Dissertations / Theses on the topic 'Risk – Mathematical models'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Risk – Mathematical models.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Capelli, Giacomo <1991>. "Mathematical Models for Operational Risk Management." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8599.
Full textNgwenza, Dumisani. "Quantifying Model Risk in Option Pricing and Value-at-Risk Models." Master's thesis, Faculty of Commerce, 2019. http://hdl.handle.net/11427/31059.
Full textSiu, Kin-bong Bonny, and 蕭健邦. "Expected shortfall and value-at-risk under a model with market risk and credit risk." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37727473.
Full textGu, Jiawen, and 古嘉雯. "On credit risk modeling and credit derivatives pricing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/202367.
Full textpublished_or_final_version
Mathematics
Doctoral
Doctor of Philosophy
Gong, Qi, and 龔綺. "Gerber-Shiu function in threshold insurance risk models." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40987966.
Full textLiu, Binbin, and 刘彬彬. "Some topics in risk theory and optimal capital allocation problems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48199291.
Full textpublished_or_final_version
Statistics and Actuarial Science
Doctoral
Doctor of Philosophy
蕭德權 and Tak-kuen Siu. "Risk measures in finance and insurance." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31242297.
Full textRong, Yian, and 戎軼安. "Applications of comonotonicity in risk-sharing and optimal allocation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/207205.
Full textpublished_or_final_version
Statistics and Actuarial Science
Doctoral
Doctor of Philosophy
Basak, Rishi. "Environmental management systems and the intra-firm risk relationship." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0034/MQ64316.pdf.
Full textLi, Tang, and 李唐. "Markov chain models for re-manufacturing systems and credit risk management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40203700.
Full textVeraart, Luitgard Anna Maria. "Mathematical models for market making, option pricing and systemic risk." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613365.
Full textHao, Fangcheng, and 郝方程. "Options pricing and risk measures under regime-switching models." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4714726X.
Full textWei, Zhenghong. "Empirical likelihood based evaluation for value at risk models." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/896.
Full textPowell, Robert. "Industry value at risk in Australia." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/297.
Full textTerciyanli, Erman. "Alternative Mathematical Models For Revenue Management Problems." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610711/index.pdf.
Full textLi, Xiaofei 1972. "Three essays on the pricing of fixed income securities with credit risk." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=84523.
Full textLin, Erlu, and 林尔路. "Analysis of dividend payments for insurance risk models with correlated aggregate claims." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40203992.
Full textLiu, Luyin, and 劉綠茵. "Analysis of some risk processes in ruin theory." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/195992.
Full textpublished_or_final_version
Statistics and Actuarial Science
Master
Master of Philosophy
Zhu, Jinxia, and 朱金霞. "Ruin theory under Markovian regime-switching risk models." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40203980.
Full textMcTaggart, Kevin Andrew. "Hydrodynamics and risk analysis of iceberg impacts with offshore structures." Thesis, University of British Columbia, 1989. http://hdl.handle.net/2429/30733.
Full textApplied Science, Faculty of
Civil Engineering, Department of
Graduate
Chen, Yiqing, and 陳宜清. "Study on insurance risk models with subexponential tails and dependence structures." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841768.
Full textLi, Yuming. "Univariate and multivariate measures of risk aversion and risk premiums with joint normal distribution and applications in portfolio selection models." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26110.
Full textBusiness, Sauder School of
Graduate
Lee, Boram. "Risk perceptions and financial decisions of individual investors." Thesis, University of Stirling, 2013. http://hdl.handle.net/1893/16951.
Full textKwan, Kwok-man, and 關國文. "Ruin theory under a threshold insurance risk model." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B38320034.
Full textSagi, Jacob S. "Partial ordering of risky choices : anchoring, preference for flexibility and applications to asset pricing." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0019/NQ56611.pdf.
Full textWong, Tsun-yu Jeff, and 黃峻儒. "On some Parisian problems in ruin theory." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/206448.
Full textpublished_or_final_version
Statistics and Actuarial Science
Master
Master of Philosophy
Chau, Ki-wai, and 周麒偉. "Fourier-cosine method for insurance risk theory." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/208586.
Full textpublished_or_final_version
Mathematics
Master
Master of Philosophy
Wan, Lai-mei. "Ruin analysis of correlated aggregate claims models." Thesis, Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B30705708.
Full textRouah, Fabrice. "Essays on hedge funds, operational risk, and commodity trading advisors." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=103290.
Full textIn addition to refining estimates of survival time, it is useful to examine how the double fee structure of hedge funds and Commodity Trading Advisors (CTA) affects the incentives of their managers. Young CTAs are usually very small --- they hold few financial assets --- and may not meet their operating expenses with their management fee alone, so their incentive is to take on risk and post good returns. As they grow, their incentive to take on risk diminishes. CTAs in their fifth year diminish their volatility by 25 percent relative to their first year, and diminish returns by 70 percent. We find CTAs to behave more like indexers as they grow, concerned with more with capital preservation than asset management.
Operational risk is a major cause of hedge fund and CTA liquidation. In the banking industry, regulators have called upon institutions to develop models for measuring capital charge for operational losses, and to subject these models to stress testing. Losses are found to be inversely related to GDP growth, and positively related to unemployment. Since losses are thus cyclical, one way to stress test models is to calculate capital charge during good and bad economic regimes. We find loss distributions to have thicker tails during bad regimes. One implication is that banks will likely need to increase their capital charge when economic conditions deteriorate.
Malwandla, Musa. "Loss distributions in consumer credit risk : macroeconomic models for expected and unexpected loss." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/20414.
Full textYE, Zuobin. "A risk-averse newsvendor model with pricing consideration." Digital Commons @ Lingnan University, 2004. https://commons.ln.edu.hk/otd/18.
Full textYeo, Keng Leong Actuarial Studies Australian School of Business UNSW. "Claim dependence in credibility models." Awarded by:University of New South Wales. School of Actuarial Studies, 2006. http://handle.unsw.edu.au/1959.4/25971.
Full textO'Neill, II Martin Joseph. "Computational Epidemiology - Analyzing Exposure Risk: A Deterministic, Agent-Based Approach." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc11017/.
Full textDeng, Hui, and 鄧惠. "Mean-variance optimal portfolio selection with a value-at-risk constraint." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B41897213.
Full textLiao, Mingwei, and 廖明瑋. "Futures hedging on both procurement risk and sales risk under correlated prices and demand." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/206683.
Full textpublished_or_final_version
Industrial and Manufacturing Systems Engineering
Master
Master of Philosophy
Wang, Shuoyu, and 王硕玉. "Optimal inventory strategies in supply chains under a value-at-risk constraint." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B4440704X.
Full textWeber, Stefan. "Measures and models of financial risk." Doctoral thesis, [S.l. : s.n.], 2004. http://deposit.ddb.de/cgi-bin/dokserv?idn=973223421.
Full textOwen, Michelle L. "Exposure model : detailed profiling and quantification of the exposure of personnel to geotechnical hazards in underground mines." University of Western Australia. School of Civil and Resource Engineering, 2004. http://theses.library.uwa.edu.au/adt-WU2005.0031.
Full textLeboho, Nakedi Wilson. "Quantitative Risk Management and Pricing for Equity Based Insurance Guarantees." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96980.
Full textENGLISH ABSTRACT : Equity-based insurance guarantees also known as unit-linked annuities are annuities with embedded exotic, long-term and path-dependent options which can be categorised into variable and equity indexed annuities, whereby investors participate in the security markets through insurance companies that guarantee them a minimum of their invested premiums. The difference between the financial options and options embedded in equity-based policies is that financial ones are financed by the option buyers’ premiums, whereas options of the equity-based policies are financed by also continuous fees that follow the premium paid first by the policyholders during the life of the contracts. Other important dissimilarities are that equity-based policies do not give the owner the right to sell the contract, and carry not just security market related risk, but also insurance related risks such as the selection rate, behavioural, mortality, others and the systematic longevity. Thus equity-based annuities are much complicated insurance products to precisely value and hedge. For insurance companies to successfully fulfil their promise of eventually returning at least initially invested amount to the policyholders, they have to be able to measure and manage risks within the equity-based policies. So in this thesis, we do fair pricing of the variable and equity indexed annuities, then discuss management of financial market and insurance risks management.
AFRIKAANSE OPSOMMING : Aandeel-gebaseerde versekering waarborg ook bekend as eenheid-gekoppelde annuiteite is eksotiese, langtermyn-en pad-afhanklike opsies wat in veranderlike en gelykheid geindekseer annuiteite, waardeur beleggers neem in die sekuriteit markte deur middel van versekering maatskappye wat waarborg hulle ’n minimum van geklassifiseer kan word hulle belˆe premies. Die verskil tussen die finansi¨ele opsies en opsies is ingesluit in aandele-gebaseerde beleid is dat die finansi¨ele mense is gefinansier deur die opsie kopers se premies, terwyl opsies van die aandele-gebaseerde beleid word deur ook deurlopende fooie wat volg op die premie wat betaal word eers deur die polishouers gefinansier gedurende die lewe van die kontrakte. Ander belangrike verskille is dat aandele-gebaseerde beleid gee nie die eienaar die reg om die kontrak te verkoop, en dra nie net markverwante risiko sekuriteit, maar ook versekering risiko’s, soos die seleksie koers, gedrags, sterftes, ander en die sistematiese langslewendheid. So aandeel-gebaseerde annuiteite baie ingewikkeld versekering produkte om presies waarde en heining. Vir versekeringsmaatskappye suksesvol te vervul hul belofte van uiteindelik ten minste aanvanklik belˆe bedrag terug te keer na die polishouers, hulle moet in staat wees om te meet en te bestuur risiko’s binne die aandeel-gebaseerde beleid. So in hierdie tesis, ons doen billike pryse van die veranderlike en gelykheid geïndekseer annuiteite, bespreek dan die bestuur van finansiele markte en versekering risiko’s bestuur.
ROGANTINI, PICCO Anna. "Essays in macroeconomics : fiscal policy, hiring frictions, uncertainty, and risk sharing." Doctoral thesis, European University Institute, 2020. https://hdl.handle.net/1814/69000.
Full textExamining Board: Prof. Evi Pappa (University Carlos III of Madrid); Prof. Leonardo Melosi (European University Institute and Federal Reserve Bank of Chicago); Prof. John Fernald (INSEAD and Federal Reserve Bank of San Francisco); Prof. Antonella Trigari (Bocconi University)
The three chapters of this thesis are inspired by some aspects of the complex world where we live in. The first chapter uncovers the role of firms' hiring decisions as a key source of state dependence in the fiscal spending multiplier. When the hiring rate is high, a larger share of workers has to be relocated from production to recruitment and training of the new hires. This diversion of resources lowers firms' productivity and reduces the effect of government spending stimulus on output. I establish this result using local projections and I illustrate this mechanism building a non-linear dynamic general equilibrium model. The second chapter, joint with Joonseok Oh, shows how uninsurable unemployment risk is crucial to qualitatively and quantitatively match macro responses to uncertainty shocks. Empirically, uncertainty shocks i) generate deflationary pressure; ii) have considerably negative consequences on economic activity; iii) produce a drop in aggregate consumption, which is mainly driven by the response of the households in the bottom 60% of the income distribution. Standard representative-agent New Keynesian models have difficulty to deliver these effects. A heterogeneous-agent framework with search and matching frictions and Calvo pricing allows us to jointly attain these results. Uncertainty shocks induce households' precautionary saving and firms' precautionary pricing behaviors, triggering a fall in aggregate demand and supply. These precautionary behaviors increase the unemployment risk of the imperfectly insured households, who strengthen precautionary saving. When the feedback loop between unemployment risk and precautionary saving is strong enough, a rise in uncertainty leads to i) a drop in action; ii) amplified negative responses of macro variables; iii) heterogeneous consumption responses of households, which are consistent with the empirical evidence. The third chapter, joint with Alessandro Ferrari, empirically evaluates whether adopting a common currency has changed the ability of euro area member states to share risk. We construct a counterfactual dataset of macroeconomic variables through the synthetic control method. We then use the output variance decomposition of Asdrubali, Sorensen and Yosha (1996) on both the actual and the synthetic data to study if there has been a change in risk sharing and through which channels. We find that the euro has reduced consumption smoothing. We further show that this reduction is mainly driven by the periphery countries of the euro area who have experienced a decrease in risk sharing through private credit.
-- 1. Fiscal multipliers : a tale from the labor market -- 2. Macro uncertainty and unemployment risk -- 3. Risk sharing and the adoption of the euro
Chapter 2 ‘Macro uncertainty and unemployment risk' of the PhD thesis draws upon an earlier version published as EUI ECO WP 2019/02 and Chapter 3 ‘Risk sharing and the adoption of the Euro' of the PhD thesis draws upon an earlier version published as ESM Working Paper Series 17/2016 and as ADEMU Working Paper Series 2017/055.
Almohri, Hussain. "High Assurance Models for Secure Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/22030.
Full textComplex attacks on large networks are only possible with the existence of vulnerable intermediate machines, routers, or mobile devices (that we refer to as network components) in the network. Vulnerabilities in highly connected servers and workstations, that compromise the heart of today\'s networks, are inevitable. Also, modern mobile devices with known vulnerabilities cause an increasing risk on large networks. Thus, weak security mechanisms in vulnerable network components open the possibilities for effective network attacks.
On the other hand, lack of systematic methods for an effective static analysis of an overall complex network results in inconsistent and vulnerable configurations at individual network components as well as at the network level. For example, inconsistency and faults in designing firewall rules at a host may result in enabling more attack vector. Further, the dynamic nature of networks with changing network configurations, machine availability and connectivity, make the security analysis a challenging task.
This work presents a hybrid approach to security by providing two solutions for analyzing the overall security of large organizational networks, and a runtime framework for protecting individual network components against misuse of system resources by cyber attackers. We observe that to secure an overall computing environment, a static analysis of a network is not sufficient. Thus, we couple our analysis with a framework to secure individual network components including high performance machines as well as mobile devices that repeatedly enter and leave networks. We also realize the need for advancing the theoretical foundations for analyzing the security of large networks.
To analyze the security of large enterprise network, we present the first scientific attempt to compute an optimized distribution of defensive resources with the objective of minimizing the chances of successful attacks. To achieve this minimization, we develop a rigorous probabilistic model that quantitatively measures the chances of a successful attack on any network component. Our model provides a solid theoretical foundation that enables efficient computation of unknown success probabilities on every stage of a network attack. We design an algorithm that uses the computed attack probabilities for optimizing security configurations of a network. Our optimization algorithm uses state of the art sequential linear programming to approximate the solution to a complex single objective nonlinear minimization problem that formalizes various attack steps and candidate defenses at the granularity of attack stages.
To protect individual network components, we develop a new approach under our novel idea of em process authentication.
We argue that to provide high assurance security, enforcing authorization is necessary but not sufficient. In fact, existing authorization systems lack a strong and reliable process authentication model for preventing the execution of malicious processes (i.e., processes that intentionally contain malicious goals that violate integrity and confidentiality of legitimate processes and data). Authentication is specially critical when malicious processes may use various system vulnerabilities to install on the system and stealthily execute without the user\'s consent.
We design and implement the Application Authentication (A2) framework that is capable of monitoring application executions and ensuring proper authentication of application processes. A2 has the advantage of strong security guarantees, efficient runtime execution, and compatibility with legacy applications. This authentication framework reduces the risk of infection by powerful malicious applications that may disrupt proper execution of legitimate applications, steal users\' private data, and spread across the entire organizational network.
Our process authentication model is extended and applied to the Android platform. As Android imposes its unique challenges (e.g., virtualized application execution model), our design and implementation of process authentication is extended to address these challenges. Per our results, process authentication in Android can protect the system against various critical vulnerabilities such as privilege escalation attacks and drive by downloads.
To demonstrate process authentication in Android, we implement DroidBarrier. As a runtime system, DroidBarrier includes an authentication component and a lightweight permission system to protect legitimate applications and secret authentication information in the file system. Our implementation of DroidBarrier is compatible with the Android runtime (with no need for modifications) and shows efficient performance with negligible penalties in I/O operations and process creations.
Ph. D.
"Inventory models with downside risk measures." Thesis, 2007. http://library.cuhk.edu.hk/record=b6074502.
Full textIn this thesis we study three supply chain models which address downside risk from a different angle. We start with a commitment-option supply contract in a Conditional Value-at-Risk (CVaR) framework. We show that a CVaR trade-off analysis with advanced reservation can be carried out efficiently. Moreover, our study indicates how the corresponding contract decisions differ from decisions for optimizing an expected value.
Key words. Downside Risk Measure; CVaR; Risk; Loss-Averse; Dynamic Programming.
Owing to the growing globalization in economy and the advances in commerce, research in supply chain management has attracted large number of researchers in the last two decades. Yet standard treatments of supply chain models are mainly confined for the optimization of expected values with little reflection on risk considerations. Even for those that consider a risk measure in the objective function, there are quite few literatures employing downside risk measure. The downside risk measure takes into account only the part of the distribution that is below a critical value. Thus it indicates a safety-first strategy for decision maker.
The thesis is organized in five chapters. In Chapter 1, we provide the background and research motivation for considering downside risk measures in supply chain models. In Chapter 2, we study the pay-to-delay supply contracts with a Conditional Value-at-Risk (CVaR) framework. In Chapter 3, we study the loss-averse newsvendor problem. In Chapter 4, we extend the loss-averse model to a multi-period setting. We conclude the thesis in Chapter 5 with discussions for future research.
Then, we employ a loss-aversion utility function to characterize newsvendor's decision-making behavior. We find that when there is no shortage cost, the loss-averse newsvendor consistently orders less than a risk-neutral newsvendor. Further, we discover that the loss-averse newsvendor orders a constant quantity when the reference target is sufficiently large. We discuss the importance of initial inventory to achieve the target profit level. When the target is a decision variable, the newsvendor always sets the target no higher or no lower.
Ma, Lijun.
"October 2007."
Adviser: Houmin Yan.
Source: Dissertation Abstracts International, Volume: 69-08, Section: B, page: 5003.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2007.
Includes bibliographical references (p. 140-154).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
"Systematic component in default risk." 2009. http://library.cuhk.edu.hk/record=b5894038.
Full text"The term structure of credit risk." Thesis, 2000. http://library.cuhk.edu.hk/record=b6073914.
Full textHu Wen-wei.
"August 2000."
Adviser: Jia He.
Source: Dissertation Abstracts International, Volume: 61-08, Section: A, page: 3284.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2000.
Includes bibliographical references (p. 93-111).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. Ann Arbor, MI : ProQuest dissertations and theses, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
Sokolova, Ekaterina 1978. "Indifference valuation in non-reduced incomplete models with a stochastic risk factor." Thesis, 2007. http://hdl.handle.net/2152/3695.
Full text"On testing structural models of credit risk." 2005. http://library.cuhk.edu.hk/record=b5892687.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2005.
Includes bibliographical references (leaves 85-88).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Structural models of credit risk --- p.9
Chapter 2.1 --- The original Merton model --- p.10
Chapter 2.2 --- The extended Merton model --- p.11
Chapter 2.3 --- The Black and Cox model --- p.12
Chapter 2.4 --- The LS model --- p.14
Chapter 2.5 --- The CDG model --- p.16
Chapter 2.6 --- Comments on structural models --- p.19
Chapter 3 --- Proxies and their implications --- p.20
Chapter 3.1 --- Reviews of the EHH's empirical studies --- p.20
Chapter 3.2 --- The proxy for market values of firms --- p.23
Chapter 3.2.1 --- Zero coupon bonds under the Merton model --- p.23
Chapter 3.2.2 --- Coupon bearing bonds under the extended Merton model --- p.25
Chapter 3.2.3 --- Zero coupon bonds under the LS model --- p.26
Chapter 3.2.4 --- Coupon bearing bonds under the LS model --- p.28
Chapter 3.3 --- Implications of other proxies --- p.29
Chapter 4 --- Maximum Likelihood Estimation --- p.33
Chapter 4.1 --- The MLE approach for the Merton model --- p.33
Chapter 4.2 --- The MLE approach for the barrier dependent models --- p.35
Chapter 4.3 --- Survivorship consideration --- p.36
Chapter 4.4 --- Simulation tests --- p.37
Chapter 4.5 --- Simulation results --- p.39
Chapter 4.5.1 --- Simulation results for the Merton model --- p.39
Chapter 4.5.2 --- Simulation results for the LS model --- p.42
Chapter 5 --- Empirical test --- p.47
Chapter 5.1 --- Criteria of bond selection --- p.47
Chapter 5.2 --- Parameters of models --- p.51
Chapter 5.2.1 --- Firm specific parameters --- p.51
Chapter 5.2.2 --- Interest rate parameters --- p.54
Chapter 5.2.3 --- Stationary leverage process parameters --- p.55
Chapter 5.2.4 --- Bond specific parameters --- p.57
Chapter 5.3 --- Empirical results --- p.58
Chapter 5.3.1 --- Empirical results for the Merton model --- p.59
Chapter 5.3.2 --- Empirical results for the LS model --- p.66
Chapter 5.3.3 --- Empirical results for the CDG model --- p.71
Chapter 6 --- Conclusion --- p.77
Appendix --- p.80
Chapter A.1 --- Appendix 1 --- p.80
Chapter A.2 --- Appendix 2 --- p.82
Chapter A.3 --- Appendix 3 --- p.84
Bibliography --- p.85
Sypkens, Roelf. "Risk properties and parameter estimation on mean reversion and Garch models." Diss., 2010. http://hdl.handle.net/10500/4049.
Full textMathematical Sciences
M.Sc. (Applied Mathematics)
"A downside risk analysis based on financial index tracking models." 2003. http://library.cuhk.edu.hk/record=b5891530.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2003.
Includes bibliographical references (leaves 81-84).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Literature Review --- p.4
Chapter 3 --- An Index Tracking Model with Downside Chance Risk Mea- sure --- p.12
Chapter 3.1 --- Statement of the Model --- p.13
Chapter 3.2 --- Efficient Frontier --- p.16
Chapter 3.3 --- Application of the Downside Chance Index Tracking Model --- p.29
Chapter 3.4 --- Chapter Summary --- p.34
Chapter 4 --- Index Tracking Models with High Order Moment Downside Risk Measure --- p.35
Chapter 4.1 --- Statement of the Models --- p.35
Chapter 4.2 --- Mean-Downside Deviation Financial Index Tracking Model --- p.38
Chapter 4.3 --- Chapter Summary --- p.45
Chapter 5 --- Numerical Analysis --- p.45
Chapter 5.1 --- Data Analysis --- p.45
Chapter 5.2 --- Experiment Description and Discussion --- p.48
Chapter 5.2.1 --- Efficient Frontiers --- p.48
Chapter 5.2.2 --- Monthly Expected Rate of Return --- p.50
Chapter 5.3 --- Chapter Summary --- p.52
Chapter 6 --- Summary --- p.54
Chapter A --- List of Companies --- p.57
Chapter B --- Graphical Result of Section 5.2.1 --- p.61
Chapter C --- Graphical Result of Section 5.2.2 --- p.67
Chapter D --- Proof in Chapter 3 and Chapter4 --- p.73
Bibliography --- p.81
Doran, James Stephen. "On the market price of volatility risk." Thesis, 2004. http://hdl.handle.net/2152/1951.
Full text"Multi-period cooperative investment game with risk." 2008. http://library.cuhk.edu.hk/record=b5893772.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2008.
Includes bibliographical references (leaves 89-91).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Background --- p.1
Chapter 1.2 --- Aims and objectives --- p.2
Chapter 1.3 --- Outline of the thesis --- p.3
Chapter 2 --- Literature Review --- p.6
Chapter 2.1 --- Portfolio Optimization Problems --- p.6
Chapter 2.2 --- Cooperative Games and Cooperative Investment Models --- p.8
Chapter 2.2.1 --- Linear Production Games And Basic Concepts of Co- operative Game Theory --- p.9
Chapter 2.2.2 --- Investment Models Using Linear Production Games --- p.12
Chapter 3 --- Multi-period Cooperative Investment Games: Basic Model --- p.15
Chapter 3.1 --- Cooperative Investment Game under Deterministic Case --- p.16
Chapter 3.2 --- Cooperative Investment Game with Stochastic Return --- p.18
Chapter 3.2.1 --- Basic Assumptions --- p.18
Chapter 3.2.2 --- Choose the Proper Risk Measure --- p.20
Chapter 3.2.3 --- One Period Case --- p.21
Chapter 3.2.4 --- Multi-Period Case --- p.23
Chapter 4 --- The Two-Period Investment Game under L∞ Risk Measure --- p.26
Chapter 4.1 --- The Two Period Model --- p.26
Chapter 4.2 --- The Algorithm --- p.35
Chapter 4.3 --- Optimal Solution of the Dual --- p.41
Chapter 5 --- Primal Solution and Stability of the Core under Two-Period Case --- p.43
Chapter 5.1 --- Direct Results --- p.44
Chapter 5.2 --- Find the Optimal Solutions of the Primal Problem --- p.46
Chapter 5.3 --- Relationship between A and the Core --- p.53
Chapter 5.3.1 --- Tracing out the efficient frontier --- p.54
Chapter 6 --- Multi-Period Case --- p.63
Chapter 6.1 --- Common Risk Price and the Negotiation Process with Concave Risk Utility --- p.64
Chapter 6.1.1 --- Existence of Common Risk Price and Core --- p.65
Chapter 6.1.2 --- Negotiation Process --- p.68
Chapter 6.2 --- Modified Simplex Method --- p.71
Chapter 7 --- Other Risk Measures --- p.76
Chapter 7.1 --- The Downside Risk Measure --- p.76
Chapter 7.1.1 --- Discrete (Finite Scenario) Distributions --- p.78
Chapter 7.1.2 --- General Distributions --- p.81
Chapter 7.2 --- Coherent Risk Measure and CVaR --- p.83
Chapter 8 --- Conclusion and Future Work --- p.87