreviate by A j : A j ϕ ) ) p j 1 ϕ pj+1 1 p j 1 p j Consider da j ϕ p2 j p j+1 p j 1 ) dp j p j 1 p 2 j Clearly, p j p j 1 p j+1 ) 1/2 is a root of da j /dp j 0 In addition, d 2 A j /dp 2 j )p j ) is negative Therefore, for fixed p j 1 and p j+1, A j is axiized when p j p j 1 p j+1 p j pj+1 p j 1 ) 1/2 It follows then that P is axiized when for every 2 j < k, p j /p j 1 p j+1 /p j We denote this ratio by ρ Thus, and ρ p k /p 1 ) 1/k 1) ρ k 1 p 2 p 1 p3 p 2 p k p k 1 p k p 1 As a direct conclusion of Lea 9 r k) p 1, p 2,,p k ) can be rewritten as r k) p k ) where 37) r k) p k ) def p k /p 1 ) ϕ 1) k ϕ n i2 ϕ p k/p 1 ) 1/k 1) 1) ϕ p k /p 1 ϕ 1) k ϕ pk /p 1 ) 1/k 1) 1 ) k 1 By taking the derivative of r k) p k ) with respect to p k, it can be seen that for every ϕ>1, r k) p k ) increases with p k,soletp k take its axiu value p 1 ϕ to obtain 38) r k) def p 1 ϕ/p 1 ) ϕ 1) k ϕ ϕ p 1 ϕ/p 1 ) 1/k 1) 1) ) k 1 ϕ 1) k ϕ 1 ϕ k/k 1) 1 ) k 1 The final step to establish the best attainable copetitive ratio for this variant is to optiize r k) with respect to k LEMMA 10 r k) is onotone increasing with k

25 Optial Search and One-Way Trading Online Algoriths 125 PROOF Set f k) def ϕ 1) k ϕ k/k 1) 1 ) k 1 and gk) def ϕ k+1/k 1 ) k ϕ 1) k By showing that for all k 2 and ϕ>1, f k) f k + 1) is positive, we shall prove that f k) is onotone decreasing By considering 38), this will readily prove that r k) is onotone increasing with k 39) f k) f k + 1) ϕ 1) k ϕ k/k 1) 1 ) ϕ 1)k+1 k 1 ϕ k+1)/k 1 ) k ϕ 1) 1 gk 1) 1 gk) ) Showing that f is decreasing is therefore equivalent to showing that g is an increasing function Since log is an increasing function, it is sufficient to show that loggk)) is increasing Set y def 1/k and ht) def logϕ 1+t 1) Then ϕ 1+1/k ) 1 loggk)) k log ϕ 1 klogϕ 1+y 1) logϕ 1)) hy) h0) y Since k is decreasing in y, we need to show that hy) h0))/y is a onotone decreasing function of y This is established in two steps: i) hy) is a strictly concave function; ii) hy) h0))/y is a decreasing function We first show that ii) follows fro i) If h is strictly concave, then h ty + 1 t)x) > t hy) + 1 t) hx) for all t in 0, 1) and x y such that hx) and hy) are defined Take x 0 to obtain for y > 0 This yields hty)>t hy) + 1 t) h0) hty) h0) ty > hy) h0), t 0, 1), y which proves ii) To prove i) we show that h y) is a decreasing function We differentiate h: ϕ 1+y h y) logϕ) ϕ 1+y 1

26 126 R El-Yaniv, A Fiat, R M Karp, and G Turpin We write z ϕ 1+y and then h y) logϕ)z/z 1) Since z/z 1) is a decreasing function of z in the range z > 1, and since z is an increasing function of y, it follows that h y) is strictly decreasing It is well known that this iplies that h is concave This establishes i) A direct conclusion of Lea 10 is that the adversary will choose k to be n and we obtain the following: THEOREM 6 r n ϕ) ϕ1 ϕ 1) n /ϕ n/n 1) 1) n 1 ) 45 Analysis of Variant 4: Unknown Duration with ϕ Known Here, analogously to Variant 2, the best attainable copetitive ratio is r ϕ) def li r nϕ) n Using eleentary calculus it can be shown that ϕ 1) n li n ϕ n/n 1) 1 ) n 1 ϕ 1) exp ϕ ln ϕ ) ϕ 1 Therefore, LEMMA 11 r ϕ) ϕ 1 ϕ 1) exp ϕ ln ϕ )) ϕ 1 ϕ ϕ 1 ϕ 1/ϕ 1) r ϕ) ln ϕ) PROOF We first prove the upper bound,r ϕ) Oln ϕ) Let f x) def x x/x + 1) 1/x We will show that for all x > 1, f x) lnx +1) This shall prove that r ϕ) Oln ϕ) for ϕ>2), since f ϕ 1) + 1 r ϕ) To prove the clai it is sufficient to prove that exp f x)) x + 1, or, in other words, that e x expx/x + 1) 1/x ) x + 1 This is equivalent to showing that So it is sufficient to prove that 1 x + 1 ex 1 x + 1) 1/x e exp exp 1 x + 1) 1/x 1 x + 1) 1/x )) x ))

27 Optial Search and One-Way Trading Online Algoriths 127 Set a 1/x + 1) 1/x We need, then, to show that gx) def e a ea is nonnegative for all x > 1 This can be established by differentiation We shall show that g is negative, so g is decreasing Then it can be shown that li x gx) 0 and also it is easy to verify that g1) e e/ ) This will coplete the proof It reains to show that g < 0 g x) ax lnx + 1) + lnx + 1) x) ea e) x 2 x + 1) It is not hard to verify that x lnx + 1) + lnx + 1) x is positive for exaple, at x 1 the value of this expression is > 1 3 ) Set hx) ea e We will show that h is negative in the interval 1, ) and this will prove that g < 0 We differentiate h: h x) ea ax lnx + 1) + lnx + 1) x) > 0 x Therefore, h is increasing and it can be shown that li x hx) 0 Hence, h is negative in the interval 0, ) This proves the upper bound For the lower bound, recall that ϕ M/ It is clear that for each n 2, r n, M) r n ϕ) Hence, r ϕ) r, M) ln ϕ) 5 Nuerical Exaples of Copetitive Ratios of Search and One-way Trading Algoriths In this section we provide soe nuerical exaples of copetitive ratios attained by soe of the algoriths discussed so far Consider Table 1 Clearly, the optial threat-based algorith for the unknown duration case with and M known is always significantly better than all other algoriths Notice that the deterinistic reservation price policy RPP is better than algorith EXPO for sall values of ϕ, but the growth rate of EXPO s copetitive ratio is approxiately the logarith of the growth rate of the copetitive ratio of RPP In general it is not hard to show that the liit of the ratio of EXPO s copetitive ratio to the threat-based copetitive ratio is 1/ln With respect to the known duration case, it is interesting to consider the rate of increase of the optial copetitive ratio as a function of the nuber of trading days nit is not hard to see that the optial copetitive ratio grows very quickly to its asyptote Nevertheless, there is still an advantage in playing short gaes For instance, already at the n 20th period r n 1, 2) alost reaches its asyptote, r 1, 2) 1278 which is equivalent to guaranteeing 782% of the optial offline return), at n 10 the ratio achieved is %), and at n 5 the ratio is %) 6 One-Way Trading Against Nature Let µ be the axiu value that the exchange rate will assue In this section we define and study a one-way trading gae in which the online player knows the probability distribution of µ, and this distribution is chosen by an adversary This odel is typically referred to as a gae against Nature see [4], [26], and [12]) The result in this section reveals an interesting relationship between this gae against Nature and the results of previous sections At the outset it ay appear

28 128 R El-Yaniv, A Fiat, R M Karp, and G Turpin Table 1 Nuerical exaples of copetitive ratios for soe search and one-way trading algoriths unknown duration) Value of ϕ Algorith RPP, M known) EXPO only ϕ known) THREAT only ϕ known) THREAT, M known) Or and M known that Nature is weaker than the oblivious adversary since Nature chooses its policy based solely on the proble paraeters whereas the oblivious adversary knows and akes use also of the online strategy Moreover, Nature has to declare its strategy before the start of the gae whereas the oblivious adversary keeps its strategy secret and reveals it only pieceeal online Nevertheless, we shall see that the online player does not gain ore power against Nature and in fact the copetitive ratios of the strategy against the oblivious adversary and Nature are exactly the sae We now define the new gae ore precisely In contrast to the previous analyses we consider here a continuous tie odel Fix and M and let F be a cuulative distribution function of µ; that is, Fx) Pr[µ <x] Assue that the support of F is in [, M] Let F denote the set of all such cuulative distribution functions REMARK 9 Notice that our definition of F is slightly different fro the conventional one Usually, a cuulative distribution function F with support [a, b] is any real function that satisfies: i) for any x in [a, b], Fx) is nonnegative; ii) Fa) 0 and Fb) 1; iii) F is nondecreasing over [a, b]; and iv) F is right-hand continuous in the open interval a, b) Thus, for each x, y [a, b], with a < x < y, Fy) Fx) is the probability that a nuber is chosen in x, y], and Fy) Fa) is the probability that a nuber is in [a, y] In our forulation, for each x, y [, M] with x < y < M, Fy) Fx) is the probability that a nuber is in [x, y) and FM) Fy) is the probability that a nuber is in [y, M] Thus, our cuulative distribution functions are left-hand continuous in the open interval, M) The usefulness of this definition in our context is twofold First it will siplify soe of the calculations More iportantly, it will be essential later to guarantee the existence of Stieltjes integral when the integrand is a probability distribution function of this type left-hand continuous) and the integrator is an ordinary right-hand continuous) probability distribution function For each µ [, M] consider the following exchange rate function, E µ :[, M] R[, M], { E µ t) def t, if t µ,, if t >µ Thus, E µ is increasing to a global axiu µ and then drops to For any trading algorith ALG, and F F, let P ALG F) denote the expected return of ALG with respect

29 Optial Search and One-Way Trading Online Algoriths 129 to F when the algorith starts with one dollar and trades its dollars in accordance with an exchange rate function E µ where µ is a rando nuber chosen with probability distribution F Later, in Reark 11 we justify this choice of E µ Given any F and any online algorith ALG, we easure the perforance of ALG by its return ratio against F, r ALG F,, M), which is defined as r A F,, M) def P OPTF) P ALG F) Thus, the online player and the adversary s goals are, respectively, to iniize and to axiize the online algorith s return ratio against F With respect to a distribution function, F, we say that an online algorith is optial if no other online algorith attains a saller return ratio against F The new gae is suarized as follows: Nature chooses a probability distribution F F, so as to axiize the return ratio of the best online algorith against F The function F is then ade known to the online player Based on F, the online player chooses his best online trading algorith, ALG Nature chooses a rando nuber, µ with cuulative distribution F), which reains unknown to the online player The gae is played: the online algorith ALG against the exchange rate function E µ The ain theore we prove states that the sallest copetitive ratio that the online player can achieve, for Variant 2, r see Section 43), is equal to the largest return ratio that the adversary can force by choosing a probability distribution for the axiu exchange rate THEOREM 7 r, M) ax F in A r A F,, M) Before attepting to prove Theore 7, the question that we ask is: What is the online algorith that axiizes the return ratio against a given F? In order to answer this question we now reduce the class of candidates fro all possible continuous) algoriths to the sall class of reservation price policies see Section 13) Naely, for each x [, M], the reservation price policy RPPx) is an online trading algorith that trades all dollars at exchange rate x if the exchange rate function ever rises to the rate x It follows by definition) that if the exchange rate function never reaches x, RPPx) trades all dollars at rate It is not hard to see that for any F F, the expected return of RPPx) is P RPPx)F) xf c x) + Fx), where F c x) def 1 Fx) Siilar to the discrete tie setup we denote by D a continuous tie trading function algorith) Consider D c x) def 1 Dx) By the properties of D we have: i) D c : [, M] [, M]; ii) D c ) 0, D c M) 1; iii) D c is nondecreasing; and iv) D c is right-hand continuous Hence, D c is a cuulative distribution function with support [, M]

30 130 R El-Yaniv, A Fiat, R M Karp, and G Turpin Let D be the set of all such functions D and let D c be the set of all D c with D D For each G D c we can use G as a trading algorith in the two following ways: Use G c as an ordinary) deterinistic trading algorith Use G as a randoized algorith, viewed as a probability distribution over threshold algoriths Specifically, Gx) is the cuulative probability of choosing one of the algoriths, RPPs), s [, x] It is straightforward to show that these two algoriths are equivalent in the sense that when played against a particular distribution function, they exhibit the sae expected returns Let G D c For any F F, when G is used as a randoized algorith, its expected return with respect to F is R 1 F, G) xf c x) + Fx) ) dgx) On the other hand, as a deterinistic algorith G c ) its expected return is x ) R 2 F, G) udgu) + [1 Gx)] dfx) We note that since G is right-hand continuous and F is left-hand continuous, and since both G and F are of bounded variation, then both R 1 and R 2 exist LEMMA 12 For each F F and G D c, R 1 F, G) R 2 F, G) PROOF R 1 G, F) R 2 G, F) x1 Fx)) dgx) + x x x ) udgu) dfx) + ) udgu) dfx) + Fx) dgx), dfx) Gx) dfx) 1 Fx) dgx) ) udgu) dfx) + Fx) dgx) Hence, it is sufficient to prove that x ) 40) udgu) dfx) x1 Fx)) dgx) For any positive integer n, let π n be the following subdivision of the interval [, M]: x 0 < x 1 < < x n M, where x i + im )/n, i 0, 1,,n With respect to π n we write particular Stieltjes sus for both integrals of 40) These sus turn out to be identical For each )

31 Optial Search and One-Way Trading Online Algoriths i n, set g i Gx i ) Gx i 1 ) The su ) n i 1 S n x j g j [Fx i ) Fx i 1 )] i1 is a Stieltjes su of the left-hand integral of 40), whereas the su n T n [x i x i Fx i )] g i j1 i1 is a Stieltjes su of the right-hand integral of 40) S n [Fx 2 ) Fx 1 )] x 1 g 1 + [Fx 3 ) Fx 2 )] x 1 g 1 + x 2 g 2 ) + [Fx 4 ) Fx 3 )] x 1 g 1 + x 2 g 2 + x 3 g 3 ) + + [Fx n 1 ) Fx n 2 )] x 1 g 1 + x 2 g 2 + +x n 2 g n 2 ) + [Fx n ) Fx n 1 )] x 1 g 1 + x 2 g 2 + +x n 2 g n 2 + x n 1 g n 1 ) n 1 n 1 x i g i x i g i Fx i ) i1 i1 n 1 x i x i Fx i )) g i i1 However, Fx n ) FM) 1, so x n g n Fx n )x n g n, and S n T n By definition, as n, S n and T n approach R 2 F, G) and R 1 F, G), respectively One conclusion of Lea 12 is that the online player ay only consider ixtures of reservation price policies as candidates for optial algoriths against F The next lea states that the online player ay restrict his attention only to deterinistic) reservation price policies LEMMA 13 Let G D c be any distribution reservation price policy RPPs) Then, for every ε>0, and for every F F, there exists a nuber s [, M] such that P RPPs )F) P G F) ε PROOF Let ε>0begiven P G F) P RPPx)F) dgx) Let s be a nuber in [, M] such that P RPPs )F) sup x xf c x) + Fx) ) dgx) P RPPx)F) ε

32 132 R El-Yaniv, A Fiat, R M Karp, and G Turpin Therefore, for all x [, M], P RPPs )F)+ε P RPPx)F) For any distribution function, G, P RPPs )F) + ε P RPPs )F) + ε ) 1 dgx) PRPPs )F) + ε ) dgx) P RPPx)F) dgx) Hence, P RPPs )F) + ε sup P RPPx)F) dgx) G D c Let I s F be the cuulative distribution function { 0, if x < s I s x), 1, if s x M; sup P RPPx)F) dgx) P RPPx)F) di s x) P RPPs )F) G D c Therefore, sup P RPPx)F) dgx) ε P RPPs )F) sup P RPPx)F) dgx) G D c G D c Thus, the proof is coplete REMARK 10 In the case where ax x P RPPx)F) exists we obtain the stronger result P RPPs )F) ax P RPPx)F) dgx), G D c where s is a nuber in [, M] such that P RPPs )F) ax P RPPx)F) x M For convenience, we assue for the rest of the section that ax x P RPPx)F) exists Thus, the results we obtain through consideration of the optial perforance of deterinistic threshold algoriths are liits of the actual bounds PROOF OF THEOREM 7 By Lea 13, it is sufficient to consider only reservation price policies as candidates for the optial online algorith against F Let x be the value of x at which the quantity Fx) + xf c x) is axiized Thus, given F, RPPx ) is an optial online algorith against F

33 Optial Search and One-Way Trading Online Algoriths ) We want to calculate the quantity ax F P OPT F) P RPPx )F) ax F E[µ] Fx ) + x F c x ) Consider the proble of axiizing E[µ] subject to the constraint Fx ) + x F c x ) z, where z is a paraeter to be deterined later The constraint is equivalent to the following condition: for all x [, M], 42) or, equivalently, Fx) + xf c x) z, 43) F c x) z x Notice that F c M) 0 and FM) 1) Hence, by substituting M for x in 42) we learn that z Then E[µ] xdfx) M FM) F) M Fx) dx z + z + z z z z 1 Fx)) dx F c dx F c dx + 1 dx + F c dx z x dx z z F c dx F c dx Fx) dx z + z ) ln M z By the above derivation, it is evident that E[µ] can be axiized, while still satisfying the constraint 43), by taking 0, if x M, F c z x), if z < x < M, x 1, if x z

34 134 R El-Yaniv, A Fiat, R M Karp, and G Turpin For such F c x), E[µ] z + z ) ln M z Set gz) def z + z ) lnm )/z )) z Hence, by the choice of F c x) and by the definition of z, E[µ] gz) Fx ) + x F c x ), so we can calculate 41) by axiizing gz) Using eleentary calculus we show that gz) is axiized at z lnm )/z )) By differentiation, and g z) z + lnm )/z )) z 2, g 1 z) zz ) + 2z 2 gz) ln M ) z Therefore, g z ) 0, and it can be verified that g z ) 1/z z ) Hence, z axiizes g Let r denote ax F in RPPx)F,, M) Then r is deterined by evaluating gz ) A brief calculation shows that r lnm )/z )) lnm )/r )) z r follows fro the identity z lnm )/z )) The proof is copleted since r is identical to r, M) see 29)) Notice that the proof of Theore 7 is constructive; it explicitly yields the probability distribution, F, that axiizes the return ratio; naely, for r x < M, F c r )/x ) and F is discontinuous at M, where the ass r )/M ) is concentrated It turns out that with respect to such F, all reservation price policies yield the axiu possible expected return, r As we defined this trading gae, the online player chooses his best strategy before the start of the gae and is not allowed to change it thereafter However, as the exchange rate varies, the online player s estiate of µ also varies Assue that if the axiu rate observed so far is s, then the conditional distribution of µ given the history of E is obtained siply by excluding all values of µ less than s, and noralizing the relative probabilities of values greater than or equal to s That is, this conditional distribution has the cuulative distribution function, F s, given by 44) F s x) def Fx) Fs), x s, 1 Fs) 0, x < s It is not hard to see that if the online player chose the optial threshold algorith RPPx ) before the start of the gae, then the optial threshold, x, reains fixed throughout the

35 Optial Search and One-Way Trading Online Algoriths 135 gae independent of the ever-changing estiate of µ To see this, we write the expected return using soe threshold x given that the axiu rate observed so far is s < M Clearly, this expected return is 45) F s x) + xfs c x) Fx) + xfc x) Fs) 1 Fs) 1 Fs) It is evident that the sae x axiizes 45) and P RPPx)F) so the threshold reains fixed REMARK 11 We note that it is possible to reove the assuption that the exchange rate function is of a particular nature, except, of course, the requireent that the function reaches the rando) global axiu µ Siply, if the adversary chooses any other kind of exchange rate function eg, with discontinuities over [0,µ]), the expected return of the online player ay only increase if he uses a reservation price policy The optial offline expected) return reains the sae On the other hand, the online player cannot hope for higher returns since the adversary knowing the algorith chosen by the online player) ay choose the function E µ against which it is shown that reservation price policies can attain optial returns 7 Two-Way Trading In this section we apply soe of our results for one-way trading to the two-way trading proble where the player is allowed to convert the oney back and forth between the two currencies Two-way trading is a special case of the ore general portfolio selection proble In this proble a trader reallocates online his wealth between a nuber N of assets or other investent instruents) in order to take advantage of the relative fluctuations between the various assets The special case of N 2 where one of the assets is cash corresponds to the two-way trading proble There is a considerable body of work related to two-way trading and portfolio selection Fro the perspective of copetitive analysis, there are a nuber of results which are soewhat related to the results presented in this section For exaple, Raghavan [27] and Chou et al [9], [10] study an online two-way trading proble against statistical adversaries, which ust produce exchange rate sequences that confor to soe statistical constraints Cover and Ordentlich [13], [25], Helbold et al [18], and Blu and Kalai [6] study the general portfolio selection and give algoriths which are copetitive relative to a constrained optial offline algorith In particular, they copare their online algorith to the best offline) constant rebalanced algorith that ust keep a fixed proportion invested in each of the N assets In this section we study the two-way trading proble with respect to the onipotent optial offline algorith still however we keep the constraint that prices are drawn fro a bounded support) We first state the proble ore forally and then give preliinary lower and upper bounds on the copetitive ratio of online algoriths for this proble Both the lower and upper bounds are obtained siply by a decoposition of the exchange rate sequence into onotone increasing/decreasing segents on which we can apply our one-way trading results The online player starts with soe D 0 dollars here again, without loss of generality 1) and converts back and forth between dollars and yen in accordance with D 0

36 136 R El-Yaniv, A Fiat, R M Karp, and G Turpin a sequence of exchange rates σ p 1, p 2, which is revealed online These rates yen/dollar) ust reain in the interval [, M], but otherwise ay rise or fall arbitrarily When the gae ends, the oney is all converted to one of the currencies, say, dollars, at the present rate Note that the ratio of the aount accuulated by the optial offline algorith on this sequence of exchange rates to the aount accuulated by the online player is the sae, no atter which currency they convert to when the gae ends As in the one-way trading proble, the online player s goal is to iniize the copetitive ratio If the nuber of local axia and inia in the exchange rate sequence is unbounded, there is no strategy with a finite copetitive ratio see the lower bound arguent in Section 72) Assue there are k such extrea We show a lower bound of r k/2 and an upper bound of r k where r r, M) is the optial copetitive ratio for a one-way gae with an unbounded nuber of days see Section 43) 71 Upper Bound Assue that k is even The sequence σ of exchange rates consists of k/2 upward runs and k/2 downward runs The optial algorith for the offline player is to convert all his dollars to yen at the end of each upward run, and all his yen to dollars at the end of each downward run We describe how the online player can achieve a copetitive ratio of r k Suppose the first upward run consists of p 1 p 2 p i, with p i+1 < p i During the first i days, the online player plays according to our optial one-way algorith with copetitive ratio r ) By the end of the ith day he acquires D i dollars and Y i yen, where D i + Y i p i /r Ondayi + 1 he converts all his dollars to yen Since p i+1, he then has at least p i /r yen at the beginning of the first downward run He then proceeds siilarly during the downward run beginning at day i + 1, converting yen to dollars during the decreasing run and exchanging any reaining yen on the first day of the next increasing run Thus, two transactions occur on the first day of any decreasing run: first, the exchange of all dollars to yen, and second, the first transaction of the one-way algorith on the downward run conversion of yen to dollars) These conceptually distinct transactions can, of course, be cobined into a single transaction Siilarly, on the first day of any subsequent increasing run, these two transactions ay occur In each run the ratio between the offline player s wealth and the online player s wealth increases by at ost the factor r, and thus the online player achieves the copetitive ratio r k Notice that the player does not need to know k In addition, soe iproveents ay be eployed For exaple, if the player has a bound, l, on the axiu length of the upward/downward runs, then he can use the copetitive ratio r l, M) in each oneway gae see Section 41), instead of r, M) For ost real-life price sequences, such a bound l can be identified and is rather sall Moreover, further iproveent in perforance ay be obtained by using the iproved algorith of Section 42 in every one-way gae 72 Lower Bound Assue that the online player knows only and M For any n, it is possible for an adversary to force a copetitive ratio of r n ) k/2 against any online strategy Our arguent here follows fro the lower bound proof of the one-way case Suppose each player starts with one dollar Then, regardless of what strategy the online player

37 Optial Search and One-Way Trading Online Algoriths 137 is eploying, the adversary can construct a sequence of at ost n + 1 exchange rates consisting of an upward run of length n) followed by an iediate drop of the exchange rate to, such that, at the end of the sequence, his total holdings in yen and dollars evaluated at the exchange rate ) will exceed that of the online player by at least the factor r n Moreover, when the exchange rate drops to, the adversary will convert all his yen to dollars, and the online player can do no better than to follow suit, since he will never have a ore favorable conversion rate Thus, in one upward and one downward run, the ratio of adversary currency to online currency can be ade to increase by a factor of r n This yields a factor r n ) k/2 for the entire gae at ost kn + 1)/2 days) As n increases, this lower bound approaches r ) k/2 We point out that the fact that the above lower and upper bounds are exponential in k is soewhat isleading It ay appear worse than it really is The reason is that optial offline returns on sequences with k local inia and axia are exponentially large so that these copetitive ratios do not exclude the possibility of very large exponential) returns for the online player 8 Concluding Rearks In our exaple of one-way trading, a striking feature of the proble is the conceptual siplicity of the optial strategy To attain a certain copetitive ratio, the online player siply defends hiself against the threat of dropping the exchange rate peranently to the iniu possible rate It would be interesting to identify other probles in which a threat-based strategy is optial We note that we have identified another interesting proble that exhibits this kind of solution Consider the following proble called trading on option: A oney trader starts with D 0 dollars and receives a finite sequence of option offers Each option offer consists of a pair e, p), where e is an exchange rate and p > 0isan option price For any s 0 this offer enables the trader to pay ps dollars for the right to later trade s dollars for yen at the exchange rate e The trader knows in advance that, even without purchasing options, he will always be able to exchange dollars for yen at the rate, and that the axiu exchange rate he will ever be offered is M As each offer e, p) is presented, the trader chooses a corresponding value s and his stock of dollars is depleted by ps At the end of the sequence of offers the trader converts his reaining dollars to yen by exercising soe of the options he has purchased and by exchanging any reaining dollars at the rate The optial offline strategy is clear; the offline player will choose that option e, p) for which e/p + 1) is greatest and provided that e/p + 1) >) will spend pd 0 /p + 1 dollars for the right to exchange his reaining D 0 /p + 1) dollars for yen at the exchange rate e Under this optial strategy the offline player receives ed 0 /p + 1) yen Intuitively, if the trader can achieve a copetitive ratio of r for this proble, then he can do so using a threat-based strategy of the following for: whenever an offer e, p) is presented, choose the iniu value of s that will ensure that the trader can obtain 1/r)eD 0 /p + 1)) even under the threat that no further option offers will be ade Full analysis of this proble will soon be published in a separate work) This paper leaves a nuber of questions open for future research One intriguing question is that of the true lower/upper bounds on the copetitive ratio of the twoway gae We suspect that a good starting point to investigate this question is to i-

38 138 R El-Yaniv, A Fiat, R M Karp, and G Turpin prove the upper bound which is conjectured to be suboptial An intuitive reason for this conjecture is the following Notice that on any upward downward) run the online player can take advantage of the knowledge that in order to force a ratio r on the following downward upward) run, the adversary ust begin that run with a sufficiently sall large) exchange rate ie, r in the case where the following run is an upward run) It would be of interest to exaine the robustness of our results under soe reallife considerations such as transaction costs and errors in the choice of the paraeters, M, n, and/or ) An iportant issue that requires further study is the sensitivity and the dependence of the trading strategies on the constraining paraeters It is clear that a greedy choice of these paraeters ay result in an unfortunate outcoe However, an ability to estiate this dependence quantitatively allows for soe degree of risk anageent For exaple, consider the case in which the online player underestiates the upper bound on possible exchange rates Say, M cm is the true upper bound where c > 1 Clearly, in the worst possible rate sequence p n 1 M and p n M Therefore, our trading strategy will spend all the available dollars at the second last day and will gain at least M/r n, M) yen On the sae sequence the optial offline player acquires M yen and therefore the attainable copetitive ratio using the incorrect upper bound ay be alost as poor as M/M)RM, n) c r n, M) Acknowledgents We warly thank Allan Borodin, Brenda Brown, Faith Fich, Vassos Hadzilacos, Alex Lee, Charlie Rackoff, Oded Schra, and Hisao Taaki for any useful discussions and coents We are also grateful to the anonyous referees for their coents References [1] M Ajtai, N Megiddo, and O Waarts Iproved algoriths and analysis for secretary probles and generalizations In Proceedings of the 36th Annual Syposiu on Foundations of Coputer Science, pages , 1995 [2] S al-binali The copetitive analysis of risk raking with application to online trading In Prodeedings of the 38th Annual Syposiu on Foundations of Coputer Science, pages , 1997 [3] RJ Auann Mixed and behavior strategies in infinite extensive gaes In M Dresher, LS Shapley, and AW Tucker, editors, Advances in Gae Theory, volue 1, pages Princeton University Press, Princeton, New Jersey, 1964 [4] RE Bellan and SE Dreyfus Applied Dynaic Prograing Cabridge University Press, Princeton, New Jersey, 1962 [5] S Ben-David, A Borodin, R Karp, G Tardos, and A Widgerson On the power of randoization in on-line algoriths In Proceedings of the 22nd Syposiu on Theory of Algoriths, pages , 1990 [6] A Blu and A Kalai Universal portfolios with and without transaction costs In Proceedings of the Tenth Annual Conference on Coputational Learning Theory, pages , 1997 [7] A Borodin, N Linial, and M Saks An optial online algorith for etrical task systes In Proceedings of the 19th Annual ACM Syposiu on Theory of Coputing, pages , 1987 For the journal version see [8] [8] A Borodin, N Linial, and M Saks An optial online algorith for etrical task systes Journal of the ACM, 39: , 1992 For the conference version see [7]

39 Optial Search and One-Way Trading Online Algoriths 139 [9] A Chou, J Cooperstock, R El-Yaniv, M Klugeran, and T Leighton The statistical adversary allows optial oney-aking trading strategies In Proceedings of the 6th Annual ACM SIAM Syposiu on Discrete Algoriths, 1995 [10] A Chou, A Shrivastava, and R Sidney On the power of agnitude Unpublished anuscript, May 1995 [11] YS Chow, H Robbins, and D Siegund The Theory of Optial Stopping Dover, New York, 1971 [12] A Condon Coputational Models of Gaes The MIT Press, Cabridge, Massachusetts, 1988 [13] TM Cover and E Ordentlich Universal portfolios with side inforation IEEE Transactions on Inforation Theory, 422), March 1996 [14] A Fiat, RM Karp, M Luby, LA McGeoch, DD Sleator, and NE Young Copetitive Paging Algoriths Technical Report CMU-CS , Carnegie Mellon University, Pittsburg, Pennsylvania, 1988 For the journal version see [15] [15] A Fiat, RM Karp, M Luby, LA McGeoch, DD Sleator, and NE Young Copetitive paging algoriths Journal of Algoriths, 12: , 1991 For the technical report version see [14] [16] PR Freean The secretary proble and its extensions International Statistical Review, 51: , 1983 [17] RL Graha Bounds for certain ultiprocessor anoalies Bell Syste Technical Journal, 45: , 1966 [18] DP Helbold, RE Schapire, Y Singer, and MK Waruth On-line portfolio selection using ultiplicative updates Unpublished anuscript, April 1996 [19] DS Johnson Near-Optial Bin Packing Algoriths PhD thesis, Massachusetts Institute of Technology, Cabridge, Massachusetts, 1973 [20] DS Johnson, A Deers, JD Ullan, MR Garey, and RL Graha Worst-case perforance bounds for siple one-diensional packing algoriths 3: , 1974 [21] AR Karlin, L Rudolph, and DD Sleator Copetitive snoopy caching 31):70 119, 1988 [22] L Levin Personal counication, July 1994 [23] SA Lippan and JJ McCall The econoics of job search: a survey Econoic Inqury, XIV: , June 1976 [24] SA Lippan and JJ McCall The econoics of uncertainty: selected topics and probabilistic ethods In KJ Arrow and MD Intriligator, editors, Handbook of Matheatical Econoics, volue 1, chapter 6, pages North-Holland, Asterda, 1981 [25] E Ordentlich and TM Cover The cost of achieving the best porfolio in hindsight Matheatics of Operations Research, 234): , Noveber 1998 [26] CH Papadiitriou Gaes against nature In Proceedings of the 24th Annual Syposiu on Foundations of Coputer Science, pages , 1983 [27] P Raghavan A statistical adversary for on-line algoriths In LA McGeoch and DD Sleator, editors, On-Line Algoriths, DIMACS Series in Discrete Matheatics and Theoretical Coputer Science, Volue 7, pages Aerican Matheatical Society, Providence, RI, 1992 [28] DB Rosenfield and RD Shapiro Optial adaptive price search Journal of Econoic Theory, 251):1 20, 1981 [29] D Sleator and RE Tarjan Aortized efficiency of list update and paging rules Counications of the ACM, 28: , 1985 [30] AC Yao New algoriths for bin packing Journal of the ACM, 27: , 1980

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Position Auctions and Non-uniform Conversion Rates

Position Auctions and Non-uniform Conversion Rates Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 [email protected] Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument Ross [1],[]) presents the aritrage pricing theory. The idea is that the structure of asset returns leads naturally to a odel of risk preia, for otherwise there would exist an opportunity for aritrage profit.

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

Models and Algorithms for Stochastic Online Scheduling 1

Models and Algorithms for Stochastic Online Scheduling 1 Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: [email protected]

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Data Streaming Algorithms for Estimating Entropy of Network Traffic

Data Streaming Algorithms for Estimating Entropy of Network Traffic Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa [email protected] Rossano Venturini Dept. of Coputer Science, University of Pisa [email protected] ABSTRACT The Elias-ano

More information

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Endogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money

Endogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money Endogenous Credit-Card Acceptance in a Model of Precautionary Deand for Money Adrian Masters University of Essex and SUNY Albany Luis Raúl Rodríguez-Reyes University of Essex March 24 Abstract A credit-card

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Non-Price Equilibria in Markets of Discrete Goods

Non-Price Equilibria in Markets of Discrete Goods Non-Price Equilibria in Markets of Discrete Goods (working paper) Avinatan Hassidi Hai Kaplan Yishay Mansour Noa Nisan ABSTRACT We study arkets of indivisible ites in which price-based (Walrasian) equilibria

More information

OpenGamma Documentation Bond Pricing

OpenGamma Documentation Bond Pricing OpenGaa Docuentation Bond Pricing Marc Henrard [email protected] OpenGaa Docuentation n. 5 Version 2.0 - May 2013 Abstract The details of the ipleentation of pricing for fixed coupon bonds and floating rate

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that Online Appendix I: A Model of Household Bargaining ith Violence In this appendix I develop a siple odel of household bargaining that incorporates violence and shos under hat assuptions an increase in oen

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

HOW CLOSE ARE THE OPTION PRICING FORMULAS OF BACHELIER AND BLACK-MERTON-SCHOLES?

HOW CLOSE ARE THE OPTION PRICING FORMULAS OF BACHELIER AND BLACK-MERTON-SCHOLES? HOW CLOSE ARE THE OPTION PRICING FORMULAS OF BACHELIER AND BLACK-MERTON-SCHOLES? WALTER SCHACHERMAYER AND JOSEF TEICHMANN Abstract. We copare the option pricing forulas of Louis Bachelier and Black-Merton-Scholes

More information

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find: HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations Budget-optial Crowdsourcing using Low-rank Matrix Approxiations David R. Karger, Sewoong Oh, and Devavrat Shah Departent of EECS, Massachusetts Institute of Technology Eail: {karger, swoh, devavrat}@it.edu

More information

Insurance Spirals and the Lloyd s Market

Insurance Spirals and the Lloyd s Market Insurance Spirals and the Lloyd s Market Andrew Bain University of Glasgow Abstract This paper presents a odel of reinsurance arket spirals, and applies it to the situation that existed in the Lloyd s

More information

Binary Embedding: Fundamental Limits and Fast Algorithm

Binary Embedding: Fundamental Limits and Fast Algorithm Binary Ebedding: Fundaental Liits and Fast Algorith Xinyang Yi The University of Texas at Austin [email protected] Eric Price The University of Texas at Austin [email protected] Constantine Caraanis

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

AUC Optimization vs. Error Rate Minimization

AUC Optimization vs. Error Rate Minimization AUC Optiization vs. Error Rate Miniization Corinna Cortes and Mehryar Mohri AT&T Labs Research 180 Park Avenue, Florha Park, NJ 0793, USA {corinna, ohri}@research.att.co Abstract The area under an ROC

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 [email protected] www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna [email protected]

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne [email protected]

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

and virtually all 4-year-olds are now enrolled in education.

and virtually all 4-year-olds are now enrolled in education. MEXICO Attainent rates are steadily increasing Mexico has the highest average annual rate of growth of first-tie upper secondary graduation rates aong OECD countries for which inforation is available.

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

Construction Economics & Finance. Module 3 Lecture-1

Construction Economics & Finance. Module 3 Lecture-1 Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

- 265 - Part C. Property and Casualty Insurance Companies

- 265 - Part C. Property and Casualty Insurance Companies Part C. Property and Casualty Insurance Copanies This Part discusses proposals to curtail favorable tax rules for property and casualty ("P&C") insurance copanies. The syste of reserves for unpaid losses

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Pricing Asian Options using Monte Carlo Methods

Pricing Asian Options using Monte Carlo Methods U.U.D.M. Project Report 9:7 Pricing Asian Options using Monte Carlo Methods Hongbin Zhang Exaensarbete i ateatik, 3 hp Handledare och exainator: Johan Tysk Juni 9 Departent of Matheatics Uppsala University

More information

Modeling operational risk data reported above a time-varying threshold

Modeling operational risk data reported above a time-varying threshold Modeling operational risk data reported above a tie-varying threshold Pavel V. Shevchenko CSIRO Matheatical and Inforation Sciences, Sydney, Locked bag 7, North Ryde, NSW, 670, Australia. e-ail: [email protected]

More information

Project Evaluation Roadmap. Capital Budgeting Process. Capital Expenditure. Major Cash Flow Components. Cash Flows... COMM2501 Financial Management

Project Evaluation Roadmap. Capital Budgeting Process. Capital Expenditure. Major Cash Flow Components. Cash Flows... COMM2501 Financial Management COMM501 Financial Manageent Project Evaluation 1 (Capital Budgeting) Project Evaluation Roadap COMM501 Financial Manageent Week 7 Week 7 Project dependencies Net present value ethod Relevant cash flows

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

Using Generalized Forecasts for Online Currency Conversion

Using Generalized Forecasts for Online Currency Conversion Using Generalized Forecasts for Online Currency Conversion Kazuo Iwama and Kouki Yonezawa School of Informatics Kyoto University Kyoto 606-8501, Japan {iwama,yonezawa}@kuis.kyoto-u.ac.jp Abstract. El-Yaniv

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints Journal of Machine Learning Research 13 2012) 2503-2528 Subitted 8/11; Revised 3/12; Published 9/12 rading Regret for Efficiency: Online Convex Optiization with Long er Constraints Mehrdad Mahdavi Rong

More information

The Virtual Spring Mass System

The Virtual Spring Mass System The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu [email protected] Departent of Coputer

More information

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism The enefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelis Stijn Eyeran Lieven Eeckhout Ghent University, elgiu [email protected], [email protected]

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

Dynamic right-sizing for power-proportional data centers Extended version

Dynamic right-sizing for power-proportional data centers Extended version 1 Dynaic right-sizing for power-proportional data centers Extended version Minghong Lin, Ada Wieran, Lachlan L. H. Andrew and Eno Thereska Abstract Power consuption iposes a significant cost for data centers

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information