Universal Algorithm for Trading in Stock Market Based on the Method of Calibration
|
|
|
- Lucy Barker
- 10 years ago
- Views:
Transcription
1 Universal Algorithm for Trading in Stock Market Based on the Method of Calibration Vladimir V yugin Institute for Information Transmission Problems, Russian Academy of Sciences, Bol shoi Karetnyi per. 19, Moscow GSP-4, , Russia Laboratory of Structural Methods of Data Analysis in Predictive Modeling at the Moscow Institute of Physics and Technology [email protected] Abstract. We present a universal method for algorithmic trading in Stock Market which performs asymptotically at least as well as any stationary trading strategy that computes the investment at each step using a continuous function of the side information. In the process of the game, a trader makes decisions using predictions computed by a randomized well-calibrated algorithm. We use Dawid s notion of calibration with more general checking rules and some modification of Kakade and Foster s randomized rounding algorithm for computing the well-calibrated forecasts. The method of randomized calibration is combined with Vovk s method of defensive forecasting in RKHS. Unlike in statistical theory, no stochastic assumptions are made about the stock prices. 1 Introduction Predicting sequences is the key problem of machine learning and statistics. The learning process proceeds as follows: observing a sequence of outcomes given on-line a forecaster assigns a subjective estimate to future outcomes. A minimal requirement for testing any prediction algorithm is that it should be calibrated (see Dawid [4]). Dawid gave an informal explanation of calibration for binary outcomes as follows. Let a binary sequence ω 1, ω 2,..., ω n 1 of outcomes be observed by a forecaster whose task is to give a probability p n of a future event ω n = 1. In a typical example, p n is interpreted as a probability that it will rain. Forecaster is said to be well-calibrated if it rains as often as he leads us to expect. It should rain about 80% of the days for which p n = 0.8, and so on. A more precise definition is as follows. Let I(p) denote the characteristic function of a subinterval I [0, 1], i.e., I(p) = 1 if p I, and I(p) = 0, otherwise. An infinite sequence of forecasts p 1, p 2,... is calibrated for an infinite binary sequence of outcomes ω 1 ω 2... if for characteristic function I(p) of any subinterval of [0, 1] the calibration error tends to zero, i.e., 1 n I(p i )(ω i p i ) 0
2 as n. The indicator function I(p i ) determines some checking rule which selects indices i where we compute the deviation between forecasts p i and outcomes ω i. If the weather acts adversatively, then Oakes [10] shows that any deterministic forecasting algorithm will not always be calibrated. Foster and Vohra [5] show that calibration is almost surely guaranteed with a randomizing forecasting rule, i.e., where the forecasts p i are chosen using internal randomization and the forecasts are hidden from the weather until weather makes its decision whether to rain or not. Mannor and Stoltz [9] obtained the upper bound for the rate of convergence of the calibration error. Foster et al. [7] obtained convergence rates which depend on the complexity of the class of checking rules without providing a computationally efficient forecasting algorithms. Vovk ([14], [15], [16]) developed the method of calibration for the case of general RKHS and Banach spaces. Vovk called his method defensive forecasting. Kakade and Foster and others considered a finite outcome space and a probability distribution as the forecast. In this paper, the outcomes ω i are real numbers from the unit interval [0, 1] and the forecast p i is a single real number (which can be an output of a random variable). This setting is closely related to Vovk s defensive forecasting approach. Several applications of well-calibrated forecasting have been proposed, including convergence to correlated equilibrium (see Foster and Vohra [6]), recovering unknown functional dependencies (see Vovk ([14], [15], [16]) and predictions with expert advice (see Vovk [16]). In this paper we present a new application of the method of calibration to computational finance. We develop an algorithmic trading strategy that is in some sense always guaranteed to perform well. In competitive analysis, the performance of an algorithm is measured to any trading algorithm from a broad class. Given a particular performance measure, an adaptive algorithm is strongly competitive with a benchmark class of trading algorithms if it achieves the maximum possible regret over all input sequences. Unlike statistical theory, no stochastic assumptions are made about the stock prices. This line of research in finance was pioneered by Cover (see Cover [1], Cover and Ordentlich[2]) who designed universal portfolio selection algorithms that can provably do well (in terms of their total return) with respect to some benchmark algorithms. Such algorithms are called universal algorithms. We construct in Theorem 1 a universal strategy for algorithmic trading in Stock Market which performs asymptotically at least as well as any not too complex trading strategy. By performance we mean return per unit of currency on an investment. The empirical results obtained on historical markets provide strong evidence that this type of technical trading can beat some generally accepted trading strategies if transaction costs are ignored. Results of numerical experiments are presented in V yugin and Trunov [17].
3 2 Main result Assume that outcomes (real numbers) S 1, S 2,... that are interpreted as prices of a stock are given online. We assume that they are bounded and scaled such that 0 S i 1 for all i. We present the process of trading in a stock market in the form of the protocol of a game with players called traders (see Fig. 1). We distinguish among Trader M which uses a randomized trading strategy and a pool of Traders D using stationary trading strategies: any such strategy D is a continuous real function defined on [0, 1]. At the beginning of each step i, traders are given some data z i relevant to predicting a future price S i of the stock. We call z i a signal or a piece of side information. The real number z i belongs to [0, 1] and can encode any numerical information. For example, it can even be the future price S i. There is a restriction for Traders D: the functions D must be continuous. In general, under a strategy we mean an algorithm (possibly randomized) which at each step i of the game outputs the number of units of the financial instrument that you want to buy (if the number is positive or equal to zero) or sell (if it is negative). 1 For Trader M, this number is a value of the random variable M i that is the output of a randomizing algorithm, and for any Trader D from the pool, this number equals D(z i ), where D is a continuous function. We suppose that traders can borrow money for buying shares and can incur debt. At any step i, any Trader D from the pool uses only information z i ; he buys (or sells) D(z i ) units of shares. A strategy of this type is called stationary. For Trader M, this game is a game with perfect information. For defining the random variable M i, Trader M may use all values of S j 1 and z j for j i, as well as their randomized values. We use a specific randomization method for real numbers from the unit interval. Given a positive integer number K, divide the interval [0, 1] into subintervals of length = 1/K with rational endpoints v i = i, where i = 0, 1,..., K. Let V be the set of these points. Any number p [0, 1] can be represented as a linear combination of two endpoints of the subinterval containing p: p = w v (p)v = w vi 1 (p)v i 1 w vi (p)v i. Define w v (p) = 0 for all other v V. Let p be v i 1 with probability w vi 1 (p) or v i with probability w vi (p). We emphasize that in the protocol presented on Fig 1 a value of the random variable M i is hidden from Stock Market when it announces the price S i ; it can only use probabilities of events M i = 1 and M i = 1. Trader M can buy or sell only one share of the stock. Therefore, in order to compare the performance of the traders we have to standardize the strategies D(x) of Traders D from the pool. Recall the norm D = v V sup 0 x 1 D(x), where D is a continuous function. We will use D = max{1, D } as a normalization factor. 1 We assume that the number of units of a financial instrument purchasing by traders may take any real value.
4 Define K D 0 = 0 and K M 0 = 0. FOR i = 1, 2... Stock Market announces a signal z i [0, 1]. Define a precision of random rounding: = s, where n s < i n s1 (The sequences n s and s, s = 1, 2,..., are defined after (22) in the proof of Theorem 2 below). Compute a forecast p i using algorithm presented on Fig. 2 with parameter. Randomize the forecast: p i. Randomize the past price of the stock: S i 1. Trader M buys M i shares of the stock by S i 1 each, where M i = { 1 if pi > S i 1, 1 otherwise. Trader D buys D(z i) shares of the stock by S i 1 each, where D is an arbitrary continuous function on [0, 1]. Stock Market announces the price S i of the stock. Trader M sells M i shares of the stock by S i each and updates his cumulative gain: Ki M = Ki 1 M M i(s i S i 1). Trader D sells D(z i) shares of the stock by S i each and updates his cumulative gain: Ki D = Ki 1 D D(z i)(s i S i 1). ENDFOR Fig. 1. Protocol of trading game The main result of this paper is presented in the following theorem, which says that, with probability 1, the average gain of the universal trading strategy is asymptotically not less than the average gain of any stationary trading strategy from one share of the stock. Theorem 1. A randomized algorithm for computing forecasts can be constructed such that for any continuous function D the inequality lim inf n 1 ( K M n n D 1 Kn D ) 0 (1) holds almost surely with respect to the probability distribution generated by the corresponding randomization. We call any strategy M satisfying (1) universal. Note that (1) holds for all continuous D if and only if the inequality: lim inf n 1 ( K M n n Kn D ) 0 holds for all continuous D such that D 1. Since the condition (1) holds for trivial strategy: D(z) = 0 for all z, the Trader s M strategy is asymptotically non-risk. Corollary 1. Universal strategy is asymptotically non-risk: lim inf n K M n n 0 almost surely.
5 A proof of Theorem 1 is given in Section 5, where we construct the corresponding optimal trading strategy based on the well-calibrated forecasts defined in Section 4. In Section 3 we define benchmark classes RKHS. 3 Benchmark class: RKHS First, we compete the universal trading strategy with stationary trading strategies from a benchmark class F called RKHS. After that, we approximate any continuous function D using the functions f F. By a kernel function on a set X we mean any function K(x, y) which can be represented as a dot product K(x, y) = (Φ(x) Φ(y)), where Φ is a mapping from X to some Hilbert feature space. The reproducing kernels are of special interest. A Hilbert space F of realvalued functions on a compact metric space X is called RKHS (Reproducing Kernel Hilbert Space) on X if the evaluation functional f f(x) is continuous for each x X. Let F be the norm in F and c F (x) = sup f(x). The f F 1 embedding constant of F is defined: c F = sup c F (x). We consider RKHS F with c F <. An example of RKHS is the Sobolev space F = H 1 ([0, 1]), which consists of absolutely continuous functions f : [0, 1] R with f F 1, where f F = 1 0 (f(t))2 dt 1 0 (f (t)) 2 dt. For this space, c F = coth 1 (see Vovk [14]). Let F be an RKHS on X with the dot product (f g) for f, g F. By Riesz Fisher theorem, for each x X there exists k x F such that f(x) = (k x f). The reproducing kernel is defined K(x, y) = (k x k y ). The main properties of the kernel: 1) K(x, y) = K(y, x) for all x, y X (symmetry property); 2) k α i α j K(x i, x j ) 0 for all k, for all x i X, and for all real numbers α i, i,j=1 where i = 1,..., k (positive semidefinite property). Conversely, kernels define RKHS: any symmetric, positive semidefinite kernel function K(x, y) on X defines some canonical RKHS F and a mapping Φ : X F such that K(x, y) = (Φ(x) Φ(y)). Also, c F (x) = k x F = Φ(x) F. The mapping Φ(x) is also called feature map. For Sobolev space H 1 ([0, 1]), the reproducing kernel is K(t, t ) = (cosh min(t, t ) cosh min(1 t, 1 t ))/ sinh 1 (see Vovk[14]). Well known examples of kernels on X = [0, 1]: Gaussian kernel K(x, y) = exp{ ( x ȳ)2 σ 2 }; K(t, t ) = cos(2π(t t )), t, t [0, 1]. Other examples and details of the kernel theory see in Cristianini and Shawe- Taylor [3], Smola and Scholkopf [11]. 4 Well-calibrated forecasting with side information In this section we present a randomized algorithm for computing well-calibrated forecasts using a side information. x
6 We use tests of calibration or checking rules of general type. For any subset R [0, 1] 2 = [0, 1] [0, 1], define the checking rule I R (p, x) = 1 if (p, x) R and I R (p, x) = 0 otherwise. In Section 4 we set R = {(p, y) : p > y} or R = {(p, y) : p y}, where p, y [0, 1]. In the prediction protocol defined on Fig 1, let S 1, S 2,... be a sequence of outcomes and z 1, z 2,... be the corresponding sequences of signals given online. Let also, F be an RKHS on [0, 1] with a kernel K 2 (z, z ) and a finite embedding constant c F. Theorem 2. For any ɛ > 0, an algorithm for computing forecasts p 1, p 2,... can be constructed such that the following three items hold: For any n, R [0, 1] 2, and δ > 0, with probability at least 1 δ, I R ( p i, x i )(S i p i ) 18(c2 F 1) 1 4 n 3/4ɛ n 2 ln 2 δ, (2) where p i is the randomization of p i, x i = S i 1 and x i is its randomization. 2 For any D F and n, D(z i )(S i p i ) D F (c 2 F 1)n, (3) where z 1, z 2,... are signals. For any R [0, 1] 2, with probability 1, 1 lim n n I R ( p i, x i )(S i p i ) = 0. (4) Proof. First, in Proposition 1, given > 0, we modify a randomized rounding algorithm of Kakade and Foster [8] to construct some -calibrated forecasting algorithm, and combine it with Vovk s [14] defensive forecasting algorithm. After that, we revise it tending 0 such that (4) will hold. Proposition 1. Under the assumptions of Theorem 2, an algorithm for computing forecasts can be constructed such that the inequality (3) holds for all D from RKHS F and for all n. Also, for any n, R, and δ > 0, with probability at least 1 δ, n(c 2 I R ( p i, x i )(S i p i ) n F 1) n 2 ln 2 δ. 2 This theorem can be generalized for the case where x i = f(c i, z i) is k-dimensional vector which is a function of the history c i = ( p 1, S 1,..., p i 1, S i 1) and a signal z i.
7 Proof. We define a deterministic forecast and after that we randomize it. The partition V = {v 0,..., v K } was defined above. Recall that we round the deterministic forecast p n to v i 1 with probability w vi 1 (p n ) and to v i with probability w vi (p n ). We also round the number x n = S n 1 to v j 1 with probability w vj 1 (x n ) and to v j with probability w vj (x n ), where x n [v j 1, v j ]. Let W v (p, x) = w v 1(p)w v 2(x), where v = (v 1, v 2 ) V 2. Let W p, x) = (W v (p, x) : v V 2 ) be the vector of probabilities of rounding. Define the corresponding kernel K 1 (p, x, p, x ) = (W (p, x) W (p, x )). The kernel K 2 (z, z ) can be represented as a dot product in a feature space K 2 (z, z ) = (Φ(z) Φ(z )). Define An algorithm for computing the deterministic forecasts p 1, p 2,... is presented on Fig. 2 (see also Vovk et al. [13]). Input parameter:. Define p 1 = 1/2. FOR n = 1, 2... n 1 Define U n(p) = (K 1(p, x n, p i, x i) K 2(z n, z i))(s i p i). If U n(p) > 0 for all p [0, 1] then define p n = 1; If U n(p) < 0 for all p [0, 1] then p n = 0. Otherwise, define p n to be a root of the equation U n(p) = 0 (some root exists by the intermediate value theorem). ENDFOR Fig. 2. Algorithm for computing deterministic forecasts Now we continue the proof of the proposition. Let forecasts p 1, p 2,... be computed by the algorithm presented on Fig 2. Since U(p n )(S n p n ) 0 for all n, we have for any N, = 0 U n (p n )(S n p n ) = n 1 (K 1 (p n, x n, p i, x i ) K 2 (z n, z i ))(S i p i )(S n p n ) = = 1 2 K 1 (p n, x n, p i, x i )(S i p i )(S n p n ) K 1 (p n, x n, p n, x n )(S n p n ) 2 K 2 (z n, z i )(S i p i )(S n p n )
8 1 K 2 (z n, z n )(S n p n ) 2 = (5) 2 = 1 2 W (p n, x n )(S n p n ) 1 W (p n, x n ) 2 (S n p n ) 2 (6) Φ(z 2 n )(S n p n ) 1 Φ(z n ) 2 2 F(S n p n ) 2. (7) In (6), is Euclidian norm, and in (7), F is the norm in RKHS F. Since (S n p n ) 2 1 for all n and (W (p n, x n ) 2 = (W v (p n, x n )) 2 W v (p n, x n ) = 1, v V 2 v V 2 the subtracted sum of (6) is upper bounded by N. Since Φ(z n ) F = c F (z n ) and c F (z) c F for all z, the subtracted sum of (7) is upper bounded by c 2 FN. As a result we obtain W (p n, x n )(S n p n ) (c 2 F 1)N (8) Φ(z n )(S n p n ) (c 2 F 1)N (9) F for all N. Let us define µ n = n W (p i, x i )(S i p i ). By (8), µ n (c 2 F 1)n F for all n. Let µ n = (µ n (v) : v V 2 ). By definition of µ n, µ n (v) = W v (p i, x i )(S i p i ) (10) for any v V. Let I(p, x) be an indicator function. Insert the term I(v) in the sum (10), sum by v V 2, and exchange the order of summation. Using Cauchy Schwarz inequality for vectors Ī = (I(v) : v V 2 ), µ n = (µ n (v) : v V 2 ) and Euclidian norm, we obtain W v (p i, x i )I(v)(S i p i ) = v V 2 = I(v) W v (p i, x i )(S i p i ) = v V 2 = (Ī µ n) Ī µ n V 2 (c 2 F 1)n (11)
9 for all n, where V 2 = (1 1 )2 ( 2 ) 2 is the cardinality of the partition. Let p i be a random variable taking values v V with probabilities w v (p i ) (only two of them are nonzero). Recall that x i is the random variable taking values v V with probabilities w v (x i ). Also, for v = (v 1, v 2 ), W v (p i, x i ) = w v 1(p i )w v 2(x i ). For any i, the mathematical expectation of the random variable I( p i, x i )(S i p i ) is equal to E(I( p i, x i )(S i p i )) = v V 2 W v (p i, x i )I(v)(S i v 1 ), (12) where v = (v 1, v 2 ). By Azuma Hoeffding inequality (see (24) below), for any n and δ > 0, with probability 1 δ, n I( p i, x i )(S i p i ) E(I( p i, x i )(S i p i )) 2 ln 2 δ. (13) By method of rounding W v (p i, x i )I(v)(S i p i ) W v (p i, x i )I(v)(S i v 1 ) v V 2 v V 2 for all i, where v = (v 1, v 2 ). Summing (12) over i = 1,..., n and using the inequality (11), we obtain E(I( p i, x i )(S i p i )) = = W v (p i, x i )I(v)(S i v 1 ) v V 2 n (c 2 F 1)n/ 2 (14) for all n. By (13) and (14), with probability 1 δ, I( p i, x i )(S i p i ) n 2 (c 2 F 1)n/ 2 n 2 ln 2 δ. (15) By Cauchy Schwarz inequality D(z n )(S n p n ) = (S n p n )(D Φ(z n )) = ( N (S n p n )Φ(z n ) D) (S n p n )Φ(z n ) D F F D F (c 2 F 1)N.
10 Proposition is proved. Now we turn to the proof of Theorem 2. The expression n 2 (c 2 F 1)n/ 2 from (14) and (15) takes its minimal value when = 2(c 2 F 1) 1 4 n 1 4. In this case, the right-hand side of the inequality (14) is equal to n 2 n(c 2 F 1)/ 2 = 2 n = 2 2(c 2 F 1) n 4. (16) In what follows we use the upper bound 2 n in (14). To prove the bound (2) choose a monotonic sequence of real numbers 1 > 2 >... such that s 0 as s. We also define an increasing sequence of positive integer numbers n 1 < n 2 <... For any s, we use on steps n s n < n s1 the randomization grid of [0, 1] defined by subintervals of length s. We start our sequences from n 1 = 1 and 1 = 1. Also, define the numbers n 2, n 3,... such that the inequality E(I( p i, x i )(S i p i )) 4(s 1) sn (17) holds for all n s n n s1 and for all s 1. We define this sequence by mathematical induction on s. Suppose that n s (s 1) is defined such that the inequality E(I( p i, x i )(S i p i )) 4s s 1n (18) holds for all n s 1 n n s, and the inequality n s E(I( p i, x i )(S i p i )) 4s sn s (19) also holds. Let us define n s1. Consider all forecasts p i defined by the algorithm given above for the discretization = s1. We do not use first n s of these forecasts (more correctly we will use them only in bounds (20) and (21); denote these forecasts ˆp 1,..., ˆp ns. We add the forecasts p i for i > n s to the forecasts defined before this step of induction (for n s ). Let n s1 be such that the inequality n s1 E(I( p i, x i )(S i p i )) n s E(I( p i, x i )(S i p i )) n s1 n s E(I( p i, x i )(S i p i )) E(I(ˆp i, x i )(S i ˆp i )) i=n s1 n s E(I(ˆp i, x i )(S i ˆp i )) 4(s 1) s1n s1 (20)
11 holds. Here the first sum of the right-hand side of the inequality (20) is bounded by 4s s n s by the induction hypothesis (19). The second and third sums are bounded by 2 s1 n s1 and by 2 s1 n s, respectively, where = s1 is defined such that (16) holds. This follows from (14) and by choice of n s. The induction hypothesis (19) is valid for n s1 2s s s1 s1 (2s 1) n s. Similarly, E(I( p i, x i )(S i p i )) n s E(I( p i, x i )(S i p i )) n s E(I( p i, x i )(S i p i )) E(I(ˆp i, x i )(S i ˆp i )) i=n s1 n s E(I(ˆp i, x i )(S i ˆp i )) 4(s 1) sn (21) for n s < n n s1. Here the first sum of the right-hand inequality (20) is also bounded by 4s s n s 4s s n by the induction hypothesis (19). The second and the third sums are bounded by 2 s1 n 2 s n and by 2 s1 n s 2 s n, respectively. This follows from (14) and from choice of s. The induction hypothesis (18) is valid. By (17) for any s E(I( p i, x i )(S i p i )) 4(s 1) sn (22) for all n n s if s satisfies the condition s1 s (1 1 s2 ) for all s. We show now that sequences n s and s satisfying all the conditions above exist. Let ɛ > 0 and M = 2/ɛ, where r is the least integer number r. Define n s = (s M) M and s = (c 2 F 1) 1 4 n 1 4 s. Easy to verify that all requirements for n s and s given above are satisfied for all s s 0, where s 0 is sufficiently large. We redefine n i = n s0 for all 1 i s 0. Then all these requirements hold for these i trivially. We have in (22) for all n s n < n s1 4(s 1) s n 4(s M) s n s1 = = 4 2(c 2 F 1) 1 4 (s M)(s M 1) M (s M) M 4 18(c 2 F 1) n 4 2/M s 18(c 2 F 1) 1 4 n 3 4 ɛ. Therefore, we obtain E(I( p i, x i )(S i p i )) 18(c2 F 1) n 4 ɛ (23)
12 for all n. Azuma Hoeffding inequality says that for any γ > 0 { } 1 P r V i > γ 2e 2nγ2 (24) n for all n, where V i are martingale differences. We define V i = I( p i, x i )(S i p i ) E(I( p i, x i )(S i p i )) and γ =, where δ > n ln 2 δ Combining (23) with (24), we obtain that for any n and δ > 0, with probability 1 δ, I( p i, x i )(S i p i ) 18(c2 F 1) 1 3 n 4 n 4 ɛ 2 ln 2 δ. The asymptotic relation (4) can be proved using the Borel Cantelli lemma. This proof is similar to the final part of the proof of Theorem 1 below. Theorem 2 is proved. 5 Proof of Theorem 1 At any step i we compute the deterministic forecast p i defined in Section 4 and its randomization to p i using the parameters M = 2/ɛ, = s = 2(c F 1) 1 4 (s M) M 4 and n s = (s M) M, where n s i < n s1. Let also S i 1 be the randomized past price S i 1. In Theorem 2, we have z i = S i 1 and z i = S i 1. The following upper bound directly follows from the method of discretization: I( p i > S i 1 )( S s i 1 S i 1 ) (n t1 n t ) t t=0 4(c 2 F 1) 1 4 n 3 4 ɛ s 4(c 2 F 1) 1 4 n 3 4 ɛ, (25) where n s n < n s1. Here I(p > S) = 1 if p > S and I(p > S) = 0 otherwise. Let D(z) be an arbitrary function from the RKHS F. Clearly, the bound (25) holds if we replace I( p i > S i 1 ) with D 1 D(z i ). First, we give the proof for the case, where D(x) 0 for all x and M i = max{ M i, 0}, where M i is defined on Fig 1. We use the notation ν 1 (n) = 4(c 2 F 1) 1 4 n 3 4 ɛ, (26) ν 2 (n) = 18n 3 4 ɛ (c 2 F 1) 1 n 4 2 ln 2 δ. (27) ν 3 (n) = (c 2 F 1)n (28) All sums below are considered for i = 1,... n. Also, we use the Azuma Hoeffding inequality (24).
13 For any δ > 0, the following chain of equalities and inequalities is valid with probability 1 δ: D 1 Kn M = M i (S i S i 1 ) = (S i S i 1 ) = p i> S i 1 = (S i p i ) ( p i S i 1 ) ( S i 1 S i 1 ) (29) p i> S i 1 p i> S i 1 p i> S i 1 ( p i S i 1 ) ν 1 (n) ν 2 (n) (30) p i> S i 1 = D 1 = D 1 D 1 D(z i )( p i S i 1 ) ν 1 (n) ν 2 (n) = D(z i )(p i S i 1 ) D 1 D 1 D 1 D(z i )( p i p i ) D(z i )( S i 1 S i 1 ) ν 1 (n) ν 2 (n) (31) D(z i )(p i S i 1 ) 3ν 1 (n) ν 2 (n) = (32) D(z i )(S i S i 1 ) D 1 D(z i )(S i p i ) 3ν 1 (n) ν 2 (n) (33) D(z i )(S i S i 1 ) 3ν 1 (n) ν 2 (n) D 1 D F ν 3 (n) = = D 1 K D n 3ν 1 (n) ν 2 (n) D 1 D F ν 3 (n). (34) To pass from (29) to (30), inequality (2) of Theorem 2 and the bound (25) were used, and so the terms (26) and (27) were subtracted. To pass from (31) to (32), the bound (25) was twice applied to intermediate terms, and so the term (25) was subtracted twice. To pass from (32) to (33), inequality (3) of Theorem 2 was used, and so the term (28) was subtracted. In general case, we represent Mi = M i M i, where M i = max{ M i, 0} and M i = min{ M i, 0}, and M i is defined on Fig 1. Also, define D = D D, where D = max{d, 0} and D = min{d, 0}. After that, we obtain (34) for any pair M i, D and M i, D separately and add the results. Therefore, for any D F a constant c > 0 exists such that for any n, with probability 1 δ, K M n D 1 K D n cn 3 4 ɛ n 2 ln 2 δ. (35)
14 Inequality (1) will follow from (35). We apply Borel Cantelli lemma and the 1 Hoeffding inequality. Denote γ = 2n ln 2 δ. Then δ = 2e 2nγ2. Rewrite (35) in the form 1 n KM n D 1 1 n KD n cn 1 4 ɛ γ. (36) According to (35), for any n and γ > 0, inequality (36) is violated with probability 2e 2nγ2. Since the series e 2nγ2 converges, inequality (36) for a fixed γ can be violated no more than for finitely many different n. By the Borel Cantelli lemma the event 1 ( lim inf K M n n n D 1 Kn D ) 0 holds almost surely. Theorem 1 is proved for any D F. Using a universal kernel and the corresponding canonical universal RKHS, we can extend our asymptotic results for all continuous stationary trading strategies D. An RKHS F on X is universal if X is a compact metric space and every continuous function f on X can be approximated arbitrarily well in the metric by a function from F: for any ɛ > 0 there exists D F such that f(x) D(x) ɛ (see Steinwart [12], Definition 4). sup x X We use X = [0, 1]. The Sobolev space F = H 1 ([0, 1]) is the universal RKHS (see Steinwart [12], Vovk [14]). Existence of a universal RKHS on [0, 1] implies a full version of Theorem 1. This result directly follows from inequality (36) and from the possibility to approximate any continuous function f on [0, 1] arbitrarily closely by a function D from the universal RKHS F. The universal consistency property (1) is strictly asymptotic and says nothing about finite data sequences. The convergence bound (35) was obtained for functions from narrower RKHS classes. 6 Conclusion This impressive efficiency of the trading strategy M i can be explained by the restrictive power of continuous functions. A continuous stationary trading strategy D cannot respond sufficiently quickly to information about changes of the value of a future price S i. The optimal trading strategy M i is a discontinuous function, though it is applied to the random variables. A positive argument in favor of the requirement of continuity of D is that it is natural to compete only with computable trading strategies, and continuity is often regarded as a necessary condition for computability (Brouwer s continuity principle ). If D is allowed to be discontinuous, we cannot prove (1) in general case. Moreover, we can prove that for any randomizing trading strategy M i, which randomly takes values 1 and 1 with probabilities varying with time, a (discontinuous) function D(z) also taking values 1 and 1 and the sequences of signals
15 z i and outcomes S i, i = 1, 2,..., exist in the protocol presented on Fig. 1 such that with probability one: ( 1 lim sup Kn M 1 ) n n 2 KD n 0. We can also prove that (1) remain valid in case of discontinuous D if we use randomized signal z i, i.e., if we use the value D( z i ) in the protocol presented on Fig. 1. This research was partially supported by Russian foundation for fundamental research: References 1. Cover, T.: Universal portfolios. Mathematical Finance. 1 (1991) Cover, T., Ordentlich, E.: Universal portfolio with side information. IEEE Transaction on Information Theory. 42 (1996) Cristianini, N,, Shawe-Taylor, J.: An Introduction to Support Vector Machines and other kernel-based learning methods. Cambridge University Press. Cambridge (2000) 4. Dawid, A.P.: The well-calibrated Bayesian [with discussion]. J. Am. Statist. Assoc. 77 (1982) Foster, D.P., Vohra, R.: Asymptotic calibration. Biometrika. 85 (1998) Foster, D.P., Vohra, R.: Calibrated learning and correlated equilibrium. Games and Economic Behavior. 21(1-2) (1997) Foster, D.P., Rakhlin, A., Sridharan, K., Tewari, A.: Complexity-based approach to calibration with checking rules. Journal of Machine Learning Research - Proceedings Track. 19 (2011) Kakade, S.M., Foster, D.P.: Deterministic calibration and Nash equilibrium. LNCS 3120 (John Shawe Taylor and Yoram Singer. ed) (2004) Mannor, S., Stoltz, G.: A geometric proof of calibration. Mathematics of Operations Research. 35(4) (2010) Oakes, D.: Self-Calibrating Priors Do not Exist [with discussion]. J. Am. Statist. Assoc. 80 (1985) Scholkopf, B., Smola, A.: Learning with Kernels. MIT Press. Cambridge MA (2002) 12. Steinwart, I.: On the influence of the kernel on the consistency of support vector machines. Journal of Machine Learning Research 2 (2001) Vovk, V., Takemura, A., Shafer, G.: Defensive forecasting. Proceedings of the 10th International Workshop on Artificial Intelligence and Statistics (ed. by R. G. Cowell and Z. Ghahramani) Cambridge UK: Society for Artificial Intelligence and Statistics (2005) Vovk, V.: On-line regression competitive with reproducing kernel Hilbert spaces (extended abstract). TAMS Lecture Notes in Computer Science Berlin: Springer (2006) Vovk, V.: Predictions as statements and decisions. Theoretical Computer Science. 405(3) (2008) Vovk, V.: Defensive Forecasting for Optimal Prediction with Expert Advice. arxiv: v1 (2007) 17. V yugin, V., Trunov, V.: Universal algorithmic trading. Journal of Investment Strategies. 2 (1) (2012/13) 63 88
Metric Spaces. Chapter 7. 7.1. Metrics
Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
BANACH AND HILBERT SPACE REVIEW
BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
Mathematical Methods of Engineering Analysis
Mathematical Methods of Engineering Analysis Erhan Çinlar Robert J. Vanderbei February 2, 2000 Contents Sets and Functions 1 1 Sets................................... 1 Subsets.............................
Numerical Analysis Lecture Notes
Numerical Analysis Lecture Notes Peter J. Olver 5. Inner Products and Norms The norm of a vector is a measure of its size. Besides the familiar Euclidean norm based on the dot product, there are a number
THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING
THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING 1. Introduction The Black-Scholes theory, which is the main subject of this course and its sequel, is based on the Efficient Market Hypothesis, that arbitrages
Metric Spaces. Chapter 1
Chapter 1 Metric Spaces Many of the arguments you have seen in several variable calculus are almost identical to the corresponding arguments in one variable calculus, especially arguments concerning convergence
x a x 2 (1 + x 2 ) n.
Limits and continuity Suppose that we have a function f : R R. Let a R. We say that f(x) tends to the limit l as x tends to a; lim f(x) = l ; x a if, given any real number ɛ > 0, there exists a real number
An example of a computable
An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept
Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics
Undergraduate Notes in Mathematics Arkansas Tech University Department of Mathematics An Introductory Single Variable Real Analysis: A Learning Approach through Problem Solving Marcel B. Finan c All Rights
Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand
Notes V General Equilibrium: Positive Theory In this lecture we go on considering a general equilibrium model of a private ownership economy. In contrast to the Notes IV, we focus on positive issues such
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
THE CENTRAL LIMIT THEOREM TORONTO
THE CENTRAL LIMIT THEOREM DANIEL RÜDT UNIVERSITY OF TORONTO MARCH, 2010 Contents 1 Introduction 1 2 Mathematical Background 3 3 The Central Limit Theorem 4 4 Examples 4 4.1 Roulette......................................
Monte Carlo Methods in Finance
Author: Yiyang Yang Advisor: Pr. Xiaolin Li, Pr. Zari Rachev Department of Applied Mathematics and Statistics State University of New York at Stony Brook October 2, 2012 Outline Introduction 1 Introduction
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete
17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES
FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES CHRISTOPHER HEIL 1. Cosets and the Quotient Space Any vector space is an abelian group under the operation of vector addition. So, if you are have studied
Lecture 13: Martingales
Lecture 13: Martingales 1. Definition of a Martingale 1.1 Filtrations 1.2 Definition of a martingale and its basic properties 1.3 Sums of independent random variables and related models 1.4 Products of
1 Norms and Vector Spaces
008.10.07.01 1 Norms and Vector Spaces Suppose we have a complex vector space V. A norm is a function f : V R which satisfies (i) f(x) 0 for all x V (ii) f(x + y) f(x) + f(y) for all x,y V (iii) f(λx)
Mathematical Finance
Mathematical Finance Option Pricing under the Risk-Neutral Measure Cory Barnes Department of Mathematics University of Washington June 11, 2013 Outline 1 Probability Background 2 Black Scholes for European
The Advantages and Disadvantages of Online Linear Optimization
LINEAR PROGRAMMING WITH ONLINE LEARNING TATSIANA LEVINA, YURI LEVIN, JEFF MCGILL, AND MIKHAIL NEDIAK SCHOOL OF BUSINESS, QUEEN S UNIVERSITY, 143 UNION ST., KINGSTON, ON, K7L 3N6, CANADA E-MAIL:{TLEVIN,YLEVIN,JMCGILL,MNEDIAK}@BUSINESS.QUEENSU.CA
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
Bayesian logistic betting strategy against probability forecasting. Akimichi Takemura, Univ. Tokyo. November 12, 2012
Bayesian logistic betting strategy against probability forecasting Akimichi Takemura, Univ. Tokyo (joint with Masayuki Kumon, Jing Li and Kei Takeuchi) November 12, 2012 arxiv:1204.3496. To appear in Stochastic
Week 1: Introduction to Online Learning
Week 1: Introduction to Online Learning 1 Introduction This is written based on Prediction, Learning, and Games (ISBN: 2184189 / -21-8418-9 Cesa-Bianchi, Nicolo; Lugosi, Gabor 1.1 A Gentle Start Consider
n k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +...
6 Series We call a normed space (X, ) a Banach space provided that every Cauchy sequence (x n ) in X converges. For example, R with the norm = is an example of Banach space. Now let (x n ) be a sequence
Ideal Class Group and Units
Chapter 4 Ideal Class Group and Units We are now interested in understanding two aspects of ring of integers of number fields: how principal they are (that is, what is the proportion of principal ideals
1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let
Copyright c 2009 by Karl Sigman 1 Stopping Times 1.1 Stopping Times: Definition Given a stochastic process X = {X n : n 0}, a random time τ is a discrete random variable on the same probability space as
SOLUTIONS TO EXERCISES FOR. MATHEMATICS 205A Part 3. Spaces with special properties
SOLUTIONS TO EXERCISES FOR MATHEMATICS 205A Part 3 Fall 2008 III. Spaces with special properties III.1 : Compact spaces I Problems from Munkres, 26, pp. 170 172 3. Show that a finite union of compact subspaces
Online Learning, Stability, and Stochastic Gradient Descent
Online Learning, Stability, and Stochastic Gradient Descent arxiv:1105.4701v3 [cs.lg] 8 Sep 2011 September 9, 2011 Tomaso Poggio, Stephen Voinea, Lorenzo Rosasco CBCL, McGovern Institute, CSAIL, Brain
Chapter 2: Binomial Methods and the Black-Scholes Formula
Chapter 2: Binomial Methods and the Black-Scholes Formula 2.1 Binomial Trees We consider a financial market consisting of a bond B t = B(t), a stock S t = S(t), and a call-option C t = C(t), where the
Lecture 4 Online and streaming algorithms for clustering
CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line
Convex analysis and profit/cost/support functions
CALIFORNIA INSTITUTE OF TECHNOLOGY Division of the Humanities and Social Sciences Convex analysis and profit/cost/support functions KC Border October 2004 Revised January 2009 Let A be a subset of R m
1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: [email protected] Proof: For any element x of the empty set, x is also an element of every set since
Example 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum. asin. k, a, and b. We study stability of the origin x
Lecture 4. LaSalle s Invariance Principle We begin with a motivating eample. Eample 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum Dynamics of a pendulum with friction can be written
The Henstock-Kurzweil-Stieltjes type integral for real functions on a fractal subset of the real line
The Henstock-Kurzweil-Stieltjes type integral for real functions on a fractal subset of the real line D. Bongiorno, G. Corrao Dipartimento di Ingegneria lettrica, lettronica e delle Telecomunicazioni,
Numerical methods for American options
Lecture 9 Numerical methods for American options Lecture Notes by Andrzej Palczewski Computational Finance p. 1 American options The holder of an American option has the right to exercise it at any moment
MA4001 Engineering Mathematics 1 Lecture 10 Limits and Continuity
MA4001 Engineering Mathematics 1 Lecture 10 Limits and Dr. Sarah Mitchell Autumn 2014 Infinite limits If f(x) grows arbitrarily large as x a we say that f(x) has an infinite limit. Example: f(x) = 1 x
Fixed Point Theorems
Fixed Point Theorems Definition: Let X be a set and let T : X X be a function that maps X into itself. (Such a function is often called an operator, a transformation, or a transform on X, and the notation
Irreducibility criteria for compositions and multiplicative convolutions of polynomials with integer coefficients
DOI: 10.2478/auom-2014-0007 An. Şt. Univ. Ovidius Constanţa Vol. 221),2014, 73 84 Irreducibility criteria for compositions and multiplicative convolutions of polynomials with integer coefficients Anca
Stochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
TAKE-AWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION
TAKE-AWAY GAMES ALLEN J. SCHWENK California Institute of Technology, Pasadena, California L INTRODUCTION Several games of Tf take-away?f have become popular. The purpose of this paper is to determine the
HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!
Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following
OPTIMAL CONTROL OF A COMMERCIAL LOAN REPAYMENT PLAN. E.V. Grigorieva. E.N. Khailov
DISCRETE AND CONTINUOUS Website: http://aimsciences.org DYNAMICAL SYSTEMS Supplement Volume 2005 pp. 345 354 OPTIMAL CONTROL OF A COMMERCIAL LOAN REPAYMENT PLAN E.V. Grigorieva Department of Mathematics
Separation Properties for Locally Convex Cones
Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam
Metric Spaces Joseph Muscat 2003 (Last revised May 2009)
1 Distance J Muscat 1 Metric Spaces Joseph Muscat 2003 (Last revised May 2009) (A revised and expanded version of these notes are now published by Springer.) 1 Distance A metric space can be thought of
4: SINGLE-PERIOD MARKET MODELS
4: SINGLE-PERIOD MARKET MODELS Ben Goldys and Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2015 B. Goldys and M. Rutkowski (USydney) Slides 4: Single-Period Market
How to Gamble If You Must
How to Gamble If You Must Kyle Siegrist Department of Mathematical Sciences University of Alabama in Huntsville Abstract In red and black, a player bets, at even stakes, on a sequence of independent games
How To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
ON COMPLETELY CONTINUOUS INTEGRATION OPERATORS OF A VECTOR MEASURE. 1. Introduction
ON COMPLETELY CONTINUOUS INTEGRATION OPERATORS OF A VECTOR MEASURE J.M. CALABUIG, J. RODRÍGUEZ, AND E.A. SÁNCHEZ-PÉREZ Abstract. Let m be a vector measure taking values in a Banach space X. We prove that
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma
E3: PROBABILITY AND STATISTICS lecture notes
E3: PROBABILITY AND STATISTICS lecture notes 2 Contents 1 PROBABILITY THEORY 7 1.1 Experiments and random events............................ 7 1.2 Certain event. Impossible event............................
The Ergodic Theorem and randomness
The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction
Finitely Additive Dynamic Programming and Stochastic Games. Bill Sudderth University of Minnesota
Finitely Additive Dynamic Programming and Stochastic Games Bill Sudderth University of Minnesota 1 Discounted Dynamic Programming Five ingredients: S, A, r, q, β. S - state space A - set of actions q(
MA651 Topology. Lecture 6. Separation Axioms.
MA651 Topology. Lecture 6. Separation Axioms. This text is based on the following books: Fundamental concepts of topology by Peter O Neil Elements of Mathematics: General Topology by Nicolas Bourbaki Counterexamples
The Heat Equation. Lectures INF2320 p. 1/88
The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)
CONSTANT-SIGN SOLUTIONS FOR A NONLINEAR NEUMANN PROBLEM INVOLVING THE DISCRETE p-laplacian. Pasquale Candito and Giuseppina D Aguí
Opuscula Math. 34 no. 4 2014 683 690 http://dx.doi.org/10.7494/opmath.2014.34.4.683 Opuscula Mathematica CONSTANT-SIGN SOLUTIONS FOR A NONLINEAR NEUMANN PROBLEM INVOLVING THE DISCRETE p-laplacian Pasquale
CITY UNIVERSITY LONDON. BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION
No: CITY UNIVERSITY LONDON BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION ENGINEERING MATHEMATICS 2 (resit) EX2005 Date: August
PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5.
PUTNAM TRAINING POLYNOMIALS (Last updated: November 17, 2015) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include
From Binomial Trees to the Black-Scholes Option Pricing Formulas
Lecture 4 From Binomial Trees to the Black-Scholes Option Pricing Formulas In this lecture, we will extend the example in Lecture 2 to a general setting of binomial trees, as an important model for a single
3. INNER PRODUCT SPACES
. INNER PRODUCT SPACES.. Definition So far we have studied abstract vector spaces. These are a generalisation of the geometric spaces R and R. But these have more structure than just that of a vector space.
MATHEMATICS OF FINANCE AND INVESTMENT
MATHEMATICS OF FINANCE AND INVESTMENT G. I. FALIN Department of Probability Theory Faculty of Mechanics & Mathematics Moscow State Lomonosov University Moscow 119992 [email protected] 2 G.I.Falin. Mathematics
Using game-theoretic probability for probability judgment. Glenn Shafer
Workshop on Game-Theoretic Probability and Related Topics Tokyo University February 28, 2008 Using game-theoretic probability for probability judgment Glenn Shafer For 170 years, people have asked whether
Chapter 5. Banach Spaces
9 Chapter 5 Banach Spaces Many linear equations may be formulated in terms of a suitable linear operator acting on a Banach space. In this chapter, we study Banach spaces and linear operators acting on
Linear Risk Management and Optimal Selection of a Limited Number
How to build a probability-free casino Adam Chalcraft CCR La Jolla [email protected] Chris Freiling Cal State San Bernardino [email protected] Randall Dougherty CCR La Jolla [email protected] Jason
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
Mathematics for Econometrics, Fourth Edition
Mathematics for Econometrics, Fourth Edition Phoebus J. Dhrymes 1 July 2012 1 c Phoebus J. Dhrymes, 2012. Preliminary material; not to be cited or disseminated without the author s permission. 2 Contents
Game Theory: Supermodular Games 1
Game Theory: Supermodular Games 1 Christoph Schottmüller 1 License: CC Attribution ShareAlike 4.0 1 / 22 Outline 1 Introduction 2 Model 3 Revision questions and exercises 2 / 22 Motivation I several solution
HEAVISIDE CABLE, THOMSON CABLE AND THE BEST CONSTANT OF A SOBOLEV-TYPE INEQUALITY. Received June 1, 2007; revised September 30, 2007
Scientiae Mathematicae Japonicae Online, e-007, 739 755 739 HEAVISIDE CABLE, THOMSON CABLE AND THE BEST CONSTANT OF A SOBOLEV-TYPE INEQUALITY Yoshinori Kametaka, Kazuo Takemura, Hiroyuki Yamagishi, Atsushi
Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected].
Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected] This paper contains a collection of 31 theorems, lemmas,
Inner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
Chapter 7. Continuity
Chapter 7 Continuity There are many processes and eects that depends on certain set of variables in such a way that a small change in these variables acts as small change in the process. Changes of this
1 Local Brouwer degree
1 Local Brouwer degree Let D R n be an open set and f : S R n be continuous, D S and c R n. Suppose that the set f 1 (c) D is compact. (1) Then the local Brouwer degree of f at c in the set D is defined.
11 Ideals. 11.1 Revisiting Z
11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(
Probability and Statistics Prof. Dr. Somesh Kumar Department of Mathematics Indian Institute of Technology, Kharagpur
Probability and Statistics Prof. Dr. Somesh Kumar Department of Mathematics Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #15 Special Distributions-VI Today, I am going to introduce
TD(0) Leads to Better Policies than Approximate Value Iteration
TD(0) Leads to Better Policies than Approximate Value Iteration Benjamin Van Roy Management Science and Engineering and Electrical Engineering Stanford University Stanford, CA 94305 [email protected] Abstract
Lecture 6 Online and streaming algorithms for clustering
CSE 291: Unsupervised learning Spring 2008 Lecture 6 Online and streaming algorithms for clustering 6.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line
Some Research Problems in Uncertainty Theory
Journal of Uncertain Systems Vol.3, No.1, pp.3-10, 2009 Online at: www.jus.org.uk Some Research Problems in Uncertainty Theory aoding Liu Uncertainty Theory Laboratory, Department of Mathematical Sciences
Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011
Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011 A. Miller 1. Introduction. The definitions of metric space and topological space were developed in the early 1900 s, largely
ALMOST COMMON PRIORS 1. INTRODUCTION
ALMOST COMMON PRIORS ZIV HELLMAN ABSTRACT. What happens when priors are not common? We introduce a measure for how far a type space is from having a common prior, which we term prior distance. If a type
Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1
Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1 J. Zhang Institute of Applied Mathematics, Chongqing University of Posts and Telecommunications, Chongqing
Multiple Kernel Learning on the Limit Order Book
JMLR: Workshop and Conference Proceedings 11 (2010) 167 174 Workshop on Applications of Pattern Analysis Multiple Kernel Learning on the Limit Order Book Tristan Fletcher Zakria Hussain John Shawe-Taylor
Section 4.4 Inner Product Spaces
Section 4.4 Inner Product Spaces In our discussion of vector spaces the specific nature of F as a field, other than the fact that it is a field, has played virtually no role. In this section we no longer
4. Expanding dynamical systems
4.1. Metric definition. 4. Expanding dynamical systems Definition 4.1. Let X be a compact metric space. A map f : X X is said to be expanding if there exist ɛ > 0 and L > 1 such that d(f(x), f(y)) Ld(x,
The Set Covering Machine
Journal of Machine Learning Research 3 (2002) 723-746 Submitted 12/01; Published 12/02 The Set Covering Machine Mario Marchand School of Information Technology and Engineering University of Ottawa Ottawa,
1. Let X and Y be normed spaces and let T B(X, Y ).
Uppsala Universitet Matematiska Institutionen Andreas Strömbergsson Prov i matematik Funktionalanalys Kurs: NVP, Frist. 2005-03-14 Skrivtid: 9 11.30 Tillåtna hjälpmedel: Manuella skrivdon, Kreyszigs bok
Estimating the Average Value of a Function
Estimating the Average Value of a Function Problem: Determine the average value of the function f(x) over the interval [a, b]. Strategy: Choose sample points a = x 0 < x 1 < x 2 < < x n 1 < x n = b and
Online Convex Optimization
E0 370 Statistical Learning heory Lecture 19 Oct 22, 2013 Online Convex Optimization Lecturer: Shivani Agarwal Scribe: Aadirupa 1 Introduction In this lecture we shall look at a fairly general setting
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
