Analysis of Binomial Congestion Control Λ
|
|
- Melina Manning
- 5 years ago
- Views:
Transcription
1 Analysis of Binomial Congestion Control Λ Y. Richard Yang, Simon S. Lam Deartment of Comuter Sciences The University of Texas at Austin Austin, TX fyangyang, TR June 8, Introduction Binomial congestion control was roosed by Bansal and Balakrishnan in [2]. However, the sending rate derivation in [2] is greatly simlied and does not consider the effect of timeouts. Further, even though the authors use ff = 1 and =0:6 for TCP-friendliness in their exeriments; this selection is not justied by their analysis. On the contrary, according to the authors, for ff = 1, they should select such that ff = 1, therefore, =0:5. 0:5 The motivation of this aer is to analyze the sending rate of binomial congestion window adjustment olicy, considering both trili-dulicate loss indications and timeout loss indications. We also consider the selection of ff and for IIAD and SQRT congestion control strategies [2] to be TCP-friendly. This aer suggests that the authors of Binomial should test their rotocol under higher loss scenarios. The balance of this aer is as follows. In Section 2, we describe the Binomial congestion control and state the analysis assumtions. The detail of the derivations is ut in the Aendix. In Section 3, we use the sending rate formula to derive conditions under which a Binomial flow is TCP-friendly. Λ Research sonsored in art by National Science Foundation grant No. ANI and grant no. ANI Exeriments were erformed on euiment rocured with NSF grant no. CDA
2 2 Model and Analysis Assumtions Formally, the Binomial window adjustment olicy is ρ wt+r ψ w t + ff=w k t if no loss w t+ft ψ w t w l t when loss (1) We can see that TCP is a secial case when k = 0, l = 1. In this aer, we analysis the two cases considered by the authors: when k = 1, l = 0, whichis called IIAD (inverse-increase/additive decrease) and k = l = 0:5, which is called SQRT (suare-root). Window adjustment olicy, however, is only one comonent of a comlete congestion control rotocol. Other mechanisms such as congestion detection and round-tri time estimation are needed to make a comlete rotocol. Since TCP congestion control has been studied extensively for many years, Binomial adots these other mechanisms from TCP Reno [5, 6, 8, 1]. In the next subsection, we give a brief descrition of the Binomial congestion window adjustment algorithm. All other algorithms are the same as those of TCP Reno. 2.1 Congestion window adjustment A Binomial session begins in the slowstart state. In this state, the congestion window size is doubled for every window of ackets acknowledged. Uon the rst congestion indication, the congestion window size is cut in half and the session enters the congestion avoidance state. In this state, the congestion window size is increased by ff=w k in each round-tri time, where W is the current congestion window size. Notice that in this analysis we assume that the receiver returns one new ACK for each received data acket. It is straightforward to extend the analysis to consider delayed ACK. Binomial reduces the window size when congestion is detected. Same as TCP Reno, Binomial detects congestion by two events: triledulicate ACK and timeout. If congestion is detected by a trile-dulicate ACK, Binomial changes the window size to W W l. If the congestion indication is a timeout, the window size is set to Modeling assumtions The assumtions and simlications made in this analysis are summarized below. ffl We assume that the sender always has data to send (i.e., a saturated sender). The receiver always advertises a large enough receiver window size such that the send window size is determined by the Binomial congestion window size. 2
3 ffl The sending rate is a random rocess. We have limited our efforts to modeling the mean value of the sending rate. An interesting future toic will be to study the variance of the sending rate which is beyond the scoe of this aer. ffl We focus on Binomial s congestion avoidance mechanisms. The imact of slowstart has been ignored. ffl We model Binomial s congestion avoidance behavior in terms of rounds. A round starts with the back-to-back transmission of W ackets, where W is the current window size. Once all ackets falling within the congestion window have been sent in this back-to-back manner, no more acket is sent until the rst ACK is received for one of the W ackets. This ACK recetion marks the end of the current round and the beginning of the next round. In this model, the duration of a round is eual to the round-tri time and is assumed to be indeendent of the window size. Also, it is assumed that the time needed to send all of the ackets in a window is smaller than the round-tri time. ffl We assume that losses in different rounds are indeendent. When a acket in a round is lost, however, we assume all ackets following it in the same round are also lost. Therefore, is dened to be the robability that a acket is lost, given that it is either the rst acket in its round or the receding acket in its round is not lost [7]. ffl To void having too many arameters, we assume that the receiver returns one new ACK for each received data acket, i.e., no delayed ACK. To model the effect of delayed ACK, we can simly relace all ff with ff=b,whereff is the increasing arameter, and b is the number of data ackets before an ACK is sent. ffl To derive an analytic result, sometimes in the analysis we assume E[W t ] ß E[W ] t,wherew is the window size and t 2 (0; 1). 3 TCP-friendly Binomial Congestion Control As derived in Aendix, the sending rate of both IIAD and SQRT can be exressed as T Binomial (ff; ; ; R; T 0 ) ß R ff + T 0 min 1 1; 3 ff ( ) (2) 3
4 where is the loss rate, R the mean round-tri time, and T 0 the timeout. We should emhasize that to derive (2), in some cases we have assumed is small. For detail, refer to the Aendix. To be TCP-friendly, we need to match T Binomial (ff; ; ; R; T 0 ) to that of TCP sending rate formula, which is T TCP (; R; T 0 ) ß R T 0 min 1 1; ( ) (3) Under low loss scenario, the rst terms in the denominators of (2) and (3) dominates, and we have the exression: ff = 2 (4) 3 For examle, when the Binomial congestion control uses ff = 1, we select =0:66 so that the control is TCP-friendly. To consider the sensitivity of the TCP-friendliness on the arameters, we dene F (ff; ) = = R R r (5) ff Under small loss rate, F is the relative throughut of a IIAD/SQRT flow and a TCP flow. Figure 1 lots F as a function of when ff =1. Comare Figure 1 with the exerimental results in Figure 16 of [2], we nd that the two gures are very similar. This can be considered a validation of (2). However, it is imortant to oint out that F is valid only when loss rate is small. When loss rate is high, we should use the comlete sending rate formula to derive the TCP-friendly ff and, using the methods as in [?]. It also suggests that the authors of Binomial should evaluate Binomial under high loss scenarios. 3 2ff (6) 4
5 Fairness sensitivity to beta F(beta) 1 F = TCP / Binomial beta Figure 1: F as a function of when ff =1 A Sending Rate Derivation We carry the derivation in two stes. In the rst ste, we only consider the case when congestion indications are exclusively of tye trile dulicate ACK (TD). In the next ste, we consider both TD and timeout loss indications. A.1 Congestion indications are exclusively trile-dulicate ACKs We rst consider the case when congestion indications are exclusively of tye trile dulicate ACK (TD). Consider a Binomial flow starting at time t =0.For any given time t>0,denen t as the number of ackets transmitted in the interval [0;t], andt t = N t =t, the sending rate on that interval. Note that T t is the number of ackets sent er unit of time regardless of their eventual fate (i.e. whether they are received or not). Thus, T t reresents the sending rate of the connection. We dene the long-term steady-state rate T to be T = t!1 lim T N t t = t!1 lim t Dene a TD eriod (TDP) to be the interval of time between two TD congestion indications. For the ith TD eriod we dene random variable Y i as the number of ackets send in the eriod, A i the duration of the eriod, and W i the window size at the end of the eriod. Consider fw i g to be a Markov regenerative rocess with rewards fy i g. From renewal theory [3, 4], we know that (7) T = E[Y ] E[A] (8) 5
6 In order to derive an exression for T, the long-term steady-state Binomial sending rate, we next derive exressions for the means of Y and A. Consider a TD eriod as in Figure 2. Packets sent W i ACKed Packt Lost acket W i-1 βw i η i -1 η i θ i TD occurs TDP ends X i Number of rounds TDP i - l Figure 2: A trile-dulicate eriod (TDP) A TD eriod starts immediately after a TD congestion indication, and thus the congestion window size at the start of the ith TD eriod is eual to W i 1 W l. i 1 At the end of each round, the window is incremented by ff=w k,wherew is the window size at the beginning of the round. We denote by i the rst acket lost in TDP i,andx i the round where this loss occurs. After acket i, W i 1 more ackets are sent in an additional round before a TD congestion indication occurs (and the current TD eriod ends). Thus a total of Y i = i + W i 1 ackets are sent in X i +1rounds. It follows that: E[Y ]=E[ ] +E[W ] 1 (9) To derive E[ ], consider a random rocess f i g,where i is the number of ackets sent in a TD eriod u to and including the rst acket that is lost. Based on the assumtion that ackets are lost in a round indeendently of any ackets lost in other rounds, f i g is a seuence of indeendent and identically distributed (i.i.d.) random variables. Given the loss model, the robability of i = k is eual to the robability that exactly k 1 ackets are successfully acknowledged before a loss occurs P [ = k] =(1 ) k 1 ; k =1; 2;::: (10) 6
7 The mean of is thus E[ ] = 1X k=1 (1 ) k 1 k = 1 (11) Plugging (11) into (9), we have E[Y ]= 1 + E[W ] (12) To derive E[W ] and E[A], consider again TDP i. Dene r ij to be P the duration of the jth round of TDP i. Then, the duration of TDP i is A i = i +1 X j=1 r ij. Consider the round-tri time r ij to be random variables that are assumed to be indeendent of congestion window size, and thus indeendent of the round number, j. It follows that E[A] =(E[X] +1)E[r] (13) Henceforth, let R = E[r] denote the average value of the round-tri time. Finally, to derive an exression for E[X], consider the evolution of W i as a function of the number of rounds. First we observe that during the ith TD eriod, the window size increases between W i 1 W l and W i 1 i (see Figure 2). Consider the differential euation: dw dt = ff RW k (14) Solve the differential euation, we have that for t 2 [0;RX i ] W (t) = ff(k +1) R )k+1 1 t + W k+1 k+1 l 1 (1 W i 1 i 1 (15) From (15), and lug in W (RX i )=W i, we solve the exression for X i as 1 X i = W k+1 i W k+1 l 1 i 1 (1 Wi 1 (k +1)ff )k+1 (16) The fact that Y i ackets are transmitted in TDP i is exressed by Y i = Z RXi 0 W (t)dt + i (17) W k+2 i W k+2 l 1 (1 W i 1 = ff(k +2) 7 i 1 )k+2 + i (18)
8 where i is the number of ackets sent in the last round. Consider that i,the number of ackets in the last round, is uniformly distributed between 1 and W i, and thus E[ ] =E[W ]=2 (19) fw i g is a Markov rocess for which a stationary distribution can be obtained numerically. However, a simler aroximate solution can be obtained. Next, we consider two secial cases. The rst case is called IIAD (inverseincrease/additive decrease); the second, SQRT (because the increase and decrease are roortional to the suare-root of the current window). A.1.1 IIAD (k = 1, l= 0) First, lug in k =1, l =0into (16), we have X i = 1 2ff Take exectation on (20), and we have W 2 i (W i 1 ) 2 (20) 2E[W ] 2 E[X] = (21) 2ff Plug in k = 1, l = 0 into (18), take exectations on both sides, comare to (12), we have 1 + E[W ] 2» W 3 (W ) 3 ) = E 3ff = 3E[W 2 ] 3 2 E[W ]+ 3 (23) 3ff Since Var[W ]=E[W 2 ] E[W ] 2, and we assume the variance of W is small, therefore, we can aroximate E[W 2 ] by E[W ] 2. We solve the Euation (23) and derive the exression for E[W ] as E[W ] ß ff Simlify, and we have + s E[W ]= (22) ff + 3ff2 48ff +12ff (24) r ff + o(1= ) (25) 8
9 Therefore, for small value of,wehave E[W ] ß r ff (26) According to (21), and lug in the exression for E[W ], we can derive the exression for E[X], simlify, and we have E[X] = s ff + o(1= ) (27) Next, consider the derivation for E[A]. Plugging the exression for E[X] into (13), we have E[A] = R(E[X] +1) (28) = R s ff + o(1= ) (29) Then, according to (8) for T, (12) for E[Y ], (24) for E[W ], (29) for E[A], we have T = ß 1 1 R + E[W ] E[A] + ff ff (30) (31) Simlify, and we have T ß 1 R r ff + o(1= ) (32) A.1.2 SQRT (k = l = 0.5) First, lug in k = l = 0:5 into (16), we have X i = 1 1:5ff W 1:5 i (W i 1 W 0:5 i 1 )1:5 Assume E[W t ] ß E[W ] t, take exectations on (33), we have (33) E[X] = E[W ] 1:5 E[W ] 1:5 (1 9 1:5ff E[W ] )1:5 (34)
10 Plug in k = l = 0:5 into (18), take exectations on both sides, assume E[W t ] ß E[W ] t, and comare to (12), we have 1 + E[W ] 2 E[W ] 2:5 (1 (1 = 2:5ff E[W ] )2:5 ) To get an analytical exression for E[W ], aroximate (1 2:5, we solve the euation to get E[W ] E[W ]= ff s ff ff 1 (35) E[W ] )2:5 as 1 (36) Simlify, and we have r ff E[W ]= + o(1= ) (37) Therefore, for small value of,wehave r ff E[W ] ß (38) Plug in (36) into (34), simlify, and we have E[X] = s ff + o(1= ) (39) Next, consider the derivation for E[A]. Plug in the exression for E[X] into (13), we have have E[A] = R(E[X] +1) (40) = R s ff + o(1= ) (41) Then, according to (8) for T, (12) for E[Y ], (36) for E[W ], (41) for E[A], we have T = ß 1 1 R 10 + E[W ] E[A] + ff ff (42) (43)
11 Simlify, and we have T ß 1 R r ff + o(1= ) (44) Summarize the result for IIAD and SQRT, we found that for both cases, and E[W ] ß E[X] ß r ff s ff (45) (46) A.2 Congestion indications are trile-dulicate ACKs and timeouts Next, we extend the analysis to include timeouts. The derivation in this section is the same as in [7] excet for ^Q(E(W )). However, we include it here for comleteness. In the revious section, we considered Binomial flows where all congestion indications are due to trile-dulicate ACKs. However, under certain circumstances the majority of window decreases can be due to timeouts. Therefore, a good model should also cature timeout congestion indications. Timeout occurs when ackets (or ACKs) are lost, and less than three dulicate ACKs are received. The sender waits for a eriod of time denoted by T 0,andthen retransmits the rst unacknowledged acket. Following a timeout, the congestion window is reduced to one, and one acket is resent in the rst round after a timeout. If this retransmission is unsuccessful, the eriod of timeout doubles to 2T 0 ;this doubling is reeated for each unsuccessful retransmission until 64T 0 is reached, after which the timeout eriod remains constant at 64T 0. Figure 3 shows a trace with both TDP and timeouts. W i2 W i3 W W i1 R =2 i t i A i1 A i2 A i3 T 0 2T 0 TD Z i Z i TO 4T 0 t S i Figure 3: A trace with both TDP and timeouts 11
12 Let Zi TO denote the duration of a seuence of timeouts and Zi TD interval between two consecutive timeout seuences. Dene S i to be the time S i = Z TD i + Z TO i (47) Also, dene M i to be the number of ackets sent during S i.thenf(s i ;M i )g is an i.i.d seuence of random variables, and we have T = E[M ] E[S] (48) Extend the denition of TD eriod dened reviously to include eriods starting after, or ending in, a TO congestion indication (besides eriods between two TD congestion indications). Let n i be the number of TD eriods in interval Zi TD. For the jth TD eriod of interval Zi TD we dene Y ij to be the number of ackets sent in the eriod, A ij to be the duration of the eriod, X ij to be the number of rounds in the eriod, and W ij to be the window size at the end of the eriod. Also, R i denotes the number of ackets sent during timeout seuence Zi TO.Wehave M i = S i = Xn i j=1 Xn i j=1 Y ij + R i A ij + Z TO i And thus, E[M ] = E[ E[S] = E[ Xn i j=1 Xn i j=1 Y ij ]+E[R] (49) A ij ]+E[Z TO ] (50) If n i is an i.i.d. seuence of random variables, indeendent of fy ij g and fa ij g, then for any i we have E[( E[( Xn i j=1 Xn i j=1 Y ij ) i ] = E[n]E[Y ] (51) A ij ) i ] = E[n]E[A] (52) 12
13 To derive E[n], observe that, during Zi TD, the time between two consecutive timeout seuences, there are n i TDPs, where each of the rst n i 1 end in a TD, and the last TDP ends in a TO. It follows that in Zi TD there is one TO out of n i loss indications. Therefore, if we denote by Q the robability that a congestion indication ending a TDP is a TO, we have Q =1=E[n]. Conseuently, T = E[Y ]+QE[R] E[A] +QE[Z TO ] (53) Since Y ij and A ij do not deend on timeouts, their means are those derived before. However, we still need to derive exressions for Q, E[R], E[Z TO ]. seuence number s k LEGEND received acket lost acket ACK k s m+1 m f w s 1 TD occurs, TDP ends f k+1 w f k k f 1 RTT enultimate round RTT last round time Figure 4: Packet and ACK transmissions receding a loss indication First consider Q. Consider the round of ackets where a loss indication occurs; this round will be referred to as the enultimate round (see Figure 4). We choose the ACK such that ACKs acknowledge individual ackets (i.e. ACKs are not delayed). We will see that the analysis does not deend on whether ACKs are delayed or not. Let w be the current window size. Thus acket f 1 ;::: ;f w are sent in the enultimate round. Packets f 1 ;::: ;f k are acknowledged, and ackets f k+1 is the rst acket to be lost (or not ACKed). We again assume acket losses are correlated within a round: if a acket is lost, so too are all ackets that follow, until the end of the round. Thus all ackets following f k+1 are also lost. However, since ackets f 1 ;::: ;f k are ACKed, another k ackets, s 1 ;::: ;s k are sent in the next round, which we refer to the last round. This round of acket may have another loss, say acket s m+1. Again, our assumtion on acket loss correlation mandates that ackets s m+2 ;::: ;s k are also lost in the last round. The m ackets 13
14 successfully sent in the last round are resonded to by ACKs for acket f k,which are counted as dulicate ACKs. These ACKs are not delayed, so the number of dulicate ACKs is eual to the number of successfully received ackets in the last round. If the number of such ACKs is higher than three, then a TD indication occurs, otherwise a TO occurs. In both cases the current eriod ends. We denote by A(w; k) the robability that rst k ackets are ACKed in a round of w ackets, given there is a seuence of one or more losses in the round. Then A(w; k) = (1 )k 1 (1 ) w (54) Also, let C(n; m) denote the robability that m ackets are ACKed in seuence in the last round (where n ackets are sent) and the rest of the ackets in the round, if any are lost. Then C(n; m) = ρ (1 ) m if m» n-1 (1 ) n otherwise (55) by Then, ^Q(m), the robability that a loss in a window of size w isato,isgiven ^Q(w) =ρ 1 P if w» 3 2 A(w; k=0 k) +P w A(w; k)p 2 k=3 After some algebraic maniulation, we have ^Q(w) = min Observe that m=0 C(k; m) otherwise (56) 1; (1 (1 )3 )(1 + (1 ) 3 (1 (1 ) w 3 )) 1 (1 ) w (57) lim ^Q(w) = 3!0 w (58) A numerical aroximation of ^Q(w) then is ^Q(w) ß min(1; 3 w ) (59) Q, the robability that a congestion indication is a TO, is Q = 1X w=1 ^Q(w)P [W = w] =E[ ^Q] (60) 14
15 We aroximate Q ß ^Q(E[W ]) (61) where E[W ] is from (45). Next, consider the derivations of E[R] and E[Z TO ]. A seuence of k TOs occurs when there are k 1 consecutive losses (the rst loss is given) followed by a successfully transmitted acket. Conseuently, the number of TOs in a TO seuence has a geometric distribution, and thus P [R = k] = k 1 (1 ) (62) Then we calculate the mean of R as E[R] = 1X k=1 kp [R = k] = 1 1 (63) Next, consider E[Z TO ], the average duration of a timeout seuence excluding retransmissions, which can be calculated in a similar way. We know that the rst six timeouts in one seuence have length 2 i 1 T 0, with all immediately following timeouts having length 64T 0. Then the duration of a seuence with k timeout is L k = ρ (2 k 1)T 0 for k» 6 ( (k 6))T 0 for k 7 (64) And the mean of Z TO is E[Z TO ] = 1X k=1 L k P [R = k] (65) = T Now we can lug (12) for E[Y ], (63) for E[R], (13) for E[A], (66) for E[Z TO ], and (61) for Q into (53), and have (66) T = 1 + E[W ]+ ^Q(E[W ]) 1 1 R(E[X] + 1) + ^Q(E[W ])T 0 f () 1 (67) where f () = (68) 15
16 Now we can lug the common exression (45) of IIAD and SQRT for E[W ], the common exression (46) of IIAD and SQRT for E[X], and (59) for ^Q into (67), simlify, and we have T ff; (; R; T 0 ;b) ß R ff + T 0 min 1 1; 3 ff ( ) (69) References [1] M. Allman, V. Paxson, and W. Stevens. TCP Congestion Control, RFC 2581, Ar [2] D. Bansal and H. Balakrishnan. TCP-friendly congestion control for real-time streaming alications. Technical Reort MIT LCS TR 806, Massachusetts Institute of Technology, Cambridge, Massachusetts, U.S.A., May [3] W. Feller. An Introduction to Probability Theory and Its Alication, Vol. 1, volume 1. John Wiley and Sons, 3rd edition, [4] W. Feller. An Introduction to Probability Theory and Its Alication, Vol. 2, volume 2. John Wiley and Sons, 2nd edition, [5] V. Jacobson. Congestion avoidance and control. In Proceedings of ACM SIGCOMM 88, Aug [6] V. Jacobson. Modied TCP congestion avoidance algorithm. Note sent to end2endinterest mailing list, [7] J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP throughut: A simle model and its emirical validation. In Proceedings of ACM SIGCOMM 98, Set [8] W. Stevens. TCP/IP Illustrated, Volume 1, The Protocols. Addison-Wesley,
Information and uncertainty in a queueing system
Information and uncertainty in a queueing system Refael Hassin December 7, 7 Abstract This aer deals with the effect of information and uncertainty on rofits in an unobservable single server queueing system.
More informationNon-Inferiority Tests for the Ratio of Two Correlated Proportions
Chater 161 Non-Inferiority Tests for the Ratio of Two Correlated Proortions Introduction This module comutes ower and samle size for non-inferiority tests of the ratio in which two dichotomous resonses
More informationStatistics and Probability Letters. Variance stabilizing transformations of Poisson, binomial and negative binomial distributions
Statistics and Probability Letters 79 (9) 6 69 Contents lists available at ScienceDirect Statistics and Probability Letters journal homeage: www.elsevier.com/locate/staro Variance stabilizing transformations
More informationLECTURE NOTES ON MICROECONOMICS
LECTURE NOTES ON MCROECONOMCS ANALYZNG MARKETS WTH BASC CALCULUS William M. Boal Part : Consumers and demand Chater 5: Demand Section 5.: ndividual demand functions Determinants of choice. As noted in
More informationConfidence Intervals for a Proportion Using Inverse Sampling when the Data is Subject to False-positive Misclassification
Journal of Data Science 13(015), 63-636 Confidence Intervals for a Proortion Using Inverse Samling when the Data is Subject to False-ositive Misclassification Kent Riggs 1 1 Deartment of Mathematics and
More informationPolicyholder Outcome Death Disability Neither Payout, x 10,000 5, ,000
Two tyes of Random Variables: ) Discrete random variable has a finite number of distinct outcomes Examle: Number of books this term. ) Continuous random variable can take on any numerical value within
More informationMidterm Exam: Tuesday 28 March in class Sample exam problems ( Homework 5 ) available tomorrow at the latest
Plan Martingales 1. Basic Definitions 2. Examles 3. Overview of Results Reading: G&S Section 12.1-12.4 Next Time: More Martingales Midterm Exam: Tuesday 28 March in class Samle exam roblems ( Homework
More informationA Comparative Study of Various Loss Functions in the Economic Tolerance Design
A Comarative Study of Various Loss Functions in the Economic Tolerance Design Jeh-Nan Pan Deartment of Statistics National Chen-Kung University, Tainan, Taiwan 700, ROC Jianbiao Pan Deartment of Industrial
More informationDr. Maddah ENMG 625 Financial Eng g II 10/16/06. Chapter 11 Models of Asset Dynamics (1)
Dr Maddah ENMG 65 Financial Eng g II 0/6/06 Chater Models of Asset Dynamics () Overview Stock rice evolution over time is commonly modeled with one of two rocesses: The binomial lattice and geometric Brownian
More informationSampling Procedure for Performance-Based Road Maintenance Evaluations
Samling Procedure for Performance-Based Road Maintenance Evaluations Jesus M. de la Garza, Juan C. Piñero, and Mehmet E. Ozbek Maintaining the road infrastructure at a high level of condition with generally
More informationINDEX NUMBERS. Introduction
INDEX NUMBERS Introduction Index numbers are the indicators which reflect changes over a secified eriod of time in rices of different commodities industrial roduction (iii) sales (iv) imorts and exorts
More informationCapital Budgeting: The Valuation of Unusual, Irregular, or Extraordinary Cash Flows
Caital Budgeting: The Valuation of Unusual, Irregular, or Extraordinary Cash Flows ichael C. Ehrhardt Philli R. Daves Finance Deartment, SC 424 University of Tennessee Knoxville, TN 37996-0540 423-974-1717
More informationSINGLE SAMPLING PLAN FOR VARIABLES UNDER MEASUREMENT ERROR FOR NON-NORMAL DISTRIBUTION
ISSN -58 (Paer) ISSN 5-5 (Online) Vol., No.9, SINGLE SAMPLING PLAN FOR VARIABLES UNDER MEASUREMENT ERROR FOR NON-NORMAL DISTRIBUTION Dr. ketki kulkarni Jayee University of Engineering and Technology Guna
More informationCS522 - Exotic and Path-Dependent Options
CS522 - Exotic and Path-Deendent Otions Tibor Jánosi May 5, 2005 0. Other Otion Tyes We have studied extensively Euroean and American uts and calls. The class of otions is much larger, however. A digital
More informationObjectives. 5.2, 8.1 Inference for a single proportion. Categorical data from a simple random sample. Binomial distribution
Objectives 5.2, 8.1 Inference for a single roortion Categorical data from a simle random samle Binomial distribution Samling distribution of the samle roortion Significance test for a single roortion Large-samle
More informationA Multi-Objective Approach to Portfolio Optimization
RoseHulman Undergraduate Mathematics Journal Volume 8 Issue Article 2 A MultiObjective Aroach to Portfolio Otimization Yaoyao Clare Duan Boston College, sweetclare@gmail.com Follow this and additional
More informationQuantitative Aggregate Effects of Asymmetric Information
Quantitative Aggregate Effects of Asymmetric Information Pablo Kurlat February 2012 In this note I roose a calibration of the model in Kurlat (forthcoming) to try to assess the otential magnitude of the
More informationLecture 2. Main Topics: (Part II) Chapter 2 (2-7), Chapter 3. Bayes Theorem: Let A, B be two events, then. The probabilities P ( B), probability of B.
STT315, Section 701, Summer 006 Lecture (Part II) Main Toics: Chater (-7), Chater 3. Bayes Theorem: Let A, B be two events, then B A) = A B) B) A B) B) + A B) B) The robabilities P ( B), B) are called
More informationPrice Gap and Welfare
APPENDIX D Price Ga and Welfare Derivation of the Price-Ga Formula This aendix details the derivation of the rice-ga formula (see chaters 2 and 5) under two assumtions: (1) the simlest case, where there
More information2/20/2013. of Manchester. The University COMP Building a yes / no classifier
COMP4 Lecture 6 Building a yes / no classifier Buildinga feature-basedclassifier Whatis a classifier? What is an information feature? Building a classifier from one feature Probability densities and the
More informationOn the Power of Structural Violations in Priority Queues
On the Power of Structural Violations in Priority Queues Amr Elmasry 1, Claus Jensen 2, Jyrki Katajainen 2, 1 Comuter Science Deartment, Alexandria University Alexandria, Egyt 2 Deartment of Comuting,
More informationA COMPARISON AMONG PERFORMANCE MEASURES IN PORTFOLIO THEORY
A COMPARISON AMONG PERFORMANCE MEASURES IN PORFOLIO HEORY Sergio Ortobelli * Almira Biglova ** Stoyan Stoyanov *** Svetlozar Rachev **** Frank Fabozzi * University of Bergamo Italy ** University of Karlsruhe
More informationSummary of the Chief Features of Alternative Asset Pricing Theories
Summary o the Chie Features o Alternative Asset Pricing Theories CAP and its extensions The undamental equation o CAP ertains to the exected rate o return time eriod into the uture o any security r r β
More informationEffects of Size and Allocation Method on Stock Portfolio Performance: A Simulation Study
2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singaore Effects of Size and Allocation Method on Stock Portfolio Performance: A Simulation
More informationPairs trading. ROBERT J. ELLIOTTy, JOHN VAN DER HOEK*z and WILLIAM P. MALCOLM
Quantitative Finance, Vol. 5, No. 3, June 2005, 271 276 Pairs trading ROBERT J. ELLIOTTy, JOHN VAN DER HOEK*z and WILLIAM P. MALCOLM yhaskayne School of Business, University of Calgary, Calgary, Alberta,
More informationAppendix Large Homogeneous Portfolio Approximation
Aendix Large Homogeneous Portfolio Aroximation A.1 The Gaussian One-Factor Model and the LHP Aroximation In the Gaussian one-factor model, an obligor is assumed to default if the value of its creditworthiness
More informationSharpe Ratios and Alphas in Continuous Time
JOURNAL OF FINANCIAL AND QUANTITATIVE ANALYSIS VOL. 39, NO. 1, MARCH 2004 COPYRIGHT 2004, SCHOOL OF BUSINESS ADMINISTRATION, UNIVERSITY OF WASHINGTON, SEATTLE, WA 98195 Share Ratios and Alhas in Continuous
More information***SECTION 7.1*** Discrete and Continuous Random Variables
***SECTION 7.*** Discrete and Continuous Random Variables Samle saces need not consist of numbers; tossing coins yields H s and T s. However, in statistics we are most often interested in numerical outcomes
More informationBrownian Motion, the Gaussian Lévy Process
Brownian Motion, the Gaussian Lévy Process Deconstructing Brownian Motion: My construction of Brownian motion is based on an idea of Lévy s; and in order to exlain Lévy s idea, I will begin with the following
More informationChapter 1: Stochastic Processes
Chater 1: Stochastic Processes 4 What are Stochastic Processes, and how do they fit in? STATS 210 Foundations of Statistics and Probability Tools for understanding randomness (random variables, distributions)
More informationMonetary policy is a controversial
Inflation Persistence: How Much Can We Exlain? PAU RABANAL AND JUAN F. RUBIO-RAMÍREZ Rabanal is an economist in the monetary and financial systems deartment at the International Monetary Fund in Washington,
More informationAsian Economic and Financial Review A MODEL FOR ESTIMATING THE DISTRIBUTION OF FUTURE POPULATION. Ben David Nissim.
Asian Economic and Financial Review journal homeage: htt://www.aessweb.com/journals/5 A MODEL FOR ESTIMATING THE DISTRIBUTION OF FUTURE POPULATION Ben David Nissim Deartment of Economics and Management,
More informationRisk Neutral Modelling Exercises
Risk Neutral Modelling Exercises Geneviève Gauthier Exercise.. Assume that the rice evolution of a given asset satis es dx t = t X t dt + X t dw t where t = ( + sin (t)) and W = fw t : t g is a (; F; P)
More informationTwin Deficits and Inflation Dynamics in a Mundell-Fleming-Tobin Framework
Twin Deficits and Inflation Dynamics in a Mundell-Fleming-Tobin Framework Peter Flaschel, Bielefeld University, Bielefeld, Germany Gang Gong, Tsinghua University, Beijing, China Christian R. Proaño, IMK
More informationApplication of Monte-Carlo Tree Search to Traveling-Salesman Problem
R4-14 SASIMI 2016 Proceedings Alication of Monte-Carlo Tree Search to Traveling-Salesman Problem Masato Shimomura Yasuhiro Takashima Faculty of Environmental Engineering University of Kitakyushu Kitakyushu,
More informationForward Vertical Integration: The Fixed-Proportion Case Revisited. Abstract
Forward Vertical Integration: The Fixed-roortion Case Revisited Olivier Bonroy GAEL, INRA-ierre Mendès France University Bruno Larue CRÉA, Laval University Abstract Assuming a fixed-roortion downstream
More informationThe Optimal Entry Mode of the Multinational Firm under Network Externalities: Foreign Direct Investment and Tariff
International Journal of usiness and Social Science Vol. 3 No. [Secial Issue June ] The Otimal Entry Mode of the Multinational Firm under Network Externalities: Foreign Direct Investment and Tariff Jue-Shyan
More informationThe Supply and Demand for Exports of Pakistan: The Polynomial Distributed Lag Model (PDL) Approach
The Pakistan Develoment Review 42 : 4 Part II (Winter 23). 96 972 The Suly and Demand for Exorts of Pakistan: The Polynomial Distributed Lag Model (PDL) Aroach ZESHAN ATIQUE and MOHSIN HASNAIN AHMAD. INTRODUCTION
More informationTESTING THE CAPITAL ASSET PRICING MODEL AFTER CURRENCY REFORM: THE CASE OF ZIMBABWE STOCK EXCHANGE
TESTING THE CAPITAL ASSET PRICING MODEL AFTER CURRENCY REFORM: THE CASE OF ZIMBABWE STOCK EXCHANGE Batsirai Winmore Mazviona 1 ABSTRACT The Caital Asset Pricing Model (CAPM) endeavors to exlain the relationshi
More informationFORECASTING EARNINGS PER SHARE FOR COMPANIES IN IT SECTOR USING MARKOV PROCESS MODEL
FORECASTING EARNINGS PER SHARE FOR COMPANIES IN IT SECTOR USING MARKOV PROCESS MODEL 1 M.P. RAJAKUMAR, 2 V. SHANTHI 1 Research Scholar, Sathyabama University, Chennai-119, Tamil Nadu, India 2 Professor,
More informationCash-in-the-market pricing or cash hoarding: how banks choose liquidity
Cash-in-the-market ricing or cash hoarding: how banks choose liquidity Jung-Hyun Ahn Vincent Bignon Régis Breton Antoine Martin February 207 Abstract We develo a model in which financial intermediaries
More informationIndividual Comparative Advantage and Human Capital Investment under Uncertainty
Individual Comarative Advantage and Human Caital Investment under Uncertainty Toshihiro Ichida Waseda University July 3, 0 Abstract Secialization and the division of labor are the sources of high roductivity
More informationAnalysis on Mergers and Acquisitions (M&A) Game Theory of Petroleum Group Corporation
DOI: 10.14355/ijams.2014.0301.03 Analysis on Mergers and Acquisitions (M&A) Game Theory of Petroleum Grou Cororation Minchang Xin 1, Yanbin Sun 2 1,2 Economic and Management Institute, Northeast Petroleum
More informationPricing Granularity for Congestion-Sensitive Pricing Λ
Pricing Granularity for Congestion-Sensitive Pricing Λ Murat Yuksel and Shivkumar Kalyanaraman Rensselaer Polytechnic Institute, ECSE Department 11 8th Street, Troy, NY, 1218, USA. yuksem@rpi.edu, shivkuma@ecse.rpi.edu
More information8 Simulation Analysis of TCP/DCA
126 8 Simulation Analysis of TCP/DCA On the simulated paths developed in Chapter 7, we run the hypothetical DCA algorithm we developed in Chapter 5 (i.e., the TCP/DCA algorithm). Through these experiments,
More informationOnline Robustness Appendix to Are Household Surveys Like Tax Forms: Evidence from the Self Employed
Online Robustness Aendix to Are Household Surveys Like Tax Forms: Evidence from the Self Emloyed October 01 Erik Hurst University of Chicago Geng Li Board of Governors of the Federal Reserve System Benjamin
More informationFUNDAMENTAL ECONOMICS - Economics Of Uncertainty And Information - Giacomo Bonanno ECONOMICS OF UNCERTAINTY AND INFORMATION
ECONOMICS OF UNCERTAINTY AND INFORMATION Giacomo Bonanno Deartment of Economics, University of California, Davis, CA 9566-8578, USA Keywords: adverse selection, asymmetric information, attitudes to risk,
More informationRe-testing liquidity constraints in 10 Asian developing countries
Re-testing liquidity constraints in 0 Asian develoing countries Kuan-Min Wang * Deartment of Finance, Overseas Chinese University Yuan-Ming Lee Deartment of Finance, Southern Taiwan University Abstract
More informationBy choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Coyright 2015 IEEE. Rerinted, with ermission, from Huairui Guo, Ferenc Szidarovszky, Athanasios Gerokostooulos and Pengying Niu, On Determining Otimal Insection Interval for Minimizing Maintenance Cost,
More information: now we have a family of utility functions for wealth increments z indexed by initial wealth w.
Lotteries with Money Payoffs, continued Fix u, let w denote wealth, and set u ( z) u( z w) : now we have a family of utility functions for wealth increments z indexed by initial wealth w. (a) Recall from
More information19/01/2017. Profit maximization and competitive supply
Perfectly Cometitive Markets Profit Maximization Marginal Revenue, Marginal Cost, and Profit Maximization Choosing Outut in the Short Run The Cometitive Firm s Short-Run Suly Curve The Short-Run Market
More informationInventory Systems with Stochastic Demand and Supply: Properties and Approximations
Working Paer, Forthcoming in the Euroean Journal of Oerational Research Inventory Systems with Stochastic Demand and Suly: Proerties and Aroximations Amanda J. Schmitt Center for Transortation and Logistics
More informationStochastic modelling of skewed data exhibiting long range dependence
IUGG XXIV General Assembly 27 Perugia, Italy, 2 3 July 27 International Association of Hydrological Sciences, Session HW23 Analysis of Variability in Hydrological Data Series Stochastic modelling of skewed
More informationWe are going to delve into some economics today. Specifically we are going to talk about production and returns to scale.
Firms and Production We are going to delve into some economics today. Secifically we are going to talk aout roduction and returns to scale. firm - an organization that converts inuts such as laor, materials,
More informationInvestment in Production Resource Flexibility:
Investment in Production Resource Flexibility: An emirical investigation of methods for lanning under uncertainty Elena Katok MS&IS Deartment Penn State University University Park, PA 16802 ekatok@su.edu
More informationInstitutional Constraints and The Inefficiency in Public Investments
Institutional Constraints and The Inefficiency in Public Investments Leyla D. Karakas March 14, 017 Abstract This aer studies limits on executive authority by identifying a dynamic channel through which
More informationSupplemental Material: Buyer-Optimal Learning and Monopoly Pricing
Sulemental Material: Buyer-Otimal Learning and Monooly Pricing Anne-Katrin Roesler and Balázs Szentes February 3, 207 The goal of this note is to characterize buyer-otimal outcomes with minimal learning
More informationMatching Markets and Social Networks
Matching Markets and Social Networks Tilman Klum Emory University Mary Schroeder University of Iowa Setember 0 Abstract We consider a satial two-sided matching market with a network friction, where exchange
More information1 < = α σ +σ < 0. Using the parameters and h = 1/365 this is N ( ) = If we use h = 1/252, the value would be N ( ) =
Chater 6 Value at Risk Question 6.1 Since the rice of stock A in h years (S h ) is lognormal, 1 < = α σ +σ < 0 ( ) P Sh S0 P h hz σ α σ α = P Z < h = N h. σ σ (1) () Using the arameters and h = 1/365 this
More informationIn ation and Welfare with Search and Price Dispersion
In ation and Welfare with Search and Price Disersion Liang Wang y University of Pennsylvania November, 2010 Abstract This aer studies the e ect of in ation on welfare in an economy with consumer search
More informationTowards an advanced estimation of Measurement Uncertainty using Monte-Carlo Methods- case study kinematic TLS Observation Process
Towards an advanced estimation of Measurement Uncertainty using Monte-Carlo Methods- case study Hamza ALKHATIB and Hansjörg KUTTERER, Germany Key words: terrestrial laser scanning, GUM, uncertainty, Monte
More informationA Variance Estimator for Cohen s Kappa under a Clustered Sampling Design THESIS
A Variance Estimator for Cohen s Kaa under a Clustered Samling Design THESIS Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of The Ohio State
More informationMultiple-Project Financing with Informed Trading
The ournal of Entrereneurial Finance Volume 6 ssue ring 0 rticle December 0 Multile-Project Financing with nformed Trading alvatore Cantale MD nternational Dmitry Lukin New Economic chool Follow this and
More informationEvaluating an Alternative Risk Preference in Affine Term Structure Models
Evaluating an Alternative Risk Preference in Affine Term Structure Models Jefferson Duarte University of Washington and IBMEC Dai and Singleton (2002) and Duffee (2002) show that there is a tension in
More informationGames with more than 1 round
Games with more than round Reeated risoner s dilemma Suose this game is to be layed 0 times. What should you do? Player High Price Low Price Player High Price 00, 00-0, 00 Low Price 00, -0 0,0 What if
More informationOliver Hinz. Il-Horn Hann
REEARCH ARTICLE PRICE DICRIMINATION IN E-COMMERCE? AN EXAMINATION OF DYNAMIC PRICING IN NAME-YOUR-OWN PRICE MARKET Oliver Hinz Faculty of Economics and usiness Administration, Goethe-University of Frankfurt,
More informationOn the Power of Structural Violations in Priority Queues
On the Power of Structural Violations in Priority Queues Amr Elmasry 1 Claus Jensen 2 Jyrki Katajainen 2 1 Deartment of Comuter Engineering and Systems, Alexandria University Alexandria, Egyt 2 Deartment
More informationBusiness Statistics 41000: Homework # 2
Business Statistics 41000: Homework # 2 Drew Creal Due date: At the beginning of lecture # 5 Remarks: These questions cover Lectures #3 and #4. Question # 1. Discrete Random Variables and Their Distributions
More informationand their probabilities p
AP Statistics Ch. 6 Notes Random Variables A variable is any characteristic of an individual (remember that individuals are the objects described by a data set and may be eole, animals, or things). Variables
More informationSetting the regulatory WACC using Simulation and Loss Functions The case for standardising procedures
Setting the regulatory WACC using Simulation and Loss Functions The case for standardising rocedures by Ian M Dobbs Newcastle University Business School Draft: 7 Setember 2007 1 ABSTRACT The level set
More informationAre capital expenditures, R&D, advertisements and acquisitions positive NPV?
Are caital exenditures, R&D, advertisements and acquisitions ositive NPV? Peter Easton The University of Notre Dame and Peter Vassallo The University of Melbourne February, 2009 Abstract The focus of this
More informationBIS Working Papers. Liquidity risk in markets with trading frictions: What can swing pricing achieve? No 663. Monetary and Economic Department
BIS Working Paers No 663 Liquidity risk in markets with trading frictions: What can swing ricing achieve? by Ulf Lewrick and Jochen Schanz Monetary and Economic Deartment October 207 JEL classification:
More informationBounded Rationality in Laboratory Bargaining with Asymmetric Information
Bounded Rationality in Laoratory Bargaining with Asymmetric Information Timothy N. Cason and Stanley S. Reynolds * Deartment of Economics, Krannert School of Management, Purdue University, West Lafayette,
More informationThe Impact of Flexibility And Capacity Allocation On The Performance of Primary Care Practices
University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses 1911 - February 2014 2010 The Imact of Flexibility And Caacity Allocation On The Performance of Primary Care Practices Liang
More informationEMPIRICAL TAX POLICY ANALYSIS AND EVALUATION. Katinka Hort * and Henry Ohlsson **
EMPIRICAL TAX POLICY ANALYSIS AND EVALUATION Katinka Hort * and Henry Ohlsson ** Introduction The main objective of our aer is to formulate an agenda for emirical tax olicy analysis and evaluation. We
More informationA NOTE ON SKEW-NORMAL DISTRIBUTION APPROXIMATION TO THE NEGATIVE BINOMAL DISTRIBUTION
A NOTE ON SKEW-NORMAL DISTRIBUTION APPROXIMATION TO THE NEGATIVE BINOMAL DISTRIBUTION JYH-JIUAN LIN 1, CHING-HUI CHANG * AND ROSEMARY JOU 1 Deartment of Statistics Tamkang University 151 Ying-Chuan Road,
More informationA Semi-parametric Test for Drift Speci cation in the Di usion Model
A Semi-arametric est for Drift Seci cation in the Di usion Model Lin hu Indiana University Aril 3, 29 Abstract In this aer, we roose a misseci cation test for the drift coe cient in a semi-arametric di
More informationBounded Rationality in Laboratory Bargaining with Asymmetric Information *
Bounded Rationality in Laoratory Bargaining with Asymmetric Information * Timothy N. Cason and Stanley S. Reynolds Decemer 003 Summary. This aer reorts an exeriment on two-layer seuential argaining with
More informationOrdering a deck of cards... Lecture 3: Binomial Distribution. Example. Permutations & Combinations
Ordering a dec of cards... Lecture 3: Binomial Distribution Sta 111 Colin Rundel May 16, 2014 If you have ever shuffled a dec of cards you have done something no one else has ever done before or will ever
More informationVolumetric Hedging in Electricity Procurement
Volumetric Hedging in Electricity Procurement Yumi Oum Deartment of Industrial Engineering and Oerations Research, University of California, Berkeley, CA, 9472-777 Email: yumioum@berkeley.edu Shmuel Oren
More informationHomework 10 Solution Section 4.2, 4.3.
MATH 00 Homewor Homewor 0 Solution Section.,.3. Please read your writing again before moving to the next roblem. Do not abbreviate your answer. Write everything in full sentences. Write your answer neatly.
More informationDP2003/10. Speculative behaviour, debt default and contagion: A stylised framework of the Latin American Crisis
DP2003/10 Seculative behaviour, debt default and contagion: A stylised framework of the Latin American Crisis 2001-2002 Louise Allso December 2003 JEL classification: E44, F34, F41 Discussion Paer Series
More informationA new class of Bayesian semi-parametric models with applications to option pricing
Quantitative Finance, 2012, 1 14, ifirst A new class of Bayesian semi-arametric models with alications to otion ricing MARCIN KACPERCZYKy, PAUL DAMIEN*z and STEPHEN G. WALKERx yfinance Deartment, Stern
More informationON JARQUE-BERA TESTS FOR ASSESSING MULTIVARIATE NORMALITY
Journal of Statistics: Advances in Theory and Alications Volume, umber, 009, Pages 07-0 O JARQUE-BERA TESTS FOR ASSESSIG MULTIVARIATE ORMALITY KAZUYUKI KOIZUMI, AOYA OKAMOTO and TAKASHI SEO Deartment of
More informationTHE ROLE OF CORRELATION IN THE CURRENT CREDIT RATINGS SQUEEZE. Eva Porras
THE ROLE OF CORRELATION IN THE CURRENT CREDIT RATINGS SQUEEZE Eva Porras IE Business School Profesora de Finanzas C/Castellón de la Plana 8 8006 Madrid Esaña Abstract A current matter of reoccuation is
More informationA Stochastic Model of Optimal Debt Management and Bankruptcy
A Stochastic Model of Otimal Debt Management and Bankrutcy Alberto Bressan (, Antonio Marigonda (, Khai T. Nguyen (, and Michele Palladino ( (* Deartment of Mathematics, Penn State University University
More informationWorst-case evaluation complexity of regularization methods for smooth unconstrained optimization using Hölder continuous gradients
Worst-case evaluation comlexity of regularization methods for smooth unconstrained otimization using Hölder continuous gradients C Cartis N I M Gould and Ph L Toint 26 June 205 Abstract The worst-case
More informationRobust ECN Signaling with Nonces
Robust ECN Signaling with Nonces David Ely, Neil Spring, David Wetherall, Stefan Savage, and Tom Anderson University of Washington and UC San Diego IEEE ICNP, November, 2001 ECN gives receivers power Old
More informationObjectives. 3.3 Toward statistical inference
Objectives 3.3 Toward statistical inference Poulation versus samle (CIS, Chater 6) Toward statistical inference Samling variability Further reading: htt://onlinestatbook.com/2/estimation/characteristics.html
More informationWorst-case evaluation complexity for unconstrained nonlinear optimization using high-order regularized models
Worst-case evaluation comlexity for unconstrained nonlinear otimization using high-order regularized models E. G. Birgin, J. L. Gardenghi, J. M. Martínez, S. A. Santos and Ph. L. Toint 2 Aril 26 Abstract
More informationEstimating Strategic Complementarity in a State-Dependent Pricing Model
Estimating Strategic Comlementarity in a State-Deendent Pricing Model Marco Bonomo EPGE, Getulio Vargas Foundation marco.bonomo@fgv.br Marcelo Cunha Medeiros Arnildo da Silva Correa Central Bank of Brazil
More informationLecture 2 Basic Tools for Portfolio Analysis
1 Lecture 2 Basic Tools for Portfolio Analysis Alexander K Koch Department of Economics, Royal Holloway, University of London October 8, 27 In addition to learning the material covered in the reading and
More informationCausal Links between Foreign Direct Investment and Economic Growth in Egypt
J I B F Research Science Press Causal Links between Foreign Direct Investment and Economic Growth in Egyt TAREK GHALWASH* Abstract: The main objective of this aer is to study the causal relationshi between
More informationPricing of Stochastic Interest Bonds using Affine Term Structure Models: A Comparative Analysis
Dottorato di Ricerca in Matematica er l Analisi dei Mercati Finanziari - Ciclo XXII - Pricing of Stochastic Interest Bonds using Affine Term Structure Models: A Comarative Analysis Dott.ssa Erica MASTALLI
More informationAdvertising Strategies for a Duopoly Model with Duo-markets and a budget constraint
Advertising Strategies for a Duooly Model with Duo-markets and a budget constraint Ernie G.S. Teo Division of Economics, Nanyang Technological University Tianyin Chen School of Physical and Mathematical
More informationEconomic Performance, Wealth Distribution and Credit Restrictions under variable investment: The open economy
Economic Performance, Wealth Distribution and Credit Restrictions under variable investment: The oen economy Ronald Fischer U. de Chile Diego Huerta Banco Central de Chile August 21, 2015 Abstract Potential
More informationModeling and Estimating a Higher Systematic Co-Moment Asset Pricing Model in the Brazilian Stock Market. Autoria: Andre Luiz Carvalhal da Silva
Modeling and Estimating a Higher Systematic Co-Moment Asset Pricing Model in the Brazilian Stock Market Autoria: Andre Luiz Carvalhal da Silva Abstract Many asset ricing models assume that only the second-order
More informationProfessor Huihua NIE, PhD School of Economics, Renmin University of China HOLD-UP, PROPERTY RIGHTS AND REPUTATION
Professor uihua NIE, PhD School of Economics, Renmin University of China E-mail: niehuihua@gmail.com OD-UP, PROPERTY RIGTS AND REPUTATION Abstract: By introducing asymmetric information of investors abilities
More informationPLUTOCRATIC AND DEMOCRATIC CONSUMER PRICE INDEXES: Francesco Chelli and Elvio Mattioli
LUTORATI AND DEMORATI ONSUMER RIE INDEXES: AN ESTIMATION OF A DEMORATI INDEX FOR ITALY 995-2005 Francesco helli and Elvio Mattioli We thank. Ercolani for helful discussion and comments. All errors are
More informationFair Pricing of Video Transmissions using Best-Effort and Purchased Bandwidth
Fair Pricing of Video Transmissions using Best-Effort and Purchased Bandwidth Stephan Bohacek Department of Electrical and Computer Engineering University of Delaware Newark, DE 19716 bohacek@eecis.udel.edu
More information