Contagion! The Spread of Systemic Risk in Financial Networks
|
|
|
- Isabel Daniel
- 10 years ago
- Views:
Transcription
1 Contagion! The Spread of Systemic Risk in Financial Networks Tom Hurd Tom Hurd (McMaster University) Contagion! 1 / 34
2 1 Systemic Risk Basics 2 Static Cascade Models 3 Random Graph Models 4 Percolation and Cascades 5 Zero Recovery Default Cascades 6 Future Directions for Cascade Models om Hurd (McMaster University) Contagion! 2 / 34
3 Systemic Risk Basics Quotation (Dickens, David Copperfield) Annual income twenty pounds, annual expenditure nineteen nineteen six, result happiness. Annual income twenty pounds, annual expenditure twenty pounds ought and six, result mis- ery. The blossom is blighted, the leaf is withered, the god of day goes down upon the dreary scene, and and, in short, you are for ever floored. om Hurd (McMaster University) Contagion! 3 / 34
4 Systemic Risk Basics The Goal of the Book Main Aim To crystallize a stream of systemic risk research that focuses on the basic modelling structure that ensures some kind of mathematical tractability, while allowing a great deal of both reality and complexity in the actual finance network specification. om Hurd (McMaster University) Contagion! 4 / 34
5 Systemic Risk Basics Basic Modelling Strategy 1 Propose a definition of Random Financial Network of N banks, that gives a minimal description of the system at any time. 2 Propose a Cascade Mechanism. 3 Hit the system with a random shock at time 0 and determine the evolution of the resultant cascade. 4 Compare to exact N analytics that arise by extending the logic of percolation theory. Tom Hurd (McMaster University) Contagion! 5 / 34
6 Static Cascade Models Eisenberg-Noe 2001 Model: Balance Sheets Assets Liabilities External Assets Ȳ External Deposits D Unsecured Interbank Assets Z Unsecured Interbank Liabilities X Equity Ē Tom Hurd (McMaster University) Contagion! 6 / 34
7 Static Cascade Models EN2001 Assumptions 1 External debt D is senior to interbank debt X; 2 All interbank debt is of equal seniority; 3 There are no losses due to bankruptcy charges. Also: 1 Exposure Ω vw : what v owes w. 2 Equity and Default buffers: E v = max(0, v ). 3 Limited Liability: A bank is defaulted at cascade step n if and only if (n) v 0. Tom Hurd (McMaster University) Contagion! 7 / 34
8 Static Cascade Models EN2001 Default Buffer Mapping 1 If (n) w denotes the default buffer after n cascade steps, then (n) w = (0) w v Ω vw (1 h( (n 1) v / X v )) 2 Threshold function h(x) = max(x + 1, 0) max(x, 0) determines fractional recovered value of defaulted interbank assets. 3 As n, buffers (n) w converge to unique fixed point + = { + v } of solvency cascade mapping. Tom Hurd (McMaster University) Contagion! 8 / 34
9 Static Cascade Models Gai-Kapadia 2010 Default Model 1 GK assumes zero recovery at default and is formally identical to EN2001, but with threshold function h replaced by h(x) = 1 x>0. 2 Partial recovery at default can be modelled by h R (x) = Rh(x/R) + (1 R) h(x). h h R x R x Tom Hurd (McMaster University) Contagion! 9 / 34
10 Static Cascade Models Illiquidity Cascades: Balance Sheets Assets Liabilities Fixed Assets Ȳ F External Deposits D Ω w1 v Ω w2 v Unsecured Interbank Assets Z Unsecured Interbank Liabilities X Ω vw 1 Ω w3 v Liquid Assets Ȳ L = Σ Default Buffer Ω vw 2 Tom Hurd (McMaster University) Contagion! 10 / 34
11 Static Cascade Models Illiquidity Cascade: Gai-Kapadia 2010b 1 At time 0, some banks experience deposit withdrawals that deplete their liquidity buffer Σ v := Yv L (allowing it to go negative). 2 Bank v with Σ v 0 reacts by hoarding liquidity; its debtor banks w N v + each receive a liquidity shock. 3 Under 100% hoarding, cascade mapping at step n is Σ (n) v = Σ (0) v w N + v Ω vw (1 h(σ (n 1) w / Z w )) 4 Formally identical to GK 2010 Default Cascade under interchange of assets and liabilities. Tom Hurd (McMaster University) Contagion! 11 / 34
12 Static Cascade Models Illiquidity Cascade 2: Seung Hwan Lee 2013 Model 1 At time 0, banks experience deposit withdrawals d v 0. 2 These are paid immediately first by liquid assets Z + ȲL, then fixed assets ȲF. 3 Debtor banks receive liquidity shocks; 4 Each bank v has initial liquidity buffer Σ (0) v = d v 0 5 After n 1 cascade steps, then Σ (n) w = Σ (0) w v Ω wv (1 h(σ (n 1) v / Z v )) 6 Mathematically identical to a restricted version of EN 2001! Tom Hurd (McMaster University) Contagion! 12 / 34
13 Static Cascade Models Asset Fire Sale Cascades (c.f. Cifuentes et al 2005 and Caccioli et al 2012) A 1 A 2 A 3 A 4 B 1 B 2 B 3 B 4 B 5 Figure: A bipartite graph with 5 banks (blue nodes) co-owning 4 assets (red nodes). Tom Hurd (McMaster University) Contagion! 13 / 34
14 Static Cascade Models Asset Fire Sales Banks v N = {1, 2,..., N}, Assets a M = {1, 2,..., M}. Let s av be amount of asset a held by bank v. On the nth cascade step: 1 When default buffer (n) v hits a threshold, v begins to liquidate assets. 2 Amount s (n) av of asset a held by bank v after n cascade steps is determined by (n) v. 3 The new mark-to-market price is determined by the total amount sold through an inverse demand function p (n+1) a = d 1 a ( v ( s av s (n) av )) 4 Banks mark-to-market to compute their new buffers (n+1) v. Tom Hurd (McMaster University) Contagion! 14 / 34
15 Static Cascade Models Asset Fire Sale Cascades 1 Complex cascades result even with no interbank sector Ω = 0. 2 Each blue node v is governed by a buffer variable (n) v 3 Each red node a is governed its price p (n) a, which can be considered as a buffer variable. 4 One buffer per node! 5 Global cascades can start either in banks or in assets: once it starts it doesn t matter much where it started. Tom Hurd (McMaster University) Contagion! 15 / 34
16 Static Cascade Models Single Buffer Models 1 In all these models, each node s behaviour, and hence the cascade itself, is determined by a single buffer v, Σ v or p a. 2 Single buffer models can easily account for multiple thresholds of behaviour. Tom Hurd (McMaster University) Contagion! 16 / 34
17 Static Cascade Models A Double Buffer Model 1 In more complex models, banks behaviour is determined by two or more buffers. 2 HCCMS 2013 introduces a double cascade model of illiquidity and insolvency, intertwining two buffers v, Σ v, that combines the essence of both [GK, 2010a] default cascade and [GK, 2010b] liquidity cascade. Question What effect does a bank s behavioural response to liquidity stress have on the probable level of eventual defaults in entire system? om Hurd (McMaster University) Contagion! 17 / 34
18 Static Cascade Models Essential Modelling Assumptions To have analytical results, not just Monte Carlo simulation experiments, should assume locally tree-like independence properties (LTI): 1 Network of bank counterparties is large, sparse and not too heterogeneous. 2 Interbank exposures and bank characteristics are families of random variables with hierarchical dependence. 3 Cascade mechanisms that model bank behaviour are compatible with network structure. Tom Hurd (McMaster University) Contagion! 18 / 34
19 Static Cascade Models Definition: Random Financial Networks Three layers of mathematical structure: 1 Skeleton: random (directed) graph (N, E) with banks v N and edges or links l = (vw) E represent a non-negligible counterparty relation (or directed interbank exposure). 2 Conditioned on skeleton (N, E): Random buffers v for each bank. 3 Finally, conditioned on skeleton and balance sheets: Random exposures Ω l for each link l = (w, v) E. Tom Hurd (McMaster University) Contagion! 19 / 34
20 Random Graph Models Directed Graphs: 2 Nodes and 1 Edge Tom Hurd (McMaster University) Contagion! 20 / 34
21 Random Graph Models Directed Configuration Model 1 Skeleton (N, E) is a directed configuration (LT) random graph with specified node and edge degree distribution matrices {P jk, Q kj }. 2 P jk = P[v N jk ] where N jk is the set of nodes with deg (v) = j, deg + (v) = k. 3 Q kj = P[l E kj ]. 4 Marginals: P + k = j P jk, P j = k P jk and Q + k = j Q kj, Q j = k Q kj. 5 P and Q must be consistent: z := jk jp jk = jk kp jk Q + k = kp + k /z, Q j = jp j /z. Note: when bivariate distribution Q Q + Q the network is called assortative. Tom Hurd (McMaster University) Contagion! 21 / 34
22 Random Graph Models Assortative Configuration Construction Theorem In the assortative configuration graph construction with probabilities P, Q, the following convergence properties hold as N. 1 The fraction of type (k, j) edges in the matching sequence (k l, j l ) l [L] concentrates with high probability around the nominal edge distribution Q kj. 2 For any fixed finite number S, the first S edges l, l [S] have degree sequence (k l, j l ) l [S] that converge in distribution to (ˆk l, ĵ l ) l [S], an independent sequence of identical Q distributed random variables. om Hurd (McMaster University) Contagion! 22 / 34
23 Random Graph Models Other Potential Random Graph Constructions 1 Preferential attachment models; 2 Preferential attachment and detachment models; 3 Inhomogeneous Random Graphs: each bank v N = {1,..., N} is independently assigned a random type t v F with values in type space T ; Conditioned on {t v }, edges (w, v) E are drawn independently with probability K(u(t v ), u(t w )) N 1 + K(u(t v ), u(t w )) where K : R + R + R + is symmetric and u : T R +. Tom Hurd (McMaster University) Contagion! 23 / 34
24 Percolation and Cascades Percolation Logic 1 A large sparse random graph typically has few short closed cycles: call it locally tree-like. 2 Implies all sums over counterparties are almost (conditionally) independent: local tree-like independence (LTI). 3 Vulnerable edge: a directed edge (w, v) E such that Ω wv v. 4 Percolation Logic: large scale cascades starting from a single seed default are only possible if the directed subgraph E V of vulnerable edges has a large strongly connected component Giant-SCC. 5 Because of the LTI property, size GSCC can be analyzed exactly in the limit N. Tom Hurd (McMaster University) Contagion! 24 / 34
25 Percolation and Cascades Zoology of Components of Directed Graphs Figure: The connected components of the World Wide Web in (Source: Broder et al 2000.) Tom Hurd (McMaster University) Contagion! 25 / 34
26 Percolation and Cascades Percolation Theory on Random Graphs G Question What is the size of the largest connected cluster C in G = (N, E)? Theorem (Molloy-Reed 2000) Let G (N), N := N be a well-behaved random graph sequence with the locally tree-like (LT) property. Then E[ C ] N = N(1 g(ξ ))[1 + o(1)] Here ξ = g (ξ ) and g(x) := g (1) k P[k v = k]x k is the generating function of the asymptotic degree distribution. Configuration Graphs and Inhomogeneous Random Graphs have the LT property. om Hurd (McMaster University) Contagion! 26 / 34
27 Percolation and Cascades Percolation Condition 1 f(ξ) ξ Figure: Supercritical case is found for the green curve, which has a non-trivial fixed point ξ < 1. The blue curve has only the trivial fixed point at ξ = 1, and corresponds to a sub-critical random graph. Tom Hurd (McMaster University) Contagion! 27 / 34
28 Percolation and Cascades Cascade Dynamics = Bootstrap Percolation? 1 Bootstrap Percolation is a dynamic version of percolation introduced in 1979 by Chalupa, Leath and Reich for magnetic systems on regular lattices. 2 It follows the growth of connected clusters of nodes v N that become activated when the number of its active neighbours exceeds a threshold. 3 Exact analytic asymptotics are sometimes possible on LTI networks. 4 Watts 2002 Information Cascade Model is a basic example of Bootstrap Percolation. Tom Hurd (McMaster University) Contagion! 28 / 34
29 Zero Recovery Default Cascades Extended Gai-Kapadia RFN 1 Skeleton graph is a directed configuration random graph with {P jk, Q kj }. 2 Conditionally on the skeleton, buffers v are a collection of independent non-negative random variables with P[ v x v N jk ] = D jk (x), x 0. (1) 3 Conditionally on the skeleton, exposures Ω l form a collection of independent positive random variables, independent as well from the default buffers v with W kj (x) = P[ Ω l x l E kj ], w kj (x) = W kj(x), (2) Tom Hurd (McMaster University) Contagion! 29 / 34
30 Zero Recovery Default Cascades Extended Gai-Kapadia Model 1 GK 2010 zero recovery default mechanism. 2 Let D n N be the set of defaulted banks after n cascade steps. 3 Initial default probabilities p (0) jk = P[v D0 v N jk ] = D jk (0). 4 After n cascade steps: p (n) jk = P[v Dn v N jk ]. 5 {v D n } = { v w N v Ω wv 1(w D n 1 )} Tom Hurd (McMaster University) Contagion! 30 / 34
31 Zero Recovery Default Cascades Zero Recovery Cascade Mapping Theorem Theorem Consider the LTI sequence of GK financial networks (N, P, Q,, Ω). Then the following formulas hold with high probability as N : 1 The quantities p (n) jk, π(n) k satisfy the recursive formulas p (n) jk = D jk, ( w (n 1) j ) j, π (n) k = j p (n) j k P j k, w (n 1) j (x) = ( Q k j k (1 π (n 1) k ) )δ 0 (x) + π (n 1) k w k j(x). 2 π (n) are a vector valued function G( π (n 1) ), explicit in terms of RFN specification (N, P, Q,, Ω). om Hurd (McMaster University) Contagion! 31 / 34
32 Zero Recovery Default Cascades Mean Cascade Size and Cascade Frequency 1 1 Mean Cascade Size Ext Vunerable Cluster Mean Connectivity Mean Connectivity (a) (b) Tom Hurd (McMaster University) Contagion! 32 / 34
33 Future Directions for Cascade Models Future Directions 1 Develop LTI algorithms for a variety of full and partial recovery cascade mechanisms, such as EN 2001, liquidity hoarding, fire sale models and their extensions. 2 Investigate limits of the LTI approximation. 3 Explore RFN cascade models with IRG skeletons with community and multiplex structure. 4 Calibrate joint distributions of balance sheets and exposures from systemic risk databases. 5 Justify bank crisis behaviour assumptions using the theory of global games (see Morris and Shin). Tom Hurd (McMaster University) Contagion! 33 / 34
34 Future Directions for Cascade Models Thanks... to many friends, colleagues and collaborators for sharing ideas and insight into an exciting field. Enjoy the conference! om Hurd (McMaster University) Contagion! 34 / 34
Systemic Risk. The idea. The model. The simulations. The results. Conclusions 3 The simulations. Systemic Risk. The idea. The model.
Interbank Lending and the Spread of Bank Failures: A Network Model of idea 1 idea 2 Andreas Krause University of Bath Simone Giansante University of Essex 3 [email protected] 4 5 issue literature on systemic
The Bank of Canada s Analytic Framework for Assessing the Vulnerability of the Household Sector
The Bank of Canada s Analytic Framework for Assessing the Vulnerability of the Household Sector Ramdane Djoudad INTRODUCTION Changes in household debt-service costs as a share of income i.e., the debt-service
Network Analysis Workshop for Heads of Financial Stability CCBS, Bank of England, London February 22-23, 2016
Network Analysis Workshop for Heads of Financial Stability CCBS, Bank of England, London February 22-23, 2016 Dr. S. Rajagopal Chief General Manager Financial Stability Unit Reserve Bank of India Outline
Hedging Variable Annuity Guarantees
p. 1/4 Hedging Variable Annuity Guarantees Actuarial Society of Hong Kong Hong Kong, July 30 Phelim P Boyle Wilfrid Laurier University Thanks to Yan Liu and Adam Kolkiewicz for useful discussions. p. 2/4
ALIGNE Credit Risk Management
ALIGNE Credit Risk Management ALIGNE CREDIT RISK EFFECTIVELY MANAGE CREDIT MONITORING, ANALYSIS AND REPORTING Counterparty credit worthiness, as well as internal credit monitoring, are becoming increasingly
Evaluating Trading Systems By John Ehlers and Ric Way
Evaluating Trading Systems By John Ehlers and Ric Way INTRODUCTION What is the best way to evaluate the performance of a trading system? Conventional wisdom holds that the best way is to examine the system
Banks, Liquidity Management, and Monetary Policy
Discussion of Banks, Liquidity Management, and Monetary Policy by Javier Bianchi and Saki Bigio Itamar Drechsler NYU Stern and NBER Bu/Boston Fed Conference on Macro-Finance Linkages 2013 Objectives 1.
To discuss this topic fully, let us define some terms used in this and the following sets of supplemental notes.
INFINITE SERIES SERIES AND PARTIAL SUMS What if we wanted to sum up the terms of this sequence, how many terms would I have to use? 1, 2, 3,... 10,...? Well, we could start creating sums of a finite number
Pricing complex options using a simple Monte Carlo Simulation
A subsidiary of Sumitomo Mitsui Banking Corporation Pricing complex options using a simple Monte Carlo Simulation Peter Fink Among the different numerical procedures for valuing options, the Monte Carlo
The Heat Equation. Lectures INF2320 p. 1/88
The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)
GN47: Stochastic Modelling of Economic Risks in Life Insurance
GN47: Stochastic Modelling of Economic Risks in Life Insurance Classification Recommended Practice MEMBERS ARE REMINDED THAT THEY MUST ALWAYS COMPLY WITH THE PROFESSIONAL CONDUCT STANDARDS (PCS) AND THAT
THE INSURANCE BUSINESS (SOLVENCY) RULES 2015
THE INSURANCE BUSINESS (SOLVENCY) RULES 2015 Table of Contents Part 1 Introduction... 2 Part 2 Capital Adequacy... 4 Part 3 MCR... 7 Part 4 PCR... 10 Part 5 - Internal Model... 23 Part 6 Valuation... 34
Céline Gauthier and Moez Souissi, Financial Stability Department
29 Understanding Systemic Risk in the Banking Sector: A MacroFinancial Risk Assessment Framework Céline Gauthier and Moez Souissi, Financial Stability Department The recent financial crisis highlighted
Bilateral Exposures and Systemic Solvency Risk
Bilateral Exposures and Systemic Solvency Risk C., GOURIEROUX (1), J.C., HEAM (2), and A., MONFORT (3) (1) CREST, and University of Toronto (2) CREST, and Autorité de Contrôle Prudentiel et de Résolution
Collatz Sequence. Fibbonacci Sequence. n is even; Recurrence Relation: a n+1 = a n + a n 1.
Fibonacci Roulette In this game you will be constructing a recurrence relation, that is, a sequence of numbers where you find the next number by looking at the previous numbers in the sequence. Your job
The package of measures to avoid artificial volatility and pro-cyclicality
The package of measures to avoid artificial volatility and pro-cyclicality Explanation of the measures and the need to include them in the Solvency II framework Contents 1. Key messages 2. Why the package
Network Algorithms for Homeland Security
Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially
10.2 Series and Convergence
10.2 Series and Convergence Write sums using sigma notation Find the partial sums of series and determine convergence or divergence of infinite series Find the N th partial sums of geometric series and
Distributed Caching Algorithms for Content Distribution Networks
Distributed Caching Algorithms for Content Distribution Networks Sem Borst, Varun Gupta, Anwar Walid Alcatel-Lucent Bell Labs, CMU BCAM Seminar Bilbao, September 30, 2010 Introduction Scope: personalized/on-demand
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Recognised Investment Exchanges. Chapter 2. Recognition requirements
Recognised Investment Exchanges Chapter Recognition REC : Recognition Section.3 : Financial resources.3 Financial resources.3.1 UK Schedule to the Recognition Requirements Regulations, Paragraph 1 (1)
Guidance Note: Stress Testing Class 2 Credit Unions. November, 2013. Ce document est également disponible en français
Guidance Note: Stress Testing Class 2 Credit Unions November, 2013 Ce document est également disponible en français This Guidance Note is for use by all Class 2 credit unions with assets in excess of $1
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
Contents. List of Figures. List of Tables. List of Examples. Preface to Volume IV
Contents List of Figures List of Tables List of Examples Foreword Preface to Volume IV xiii xvi xxi xxv xxix IV.1 Value at Risk and Other Risk Metrics 1 IV.1.1 Introduction 1 IV.1.2 An Overview of Market
Market-Consistent Valuation of the Sponsor Covenant and its use in Risk-Based Capital Assessment. Craig Turnbull FIA
Market-Consistent Valuation of the Sponsor Covenant and its use in Risk-Based Capital Assessment Craig Turnbull FIA Background and Research Objectives 2 Background: DB Pensions and Risk + Aggregate deficits
9. Short-Term Liquidity Analysis. Operating Cash Conversion Cycle
9. Short-Term Liquidity Analysis. Operating Cash Conversion Cycle 9.1 Current Assets and 9.1.1 Cash A firm should maintain as little cash as possible, because cash is a nonproductive asset. It earns no
With the derivative markets having changed dramatically since the 2008 financial crisis,
Avoiding Collateral Surprises: Managing Multi-Currency CSAs Anna Barbashova, Numerix - 24 Jan 2013 This article explores multi-currency credit support annexes (CSAs) in the derivatives area and their potential
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture - 36 Location Problems In this lecture, we continue the discussion
Please see below for the current credit ratings of Santander UK:
Santander UK Santander UK is regulated on a standalone basis by the United Kingdom Financial Services Authority. The bank is UK focused with more than 95% of assets UK based. In the UK, the bank has a
Graphs without proper subgraphs of minimum degree 3 and short cycles
Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract
Math 55: Discrete Mathematics
Math 55: Discrete Mathematics UC Berkeley, Spring 2012 Homework # 9, due Wednesday, April 11 8.1.5 How many ways are there to pay a bill of 17 pesos using a currency with coins of values of 1 peso, 2 pesos,
The Basics of Interest Theory
Contents Preface 3 The Basics of Interest Theory 9 1 The Meaning of Interest................................... 10 2 Accumulation and Amount Functions............................ 14 3 Effective Interest
Embedded Value Report
Embedded Value Report 2012 ACHMEA EMBEDDED VALUE REPORT 2012 Contents Management summary 3 Introduction 4 Embedded Value Results 5 Value Added by New Business 6 Analysis of Change 7 Sensitivities 9 Impact
IBM Algo Asset Liability Management
IBM Algo Asset Liability Management Industry-leading asset and liability management solution for the enterprise Highlights The fast-paced world of global markets presents asset and liability professionals
Eurodollar Futures, and Forwards
5 Eurodollar Futures, and Forwards In this chapter we will learn about Eurodollar Deposits Eurodollar Futures Contracts, Hedging strategies using ED Futures, Forward Rate Agreements, Pricing FRAs. Hedging
Analysis of a Production/Inventory System with Multiple Retailers
Analysis of a Production/Inventory System with Multiple Retailers Ann M. Noblesse 1, Robert N. Boute 1,2, Marc R. Lambrecht 1, Benny Van Houdt 3 1 Research Center for Operations Management, University
TSM meets the Pro Backer
TSM meets the Pro Backer written by Dave Morris (August 2013) As the founder and owner of The Staking Machine (TSM), I m often approached by tipsters asking me to look at their historical results, and
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
THE DYING FIBONACCI TREE. 1. Introduction. Consider a tree with two types of nodes, say A and B, and the following properties:
THE DYING FIBONACCI TREE BERNHARD GITTENBERGER 1. Introduction Consider a tree with two types of nodes, say A and B, and the following properties: 1. Let the root be of type A.. Each node of type A produces
Measuring evolution of systemic risk across insurance-reinsurance company networks. Abstract
Measuring evolution of systemic risk across insurance-reinsurance company networks Abstract Constructing a stochastic model to quantify counterparty risk in the insurance industry Create estimators based
The degree of a polynomial function is equal to the highest exponent found on the independent variables.
DETAILED SOLUTIONS AND CONCEPTS - POLYNOMIAL FUNCTIONS Prepared by Ingrid Stewart, Ph.D., College of Southern Nevada Please Send Questions and Comments to [email protected]. Thank you! PLEASE NOTE
Master of Mathematical Finance: Course Descriptions
Master of Mathematical Finance: Course Descriptions CS 522 Data Mining Computer Science This course provides continued exploration of data mining algorithms. More sophisticated algorithms such as support
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
INFORMATION SHEET ON FACTORING (PURCHASE and MANAGEMENT OF ENTERPRISE S ACCOUNT RECEIVABLES) (update in force as from 01 07 2015)
INFORMATION SHEET ON FACTORING (PURCHASE and MANAGEMENT OF ENTERPRISE S ACCOUNT RECEIVABLES) (update in force as from 01 07 2015) INFORMATION ON THE BANK Banca IFIS S.p.A. Registered office: Via Terraglio
Analytical Research Series
EUROPEAN FIXED INCOME RESEARCH Analytical Research Series INTRODUCTION TO ASSET SWAPS Dominic O Kane January 2000 Lehman Brothers International (Europe) Pub Code 403 Summary An asset swap is a synthetic
Probability Generating Functions
page 39 Chapter 3 Probability Generating Functions 3 Preamble: Generating Functions Generating functions are widely used in mathematics, and play an important role in probability theory Consider a sequence
REVIEW EXERCISES DAVID J LOWRY
REVIEW EXERCISES DAVID J LOWRY Contents 1. Introduction 1 2. Elementary Functions 1 2.1. Factoring and Solving Quadratics 1 2.2. Polynomial Inequalities 3 2.3. Rational Functions 4 2.4. Exponentials and
Credibility and Pooling Applications to Group Life and Group Disability Insurance
Credibility and Pooling Applications to Group Life and Group Disability Insurance Presented by Paul L. Correia Consulting Actuary [email protected] (207) 771-1204 May 20, 2014 What I plan to cover
Solutions for Balance Sheet Management
ENTERPRISE RISK SOLUTIONS Solutions for Balance Sheet Management Moody s Analytics offers a powerful combination of software and advisory services for essential balance sheet and liquidity risk management.
Tutorial: Structural Models of the Firm
Tutorial: Structural Models of the Firm Peter Ritchken Case Western Reserve University February 16, 2015 Peter Ritchken, Case Western Reserve University Tutorial: Structural Models of the Firm 1/61 Tutorial:
Monte Carlo Simulation
1 Monte Carlo Simulation Stefan Weber Leibniz Universität Hannover email: [email protected] web: www.stochastik.uni-hannover.de/ sweber Monte Carlo Simulation 2 Quantifying and Hedging
Hydrodynamic Limits of Randomized Load Balancing Networks
Hydrodynamic Limits of Randomized Load Balancing Networks Kavita Ramanan and Mohammadreza Aghajani Brown University Stochastic Networks and Stochastic Geometry a conference in honour of François Baccelli
Derivatives, Measurement and Hedge Accounting
Derivatives, Measurement and Hedge Accounting IAS 39 11 June 2008 Contents Derivatives and embedded derivatives Definition Sample of products Accounting treatment Measurement Active market VS Inactive
Ex. 2.1 (Davide Basilio Bartolini)
ECE 54: Elements of Information Theory, Fall 00 Homework Solutions Ex.. (Davide Basilio Bartolini) Text Coin Flips. A fair coin is flipped until the first head occurs. Let X denote the number of flips
On an anti-ramsey type result
On an anti-ramsey type result Noga Alon, Hanno Lefmann and Vojtĕch Rödl Abstract We consider anti-ramsey type results. For a given coloring of the k-element subsets of an n-element set X, where two k-element
The Independence Number in Graphs of Maximum Degree Three
The Independence Number in Graphs of Maximum Degree Three Jochen Harant 1 Michael A. Henning 2 Dieter Rautenbach 1 and Ingo Schiermeyer 3 1 Institut für Mathematik, TU Ilmenau, Postfach 100565, D-98684
Margining Overview for London Stock Exchange Derivatives Market Equities
Margining Overview for London Stock Exchange Derivatives Market Equities Department: Risk Management Document Type: Guide Issue no.: 1.0 Issue Date: March 2012 Document History Date Version Author Summary
Facilitating On-Demand Risk and Actuarial Analysis in MATLAB. Timo Salminen, CFA, FRM Model IT
Facilitating On-Demand Risk and Actuarial Analysis in MATLAB Timo Salminen, CFA, FRM Model IT Introduction It is common that insurance companies can valuate their liabilities only quarterly Sufficient
Complex Networks Analysis: Clustering Methods
Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich [email protected] 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications
A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS
A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS PAWE L PRA LAT Abstract. In this note we consider the on-line Ramsey numbers R(P n, P m ) for paths. Using a high performance computing clusters,
(Quasi-)Newton methods
(Quasi-)Newton methods 1 Introduction 1.1 Newton method Newton method is a method to find the zeros of a differentiable non-linear function g, x such that g(x) = 0, where g : R n R n. Given a starting
Interest Rate Risk Management for the Banking Book: Macro Hedging
Interest Rate Risk Management for the Banking Book: Macro Hedging Giuseppe Loforese Head of ALM - Intesa Sanpaolo Chair of ALM Hedge Accounting WG EBF Co-Chairman IRRBB WG - EBF AGENDA IRRBB: Macro Hedging
Anti-Gaming in the OnePipe Optimal Liquidity Network
1 Anti-Gaming in the OnePipe Optimal Liquidity Network Pragma Financial Systems I. INTRODUCTION With careful estimates 1 suggesting that trading in so-called dark pools now constitutes more than 7% of
Statistical machine learning, high dimension and big data
Statistical machine learning, high dimension and big data S. Gaïffas 1 14 mars 2014 1 CMAP - Ecole Polytechnique Agenda for today Divide and Conquer principle for collaborative filtering Graphical modelling,
Credit Analysis 10-1
Credit Analysis 10-1 10-2 Liquidity and Working Capital Basics Liquidity - Ability to convert assets into cash or to obtain cash to meet short-term obligations. Short-term - Conventionally viewed as a
6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks
6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about one-dimensional random walks. In
Pricing and calibration in local volatility models via fast quantization
Pricing and calibration in local volatility models via fast quantization Parma, 29 th January 2015. Joint work with Giorgia Callegaro and Martino Grasselli Quantization: a brief history Birth: back to
Random graphs with a given degree sequence
Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.
MATH 425, PRACTICE FINAL EXAM SOLUTIONS.
MATH 45, PRACTICE FINAL EXAM SOLUTIONS. Exercise. a Is the operator L defined on smooth functions of x, y by L u := u xx + cosu linear? b Does the answer change if we replace the operator L by the operator
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
Basel Committee on Banking Supervision. Consultative Document. Basel III: The Net Stable Funding Ratio. Issued for comment by 11 April 2014
Basel Committee on Banking Supervision Consultative Document Basel III: The Net Stable Funding Ratio Issued for comment by 11 April 2014 January 2014 This publication is available on the BIS website (www.bis.org).
1 Short Introduction to Time Series
ECONOMICS 7344, Spring 202 Bent E. Sørensen January 24, 202 Short Introduction to Time Series A time series is a collection of stochastic variables x,.., x t,.., x T indexed by an integer value t. The
5 Numerical Differentiation
D. Levy 5 Numerical Differentiation 5. Basic Concepts This chapter deals with numerical approximations of derivatives. The first questions that comes up to mind is: why do we need to approximate derivatives
Fast Monte Carlo CVA using Exposure Sampling Method
Fast Monte Carlo CVA using Exposure Sampling Method Alexander Sokol Numerix RiskMinds Conference 2010 (Geneva) Definitions Potential Future Exposure (PFE) PFE(T) is maximum loss due to counterparty default
Margin Calculation Methodology and Derivatives and Repo Valuation Methodology
Margin Calculation Methodology and Derivatives and Repo Valuation Methodology 1 Overview This document presents the valuation formulas for interest rate derivatives and repo transactions implemented in
BASEL III CHALLENGES FOR THE CARDS BUSINESS
BASEL III CHALLENGES FOR THE CARDS BUSINESS BY CARL MOSESSON Central Bankers from the largest economies have published a set of guidelines which we will call Basel III designed to strengthen the ability
LIBOR vs. OIS: The Derivatives Discounting Dilemma
LIBOR vs. OIS: The Derivatives Discounting Dilemma John Hull PRMIA May 2012 1 Agenda OIS and LIBOR CVA and DVA The Main Result Potential Sources of Confusion FVA and DVA See John Hull and Alan White: LIBOR
Is the business model of insurance companies jeopardized?
Oliver Bäte, Chief Financial Officer Allianz Group Is the business model of insurance companies jeopardized? Société Générale IFRS Conference Paris, 5 October 010 Conclusions Insurers mastered the crisis
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
Contents. List of Figures. List of Tables. Acknowledgments PART I INTRODUCTION 1
List of Figures List of Tables Acknowledgments Preface xv xix xxi xxiii PART I INTRODUCTION 1 1 The Evolution of Financial Analysis 3 1.1 Bookkeeping 3 1.2 Modern finance 8 1.3 Departments, silos and analysis
How To Calculate Financial Leverage Ratio
What Do Short-Term Liquidity Ratios Measure? What Is Working Capital? HOCK international - 2004 1 HOCK international - 2004 2 How Is the Current Ratio Calculated? How Is the Quick Ratio Calculated? HOCK
Net Stable Funding Ratio
Net Stable Funding Ratio Aims to establish a minimum acceptable amount of stable funding based on the liquidity characteristics of an institution s assets and activities over a one year horizon. The amount
Replicating Life Insurance Liabilities
Replicating Life Insurance Liabilities O. Khomenko Jena, 23 March 2011 1 Solvency II New Regulation for Insurance Industry Solvency II is a new regulation for European insurance industry. It is expected
Chapter 9 Experience rating
0 INTRODUCTION 1 Chapter 9 Experience rating 0 Introduction The rating process is the process of deciding on an appropriate level of premium for a particular class of insurance business. The contents of
Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression
Logistic Regression Department of Statistics The Pennsylvania State University Email: [email protected] Logistic Regression Preserve linear classification boundaries. By the Bayes rule: Ĝ(x) = arg max
Valuation of Network Effects in Software Markets
Andreas Kemper Valuation of Network Effects in Software Markets A Complex Networks Approach Physica-Verlag Contents Part I Introduction ^x 1 Background and Motivation 3 1.1 Research Objectives 5 1.2 Research
CITY UNIVERSITY LONDON. BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION
No: CITY UNIVERSITY LONDON BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION ENGINEERING MATHEMATICS 2 (resit) EX2005 Date: August
Business Loan. This document sets out your loan s terms and conditions. Contents of these terms and conditions. Terms and Conditions
Business Loan Terms and Conditions This document sets out your loan s terms and conditions In this document we ve explained the terms and conditions applying to your ANZ Business Loan. It includes key
Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year.
This document is designed to help North Carolina educators teach the Common Core (Standard Course of Study). NCDPI staff are continually updating and improving these tools to better serve teachers. Algebra
Financial Risk Management
OVERVIEW BROCHURE Financial Risk Management When you have to be right WoltersKluwerFS.com Risk Management Risk Management in its purest form is the process by which risks in an investment are identified,
Investment in insurance-linked securities. Valuation and modeling approaches for European insurers under Solvency II
Investment in insurance-linked securities Valuation and modeling approaches for European insurers under Solvency II Contents 01 Background 02 Key findings 03 Our analysis Solvency II balance sheet impacts
