"REGRESSION ANYTIME" WITH BRUTE-FORCE SVD TRUNCATION

被引:0
|
作者
Bender, Christian [1 ]
Schweizer, Nikolaus [2 ]
机构
[1] Saarland Univ, Dept Math, Saarbrucken, Germany
[2] Tilburg Univ, Dept Econometr & OR, Tilburg, Netherlands
来源
ANNALS OF APPLIED PROBABILITY | 2021年 / 31卷 / 03期
关键词
Monte Carlo simulation; least-squares Monte Carlo; regression later; dynamic programming; BSDEs; quantitative finance; statistical learning; SIMULATION; APPROXIMATION; CONVERGENCE; ALGORITHM; PORTFOLIO; OPTIONS; SCHEME; BOUNDS;
D O I
10.1214/20-AAP1615
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
We propose a new least-squares Monte Carlo algorithm for the approximation of conditional expectations in the presence of stochastic derivative weights. The algorithm can serve as a building block for solving dynamic programming equations, which arise, for example, in nonlinear option pricing problems or in probabilistic discretization schemes for fully nonlinear parabolic partial differential equations. Our algorithm can be generically applied when the underlying dynamics stem from an Euler approximation to a stochastic differential equation. A built-in variance reduction ensures that the convergence in the number of samples to the true regression function takes place at an arbitrarily fast polynomial rate, if the problem under consideration is smooth enough.
引用
收藏
页码:1140 / 1179
页数:40
相关论文
共 50 条
  • [41] Research on techniques for detecting brute-force attacks on corporate email
    Liu, Xiaomei
    Hu, Xuewei
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2024, 24 (03) : 1379 - 1393
  • [42] Privacy-Preserving Outsourcing of Brute-Force Key Searches
    Karame, Ghassan O.
    Capkun, Srdjan
    Maurer, Ueli
    PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), 2011, : 101 - 112
  • [43] Transport and imaging of brute-force 13C hyperpolarization
    Hirsch, Matthew L.
    Smith, Bryce A.
    Mattingly, Mark
    Goloshevsky, Artem G.
    Rosay, Melanie
    Kempf, James G.
    JOURNAL OF MAGNETIC RESONANCE, 2015, 261 : 87 - 94
  • [44] BRUTE-FORCE NUCLEAR ORIENTATION - SURVEY OF ACCOMPLISHMENTS AND PROBLEMS TO DATE
    BREWER, WD
    JOURNAL OF LOW TEMPERATURE PHYSICS, 1977, 27 (5-6) : 651 - 682
  • [45] GenoGuard: Protecting Genomic Data against Brute-Force Attacks
    Huang, Zhicong
    Ayday, Erman
    Fellay, Jacques
    Hubaux, Jean-Pierre
    Juels, Ari
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 447 - 462
  • [46] A SURVEY OF RUSSIAN APPROACHES TO PEREBOR (BRUTE-FORCE SEARCH) ALGORITHMS
    TRAKHTENBROT, BA
    ANNALS OF THE HISTORY OF COMPUTING, 1984, 6 (04): : 384 - 399
  • [47] 数据结构Brute-Force算法的实现
    郑盼盼
    电子制作, 2014, (06) : 85 - 86
  • [48] Thoughtful brute-force attack of the RERS 2012 and 2013 Challenges
    van de Pol, Jaco
    Ruys, Theo C.
    te Brinke, Steven
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2014, 16 (05) : 481 - 491
  • [49] An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario
    Molter, H. Gregor
    Ogata, Kei
    Tews, Erik
    Weinmann, Ralf-Philipp
    ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS, 2009, : 82 - +
  • [50] A Brute-Force Algorithm for Reconstructing a Scene from Two Projections
    Enqvist, Olof
    Jiang, Fangyuan
    Kahl, Fredrik
    2011 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2011,