COMBINATORIAL CONVOLUTION SUMS DERIVED FROM DIVISOR FUNCTIONS AND FAULHABER SUMS
|
|
- Julian Sharp
- 5 years ago
- Views:
Transcription
1 GLASNIK MATEMATIČKI Vol. 49(69(014, COMBINATORIAL CONVOLUTION SUMS DERIVED FROM DIVISOR FUNCTIONS AND FAULHABER SUMS Bumkyu Cho, Daeyeoul Kim and Ho Park Dongguk University-Seoul, National Institute for Mathematical Sciences, South Korea Abstract. It is known that certain convolution sums using Liouville identity can be expressed as a combination of divisor functions and Bernoulli numbers. In this article we find seven combinatorial convolution sums derived from divisor functions and Bernoulli numbers. 1. Introduction The symbols N, Z, Q and C denote the set of natural numbers, the ring of integers the field of rational numbers and the field of complex numbers, respectively. The Bernoulli polynomials B k (x, which are usually defined by the exponential generating function te xt e t 1 k0 B k (x tk k!, play an important role in different areas of mathematics including number theory and the theory of finite differences. The Bernoulli polynomials satisfy the following well-known identities : N k B k+1(n +1 B k+1 (0, (k 1 k +1 1 k +1 k ( k +1 ( 1 B N k+1. The Bernoulli numbers B k are defined to be B k : B k ( Mathematics Subect Classification. 33E0, 11A67. Key words and phrases. Divisor functions, convolution sums, Faulhaber s sum. 351
2 35 B. CHO, D. KIM AND H. PARK For n N, k Z 0, and l Q, we define some divisor functions: It is clear that σ k (n : d k, σ k(n : n d odd d k, σ # k (n : ( n d k, ˆσ k,l (n : σ k (n lσ k d N H k (N : k, Ĥ k,l (n : H k (n lh k (n/. ˆσ k,0 (n σ k (n, ˆσ k,1 (n σ k (n σ k(n σ k (n/, ˆσ k, k(n σ k (n, and Ĥ k,l (d 1 k +1 k ( k +1 ( 1 B ˆσ k+1,l (n. The identity n 1 σ(kσ(n k 5 ( 1 1 σ 3(n+ 1 1 n σ(n k1 for the basic convolution sum first appeared in a letter from Besge to Liouville in 186 (see []. For some of the history of the subect, and for a selection of these articles, we mention [3,9,10], and especially [5,11]. The study of convolution sums and their applications is classic and they play an important role in number theory. In this paper we are trying to focus on the combinatorial convolution sums. For positive integers k and n, the combinatorial convolution sum (1.1 k ˆσ k s 1,l (mˆσ,l (n m can be evaluated explicitly in terms of divisor functions and a sum of involving Faulhaber sums. We are motivated by Ramanuan s recursion formula for sums of the product of two Eisenstein series [1, Entry 14, p. 33] and its proof, and also the following propositions.
3 CONVOLUTION SUM 353 Proposition 1.1 ([11]. Let k, n be positive integers. Then k σ k s 1 (mσ (n m k +3 4k + σ k+1(n+ k+1 ( k 6 n σ (n k ( k+1 B σ k+1 (n, where B is the -th Bernoulli number. k r0 where and Proposition 1. ([4]. For any integers k 1 and N 3, we have ( k r [ N 1 ] i1 n 1 σ k r (m;i,nσ r (n m;i,n σ k+1 (n;n N nσ (n;n 1 N 1+( 1N [ N 1 ] (N iσ k (n;i,n i1 ( ( n σk+1 N ; N nσ σ r (n;i,n n d i(n d r ( 1 r ( n N ;, n d i(n σr (n;n d r σ r (n σ r (n/n. n d 0(N The aim of this article is to study seven combinatorial convolution sums of the analogous type (1.1. More precisely, we prove the following theorems and corollaries. Theorem 1.3. Let k,n be positive integers, and let l be a rational number. Then k ˆσ k s 1,l (mˆσ,l (n m (1. 1 ˆσ k+1, l +l(n 1 l ˆσ k,l(n n( l ˆσ,l (n+(1 l Ĥ k,l (d. d r
4 354 B. CHO, D. KIM AND H. PARK Remark 1.4. In Theorem 1.3, l 0 and l 1 recover Proposition 1.1 and Proposition., respectively. For k 1, we have the following corollary. Corollary 1.5. For any n N and l Q, we have n 1 ˆσ 1,l (mˆσ 1,l (n m 1 4ˆσ 3, l +l(n l 6 ˆσ 3,l(n+ 3n(l +1 l ˆσ 1,l (n. 1 Remark 1.6. In the preceding corollary, l recovers [7, (11]. Corollary 1.7. Let k, n be positive integers. Then k σ k s 1 (m/σ (n m 1 σ k+1(n/ 1 4ˆσ k, 1(n n 4ˆσ, (n Ĥ k, 1 (d. Corollary 1.8. Let k, n be positive integers. Then k σk s 1 (mσ (n m 1 σ k+1 (n 1 4 σ k (n 3n 4 ˆσ, (n Ĥ 3 k (d. Theorem 1.9. Let k,n be positive integers and let l be a rational number. Then k ˆσ k s 1,l (mˆσ,l (n m (1.3 1 l 4 ˆσ k+1,l 1(n 1 l ˆσ k,l(n n(1 lˆσ,l/ (n + l(σk+1 (n nσ (n+(1 l k,l (d Ĥ and (1.4 ( k n ˆσ k s 1,l (m 1ˆσ,l (n m+1 ˆσ 1 k+1,l(n+ l(l 1 σ k+1 (n+n(l ˆσ,l (n + l 1 4 ˆσ k+1,l 1(n n(l 1ˆσ,l/ (n l(σk+1(n nσ (n.
5 CONVOLUTION SUM 355 Remark In (1.3, l 0 and l 1 recover Proposition.1 and Proposition., respectively. And in (1.4, l 0 recovers [8, Lemma 6.]. If we insert k 1 in the preceding theorem, one has the following corollary. and n Corollary For n N and l Q we have n 1 ˆσ 1,l (mˆσ 1,l (n m 1 l 8 ˆσ 3,l 1(n l 6 ˆσ 3,l(n n(1 lˆσ 1,l/ (n l 1 ˆσ 1,l(n+l(σ 3 (n nσ 1 (n ˆσ 1,l (m 1ˆσ 1,l (n m+1 1 4ˆσ 3,l(n+ l(l 1 4 σ 3 (n+ n(l ˆσ 1,l (n + l 1 8 ˆσ 3,l 1(n n(l 1ˆσ 1,l/ (n l(σ3(n nσ 1(n. Theorem 1.1. Let k, n be positive integers. Then ( k n 1 k s 1 σ k s 1 (m/4σ (n m 1 4 σ k+1(n/ 1 4 (σ k(n k+1 σ k (n/ k σ k (n/4 n 4 (σ (n+ k σ (n/4 σ# k (n + k k 1 (k +1 1 (k +1 1 (k +1 k where ( k+1 u,v,w (k+1! u!v!w!. ( k +1 B σ k+1 (n/ k ( k +1 ( k +1 u+v+wk+1 B k+1 σ k+1 (n/4 B σ # k+1 (n ( k +1 v 1 B v σ # u,v,w w(n.
6 356 B. CHO, D. KIM AND H. PARK Remark In the preceding theorem, k 1 recovers [11, Theorem 15.].. Proofs of the theorems and corollaries To prove the theorems and corollaries, we need the following propositions. Proposition.1 ([8, Theorem 6.3]. Let k, n be positive integers. Then k σ k s 1 (mσ (n m k +3 4k + σ k+1(n 1 4 σ k+1(n+ k ( k +1 k +1 B σ k+1 (n. ( k 6 n σ (n Proposition. ([6, Identity (10]. Let k, n be positive integers. Then k σ k s 1(mσ (n m 1 (σ k+1(n nσ (n. Proposition.3 ([11, p.17]. Let n be a positive integer. Let f : Z C be an even function. Then (a,b,x,y N 4 4ax+byn (f(a b f(a+b 1 f(0(σ(n/ d(n/ d(n/4 1 df(d / /4 ( 1+ n f(d d ( 1+ n f(d d d l1 l d( f(l d /4 l1 f(l.
7 CONVOLUTION SUM 357 Proof of Theorem 1.3. Let k,n N and l Q. Then the left hand side is (.1 k ˆσ k s 1,l (mˆσ,l (n m ( k n 1 ( ( m σ k s 1 (m lσ k s 1 ( ( n m σ (n m lσ k ( σ k s 1 (mσ (n m ( m ( n m +l σ k σ k ( ( n m l σ k s 1 (mσ ( m +σ k σ (n m k ( ( m l σ k s 1 (m σ k s 1 ( ( n m σ (n m σ k ( +(1 l σ k s 1 (mσ (n m ( m ( n m lσ k s 1 σ. Now the first summation of the right side of (.1 becomes (. k ( ( m σ k s 1 (m σ k s 1 ( ( n m σ (n m σ k ( n m σk s 1 (mσ 1 (σ k+1 (n nσ (n
8 358 B. CHO, D. KIM AND H. PARK by Proposition.. Consider the second summation of the right side of (.1 by the use of Proposition 1.1. It equals (.3 k σ k s 1 (mσ (n m ( k +3 k 4k + σ k+1(n+ 6 n σ (n k +1 k ( k +1 B σ k+1 (n 1 σ k+1(n 1 σ k(n nσ (n k +1 k ( k +1 B σ k+1 (n 1 σ k+1(n 1 σ k(n nσ (n+ H k (d. Using Proposition 1.1, we observe that last summation of the right side of (.1 is (.4 k ( m σ k s 1 ( [ k n ] 1 k +3 n ( k k+1( 4k + σ + 6 n k ( k+1 k+1 1 ( n σ k+1 1 σ k k+1 1 σ k+1 k ( k+1 ( n 1 σ k σ ( n m σ k s 1 (mσ ( n m ( n σ ( n B σ k+1 ( n n ( n σ ( n B σ k+1 ( n n ( n σ + ( d H k.
9 CONVOLUTION SUM 359 Using (., (.3 and (.4, we get k ˆσ k s 1,l (mˆσ,l (n m l (σ k+1 (n nσ (n ( 1 +(1 l σ k+1(n 1 σ k(n nσ (n+ H k (d l(1 l( 1 σ k+1 ( n 1 ( n σ k n σ 1 σ k+1(n l( l ( n σ k+1 1 l + n(l ( ( n σ (n lσ ( n + ( d H k ( ( n σ k (n lσ k (l 1 Ĥ k,l (d 1 ˆσ k+1,l(n l(1 l ( n σ k+1 1 l ˆσ k,l(n n( l ˆσ,l (n+(1 l Ĥ k,l (d. Therefore the proof is completed. Proof of Corollary 1.7. We take l 1 in Theorem 1.3. Then the left hand side of Theorem 1.3 is k L (σ k s 1 (mσ (n m +σ k s 1 (m/σ ((n m/ k + (σ k s 1 (m/σ (n m +σ k s 1 (mσ ((n m/. Observing that replacing m and s by n m and k s respectively in L, k (σ k s 1 (m/σ (n m ( k n 1 m0 σ k s 1 (mσ ((n m/,
10 360 B. CHO, D. KIM AND H. PARK we find k L (σ k s 1 (mσ (n m +σ k s 1 (m/σ ((n m/ k + σ k s 1 (m/σ (n m. Consider the right hand side of Theorem 1.3. It it follows that 1 ˆσ k+1, 1(n+σ k+1 (n/ ˆσ k, 1 (n 3n ˆσ, 1(n+ Ĥ k, 1 (d. By Proposition 1.1 and Theorem 1.3, we deduce that k σ k s 1 (m/σ (n m 1 ˆσ k+1, 1(n+σ k+1 (n/ ˆσ k, 1 (n 3n ˆσ, 1(n + k Ĥ k, 1 (d (σ k s 1 (mσ (n m +σ k s 1 (m/σ ((n m/ 1 ˆσ k+1, 1(n+σ k+1 (n/ ˆσ k, 1 (n 3n ˆσ, 1(n + ( 1 Ĥ k, 1 (d σ k+1(n 1 σ k(n nσ (n+ H k (d σ k+1 ( n 1 ( n σ k n ( n σ + ( d H k σ k+1 (n/ 1 ˆσ k, 1(n n ˆσ, (n+ Ĥ k, 1 (d. This completes the proof. Proof of Corollary 1.8. Let k,n N. Then k σk s 1 (mσ (n m ( k n 1 ˆσ k s 1,1 (mσ (n m
11 CONVOLUTION SUM 361 k σ k s 1 (mσ (n m ( k n 1 σ k s 1 (m/σ (n m. Appealing to Corollary 1.7, we obtain k σk s 1 (mσ (n m 1 σ k+1(n 1 4 σ k(n n σ (n n 4 σ (n Ĥ k (d. Remark.4. Using Corollary 1.7, Corollary 1.8 and Proposition., we deduce k ˆσ k s 1, (mσ (n m for n odd. ( k n 1 σ k s 1 (mσ (n m Proof of Theorem 1.9. Let k,n N and l Q. The left hand side of Theorem 1.9 is equal to k ˆσ k s 1,l (mˆσ,l (n m k (σ k s 1 (mσ (n m +l σ k s 1 (mσ (n m k l (σ k s 1 (mσ (n m +σ k s 1 (mσ (n m k (1 l (σ k s 1 (mσ (n m lσ k s 1 (mσ (n m
12 36 B. CHO, D. KIM AND H. PARK k +l (σ k s 1 (m σ k s 1 (m (σ (n m σ (n m k (1 l (σ k s 1 (mσ (n m lσ k s 1 (mσ (n m k +l σk s 1 (mσ (n m. We can divide it into three parts: (.5 (.6 (.7 k σ k s 1 (mσ (n m, k σ k s 1 (mσ (n m, ( k n 1 σ k s 1 (mσ (n m. By making use of Proposition.1, (.5 can be written as k σ k s 1 (mσ (n m k +3 4k + σ k+1(n 1 ( k 4 σ k+1 (n+ 6 n k +1 k ( k +1 B σ k+1 (n σ (n 1 σ k+1(n 1 4 σ k+1 (n 1 σ k(n nσ (n+ H k (d.
13 CONVOLUTION SUM 363 Also, by Proposition 1.1, (.6 equals k σ k s 1 (mσ (n m ( k +3 k 4k + σ k+1(n+ 6 n σ (n k +1 k ( k +1 B σ k+1 (n 1 σ k+1(n 1 σ k(n nσ (n+ H k (d. By Proposition., (.7 is k σk s 1 (mσ (n m k Therefore, we obtain ( k n 1 (σ k+1 (n nσ (n. σ k s 1 (mσ (n m k ˆσ k s 1,l (mˆσ,l (n m 1 (1 l( σ k+1(n 1 4 σ k+1 (n 1 σ k(n nσ (n+ H k (d ( 1 l(1 l σ k+1(n 1 σ k(n nσ (n+ H k (d + l(σ k+1 (n nσ (n 1 l 4 ˆσ k+1,l 1(n 1 l ˆσ k,l(n n(1 lˆσ,l/ (n ( + l(σk+1 (n nσ (n+(1 l H k (d. H k (d l This proves (1.3 of Theorem 1.9. Using (1. and (1.3, we get (1.4. Therefore, the proof is completed.
14 364 B. CHO, D. KIM AND H. PARK Proof of Theorem 1.1. Following the technique used in [11], we take f(x x k in Proposition.3. Then the left hand side of Proposition.3 is ((a b k (a+b k (a,b,x,y N 4 4ax+byn (a,b,x,y N 4 4ax+byn k ( k ( k ( ( 1 s (a k s b s (a k s b s s k (a,b,x,y N 4 4ax+byn 4a m ((a k s 1 b (a k s 1 b n m b k k s 1 σ k s 1 (m/4σ (n m The right hand side of Proposition.3 is 1 (1+n/dd k 1 d k+1 (1+n/d(d k d x1 x d( / x k d /4x1 x k. /4 Set S 1 1 (1+n/dd k 1 d k+1 (1+n/d(d k S S 3 d x1 x d( d /4x1 x k x k. / /4 By the definition of divisor functions, we see that (.8 S 1 1 σ k+1(n/ (σ k(n+ k σ k (n/4 + n (σ (n+ k σ (n/4.
15 CONVOLUTION SUM 365 Next, we consider (.9 and (.10 (.11 S / d x1 x d( k k +1 k k +1 d d d x k d d/ x1 k x k + d k ( k +1 k +1 k k k +1 d k k 1 k+1 k d ( k +1 k x1(x k + d d (x 1 k d+1 x1 x1x k k d d+1 1 x k x1 B σ k+1 (n/+ k σ k (n/ B σ # k+1 (n+σ# k (n ( k +1 ( d+1 B ( k+1 ( d+1 B 1 k +1 k+1 i0 ( k +1 1 k +1 u+v+wk+1 k+1 B (d+1 k+1 k+1 ( ( k +1 k +1 ( k +1 v 1 B v σ w # u,v,w (n i B d k+1 i Similarly, from (.9 and (.10, we obtain k ( S k k +1 B σ k+1 (n/+ k σ k (n/ k +1 k +1 1 k +1 k ( k +1 u+v+wk+1 B σ # k+1 (n+σ# k (n ( k +1 v 1 B v σ w # u,v,w (n.
16 366 B. CHO, D. KIM AND H. PARK Finally, the equation S 3 is equivalent to (.1 S 3 d 1 /4 x1 k 1 k +1 x k + (d k /4 ( k +1 B k+1 σ k+1 (n/4+ k σ k (n/4. Hence, by (.8, (.11 and (.1, we obtain 1 σ k+1(n/ (σ k(n+ k σ k (n/4 + n (σ (n+ k σ (n/4 k k +1 1 k +1 k +1 1 k +1 k k ( k +1 B σ k+1 (n/ k σ k (n/ ( k +1 u+v+wk+1 k ( k +1 B σ # k+1 (n σ# k (n ( k +1 v 1 B v σ # u,v,w w(n B k+1 σ k+1 (n/4 k σ k (n/4 1 σ k+1(n/ (σ k(n k+1 σ k (n/ k σ k (n/4 + n (σ (n+ k σ (n/4 σ # k (n k k +1 1 k +1 1 k +1 k +1 k k k ( k +1 B σ k+1 (n/ ( k +1 ( k +1 u+v+wk+1 B k+1 σ k+1 (n/4 B σ # k+1 (n ( k +1 v 1 B v σ w # u,v,w (n.
17 CONVOLUTION SUM 367 Acknowledgements. The first author was supported by the Dongguk University Research Fund of 013 and the corresponding author was supported by the National Institute for Mathematical Sciences (NIMS grant funded by the Korean government (B1403. References [1] B. C. Berndt, Ramanuan s notebooks. Part II, Springer, [] Nesge, Extrait d une Lettre de M. Besge à M. Liouville, Journal de mathématiques et appliquées e série 7 (186, 56. [3] N. Cheng and K. S. Williams, Evaluation of some convolution sums involving the sum of divisors functions, Yokohama Math. J. 5 (005, [4] B. Cho, D. Kim, and H. Park, Evaluation of a certain combinatorial convolution sum in higher level cases, J. Math. Anal. Appl. 406 (013, [5] J. G. Huard, Z. M. Ou, B. K. Spearman, and K. S. Williams, Elementary evaluation of certain convolution sums involving divisor functions, in: Number theory for the millennium, II, A K Peters, Natick, 00, [6] D. Kim and A. Bayad, Convolution identities for twisted Eisenstein series and twisted divisor functions, Fixed Point Theory Appl. 013, 013:81, 3 pp. [7] D.Kim,A.Kim,and Y.Li,Convolution sums arising from divisor functions, J.Korean Math. Soc. 50 (013, [8] D. Kim, A. Kim and A. Sankaranarayanan, Bernoulli numbers, convolution sums and congruences of coefficients for certain generating functions, J. Inequal. Appl. 013, 013:5 6 pp. [9] D. B. Lahiri, On Ramanuan s function τ(n and the divisor function σ k (n. I, Bull. Calcutta Math. Soc. 38 (1946, [10] G. Melfi, On some modular identities, in: Number theory, de Gruyter, Berlin, 1998, [11] K. S. Williams, Number theory in the spirit of Liouville, Cambridge University Press, 011. B. Cho Department of Mathematics Dongguk University-Seoul 6 Pil-dong 3-ga Jung-gu Seoul South Korea bam@dongguk.edu D. Kim National Institute for Mathematical Science Yuseong-daero 1689-gil Daeeon South Korea daeyeoul@nims.re.kr H. Park Department of Mathematics Dongguk University-Seoul, 6 Pil-dong 3-ga Jung-gu Seoul South Korea ph140@dongguk.edu Received:
On the h-vector of a Lattice Path Matroid
On the h-vector of a Lattice Path Matroid Jay Schweig Department of Mathematics University of Kansas Lawrence, KS 66044 jschweig@math.ku.edu Submitted: Sep 16, 2009; Accepted: Dec 18, 2009; Published:
More informationSEMICENTRAL IDEMPOTENTS IN A RING
J. Korean Math. Soc. 51 (2014), No. 3, pp. 463 472 http://dx.doi.org/10.4134/jkms.2014.51.3.463 SEMICENTRAL IDEMPOTENTS IN A RING Juncheol Han, Yang Lee, and Sangwon Park Abstract. Let R be a ring with
More informationTWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA 1. INTRODUCTION
TWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA M. ALP, N. IRMAK and L. SZALAY Abstract. The properties of k-periodic binary recurrences have been discussed by several authors. In this paper,
More informationA note on the number of (k, l)-sum-free sets
A note on the number of (k, l)-sum-free sets Tomasz Schoen Mathematisches Seminar Universität zu Kiel Ludewig-Meyn-Str. 4, 4098 Kiel, Germany tos@numerik.uni-kiel.de and Department of Discrete Mathematics
More informationSome Bounds for the Singular Values of Matrices
Applied Mathematical Sciences, Vol., 007, no. 49, 443-449 Some Bounds for the Singular Values of Matrices Ramazan Turkmen and Haci Civciv Department of Mathematics, Faculty of Art and Science Selcuk University,
More informationPermutation Factorizations and Prime Parking Functions
Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,
More informationThe Sorting Index and Permutation Codes. Abstract
The Sorting Index and Permutation Codes William Y.C. Chen a, George Z. Gong b, Jeremy J.F. Guo b a Center for Applied Mathematics, Tianjin University, Tianjin 300072, P. R. China b Center for Combinatorics,
More informationOn the smallest abundant number not divisible by the first k primes
On the smallest abundant number not divisible by the first k rimes Douglas E. Iannucci Abstract We say a ositive integer n is abundant if σ(n) > 2n, where σ(n) denotes the sum of the ositive divisors of
More informationarxiv: v3 [math.nt] 10 Jul 2014
The sum of the unitary divisor function arxiv:1312.4615v3 [math.nt] 10 Jul 2014 Tim Trudgian Mathematical Sciences Institute The Australian National University, ACT 0200, Australia timothy.trudgian@anu.edu.au
More informationWEIGHTED SUM OF THE EXTENSIONS OF THE REPRESENTATIONS OF QUADRATIC FORMS
WEIGHTED SUM OF THE EXTENSIONS OF THE REPRESENTATIONS OF QUADRATIC FORMS BYEONG-KWEON OH Abstract Let L, N and M be positive definite integral Z-lattices In this paper, we show some relation between the
More informationExistentially closed models of the theory of differential fields with a cyclic automorphism
Existentially closed models of the theory of differential fields with a cyclic automorphism University of Tsukuba September 15, 2014 Motivation Let C be any field and choose an arbitrary element q C \
More informationGUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019
GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)
More informationThe Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract)
The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) Patrick Bindjeme 1 James Allen Fill 1 1 Department of Applied Mathematics Statistics,
More informationApplied Mathematics Letters
Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi
More informationA Property Equivalent to n-permutability for Infinite Groups
Journal of Algebra 221, 570 578 (1999) Article ID jabr.1999.7996, available online at http://www.idealibrary.com on A Property Equivalent to n-permutability for Infinite Groups Alireza Abdollahi* and Aliakbar
More informationLossy compression of permutations
Lossy compression of permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Wang, Da, Arya Mazumdar,
More informationOption Pricing Formula for Fuzzy Financial Market
Journal of Uncertain Systems Vol.2, No., pp.7-2, 28 Online at: www.jus.org.uk Option Pricing Formula for Fuzzy Financial Market Zhongfeng Qin, Xiang Li Department of Mathematical Sciences Tsinghua University,
More informationHIGHER ORDER BINARY OPTIONS AND MULTIPLE-EXPIRY EXOTICS
Electronic Journal of Mathematical Analysis and Applications Vol. (2) July 203, pp. 247-259. ISSN: 2090-792X (online) http://ejmaa.6te.net/ HIGHER ORDER BINARY OPTIONS AND MULTIPLE-EXPIRY EXOTICS HYONG-CHOL
More informationBest-Reply Sets. Jonathan Weinstein Washington University in St. Louis. This version: May 2015
Best-Reply Sets Jonathan Weinstein Washington University in St. Louis This version: May 2015 Introduction The best-reply correspondence of a game the mapping from beliefs over one s opponents actions to
More informationOn the Number of Permutations Avoiding a Given Pattern
On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2
More informationChapter 4 Partial Fractions
Chapter 4 8 Partial Fraction Chapter 4 Partial Fractions 4. Introduction: A fraction is a symbol indicating the division of integers. For example,, are fractions and are called Common 9 Fraction. The dividend
More informationTranslates of (Anti) Fuzzy Submodules
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 5, Issue 2 (December 2012), PP. 27-31 P.K. Sharma Post Graduate Department of Mathematics,
More informationDESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA
DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA Helmut Prodinger Institut für Algebra und Diskrete Mathematik Technical University of Vienna Wiedner Hauptstrasse 8 0 A-00 Vienna, Austria
More informationBINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES
Journal of Science and Arts Year 17, No. 1(38), pp. 69-80, 2017 ORIGINAL PAPER BINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES CAN KIZILATEŞ 1, NAIM TUGLU 2, BAYRAM ÇEKİM 2
More informationLocal vs Non-local Forward Equations for Option Pricing
Local vs Non-local Forward Equations for Option Pricing Rama Cont Yu Gu Abstract When the underlying asset is a continuous martingale, call option prices solve the Dupire equation, a forward parabolic
More informationMarkov Decision Processes II
Markov Decision Processes II Daisuke Oyama Topics in Economic Theory December 17, 2014 Review Finite state space S, finite action space A. The value of a policy σ A S : v σ = β t Q t σr σ, t=0 which satisfies
More informationReceived May 27, 2009; accepted January 14, 2011
MATHEMATICAL COMMUNICATIONS 53 Math. Coun. 6(20), 53 538. I σ -Convergence Fatih Nuray,, Hafize Gök and Uǧur Ulusu Departent of Matheatics, Afyon Kocatepe University, 03200 Afyonkarahisar, Turkey Received
More informationOn the Distribution and Its Properties of the Sum of a Normal and a Doubly Truncated Normal
The Korean Communications in Statistics Vol. 13 No. 2, 2006, pp. 255-266 On the Distribution and Its Properties of the Sum of a Normal and a Doubly Truncated Normal Hea-Jung Kim 1) Abstract This paper
More informationCONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005,
Novi Sad J. Math. Vol. 35, No. 2, 2005, 155-160 CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS Mališa Žižović 1, Vera Lazarević 2 Abstract. To every finite lattice L, one can associate a binary blockcode,
More informationPalindromic Permutations and Generalized Smarandache Palindromic Permutations
arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,
More informationEssays on Some Combinatorial Optimization Problems with Interval Data
Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university
More informationThe ruin probabilities of a multidimensional perturbed risk model
MATHEMATICAL COMMUNICATIONS 231 Math. Commun. 18(2013, 231 239 The ruin probabilities of a multidimensional perturbed risk model Tatjana Slijepčević-Manger 1, 1 Faculty of Civil Engineering, University
More informationMATH3075/3975 FINANCIAL MATHEMATICS TUTORIAL PROBLEMS
MATH307/37 FINANCIAL MATHEMATICS TUTORIAL PROBLEMS School of Mathematics and Statistics Semester, 04 Tutorial problems should be used to test your mathematical skills and understanding of the lecture material.
More informationForecast Horizons for Production Planning with Stochastic Demand
Forecast Horizons for Production Planning with Stochastic Demand Alfredo Garcia and Robert L. Smith Department of Industrial and Operations Engineering Universityof Michigan, Ann Arbor MI 48109 December
More informationOn Machin s formula with Powers of the Golden Section
On Machin s formula with Powers of the Golden Section Florian Luca Instituto de Matemáticas Universidad Nacional Autónoma de México C.P. 58089, Morelia, Michoacán, México fluca@matmor.unam.mx Pantelimon
More informationON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH
Discussiones Mathematicae Graph Theory 37 (2017) 623 632 doi:10.7151/dmgt.1941 ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH WITH GIVEN k-connectivity Yuefang Sun Department of Mathematics Shaoxing University
More informationarxiv: v1 [math.co] 31 Mar 2009
A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of
More informationELEMENTS OF MONTE CARLO SIMULATION
APPENDIX B ELEMENTS OF MONTE CARLO SIMULATION B. GENERAL CONCEPT The basic idea of Monte Carlo simulation is to create a series of experimental samples using a random number sequence. According to the
More informationChapter 1 Additional Questions
Chapter Additional Questions 8) Prove that n=3 n= n= converges if, and only if, σ >. nσ nlogn) σ converges if, and only if, σ >. 3) nlognloglogn) σ converges if, and only if, σ >. Can you see a pattern?
More informationQuadrant marked mesh patterns in 123-avoiding permutations
Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department
More informationProbability. An intro for calculus students P= Figure 1: A normal integral
Probability An intro for calculus students.8.6.4.2 P=.87 2 3 4 Figure : A normal integral Suppose we flip a coin 2 times; what is the probability that we get more than 2 heads? Suppose we roll a six-sided
More informationTWIST UNTANGLE AND RELATED KNOT GAMES
#G04 INTEGERS 14 (2014) TWIST UNTANGLE AND RELATED KNOT GAMES Sandy Ganzell Department of Mathematics and Computer Science, St. Mary s College of Maryland, St. Mary s City, Maryland sganzell@smcm.edu Alex
More informationA NEW NOTION OF TRANSITIVE RELATIVE RETURN RATE AND ITS APPLICATIONS USING STOCHASTIC DIFFERENTIAL EQUATIONS. Burhaneddin İZGİ
A NEW NOTION OF TRANSITIVE RELATIVE RETURN RATE AND ITS APPLICATIONS USING STOCHASTIC DIFFERENTIAL EQUATIONS Burhaneddin İZGİ Department of Mathematics, Istanbul Technical University, Istanbul, Turkey
More informationExpected Value and Variance
Expected Value and Variance MATH 472 Financial Mathematics J Robert Buchanan 2018 Objectives In this lesson we will learn: the definition of expected value, how to calculate the expected value of a random
More informationBETA DISTRIBUTION ON ARITHMETICAL SEMIGROUPS
Annales Univ Sci Budapest Sect Comp 47 (2018) 147 154 BETA DISTRIBUTION ON ARITHMETICAL SEMIGROUPS Gintautas Bareikis and Algirdas Mačiulis (Vilnius Lithuania) Communicated by Imre Kátai (Received February
More informationResearch Article On the Classification of Lattices Over Q( 3) Which Are Even Unimodular Z-Lattices of Rank 32
International Mathematics and Mathematical Sciences Volume 013, Article ID 837080, 4 pages http://dx.doi.org/10.1155/013/837080 Research Article On the Classification of Lattices Over Q( 3) Which Are Even
More informationON THE MEAN VALUE OF THE SCBF FUNCTION
ON THE MEAN VALUE OF THE SCBF FUNCTION Zhang Xiaobeng Deartment of Mathematics, Northwest University Xi an, Shaani, P.R.China Abstract Keywords: The main urose of this aer is using the elementary method
More informationCartesian Product of Two S-Valued Graphs
Global Journal of Mathematical Sciences: Theory and Practical. ISSN 0974-3200 Volume 9, Number 3 (2017), pp. 347-355 International Research Publication House http://www.irphouse.com Cartesian Product of
More information5.9: The Binomial Theorem
5.9: The Binomial Theorem Pascal s Triangle 1. Show that zz = 1 + ii is a solution to the fourth degree polynomial equation zz 4 zz 3 + 3zz 2 4zz + 6 = 0. 2. Show that zz = 1 ii is a solution to the fourth
More informationNotes on the symmetric group
Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function
More informationEFFICIENT MONTE CARLO ALGORITHM FOR PRICING BARRIER OPTIONS
Commun. Korean Math. Soc. 23 (2008), No. 2, pp. 285 294 EFFICIENT MONTE CARLO ALGORITHM FOR PRICING BARRIER OPTIONS Kyoung-Sook Moon Reprinted from the Communications of the Korean Mathematical Society
More informationA THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES
Proceedings of ALGORITMY 01 pp. 95 104 A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES BEÁTA STEHLÍKOVÁ AND ZUZANA ZÍKOVÁ Abstract. A convergence model of interest rates explains the evolution of the
More informationA class of coherent risk measures based on one-sided moments
A class of coherent risk measures based on one-sided moments T. Fischer Darmstadt University of Technology November 11, 2003 Abstract This brief paper explains how to obtain upper boundaries of shortfall
More informationA No-Arbitrage Theorem for Uncertain Stock Model
Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe
More informationOutline. 1 Introduction. 2 Algorithms. 3 Examples. Algorithm 1 General coordinate minimization framework. 1: Choose x 0 R n and set k 0.
Outline Coordinate Minimization Daniel P. Robinson Department of Applied Mathematics and Statistics Johns Hopkins University November 27, 208 Introduction 2 Algorithms Cyclic order with exact minimization
More informationFuzzy L-Quotient Ideals
International Journal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 3, Number 3 (2013), pp. 179-187 Research India Publications http://www.ripublication.com Fuzzy L-Quotient Ideals M. Mullai
More information2.1 Random variable, density function, enumerative density function and distribution function
Risk Theory I Prof. Dr. Christian Hipp Chair for Science of Insurance, University of Karlsruhe (TH Karlsruhe) Contents 1 Introduction 1.1 Overview on the insurance industry 1.1.1 Insurance in Benin 1.1.2
More informationYao s Minimax Principle
Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,
More informationChapter 8 Sequences, Series, and the Binomial Theorem
Chapter 8 Sequences, Series, and the Binomial Theorem Section 1 Section 2 Section 3 Section 4 Sequences and Series Arithmetic Sequences and Partial Sums Geometric Sequences and Series The Binomial Theorem
More informationarxiv: v2 [math.lo] 13 Feb 2014
A LOWER BOUND FOR GENERALIZED DOMINATING NUMBERS arxiv:1401.7948v2 [math.lo] 13 Feb 2014 DAN HATHAWAY Abstract. We show that when κ and λ are infinite cardinals satisfying λ κ = λ, the cofinality of the
More informationSequences, Series, and Probability Part I
Name Chapter 8 Sequences, Series, and Probability Part I Section 8.1 Sequences and Series Objective: In this lesson you learned how to use sequence, factorial, and summation notation to write the terms
More informationMath-Stat-491-Fall2014-Notes-V
Math-Stat-491-Fall2014-Notes-V Hariharan Narayanan December 7, 2014 Martingales 1 Introduction Martingales were originally introduced into probability theory as a model for fair betting games. Essentially
More informationMath 167: Mathematical Game Theory Instructor: Alpár R. Mészáros
Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Midterm #1, February 3, 2017 Name (use a pen): Student ID (use a pen): Signature (use a pen): Rules: Duration of the exam: 50 minutes. By
More informationAmerican Option Pricing Formula for Uncertain Financial Market
American Option Pricing Formula for Uncertain Financial Market Xiaowei Chen Uncertainty Theory Laboratory, Department of Mathematical Sciences Tsinghua University, Beijing 184, China chenxw7@mailstsinghuaeducn
More informationMore On λ κ closed sets in generalized topological spaces
Journal of Algorithms and Computation journal homepage: http://jac.ut.ac.ir More On λ κ closed sets in generalized topological spaces R. Jamunarani, 1, P. Jeyanthi 2 and M. Velrajan 3 1,2 Research Center,
More informationOn the Lower Arbitrage Bound of American Contingent Claims
On the Lower Arbitrage Bound of American Contingent Claims Beatrice Acciaio Gregor Svindland December 2011 Abstract We prove that in a discrete-time market model the lower arbitrage bound of an American
More informationGame-Theoretic Approach to Bank Loan Repayment. Andrzej Paliński
Decision Making in Manufacturing and Services Vol. 9 2015 No. 1 pp. 79 88 Game-Theoretic Approach to Bank Loan Repayment Andrzej Paliński Abstract. This paper presents a model of bank-loan repayment as
More informationA relation on 132-avoiding permutation patterns
Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,
More informationLecture 5: Iterative Combinatorial Auctions
COMS 6998-3: Algorithmic Game Theory October 6, 2008 Lecture 5: Iterative Combinatorial Auctions Lecturer: Sébastien Lahaie Scribe: Sébastien Lahaie In this lecture we examine a procedure that generalizes
More informationFURTHER ASPECTS OF GAMBLING WITH THE KELLY CRITERION. We consider two aspects of gambling with the Kelly criterion. First, we show that for
FURTHER ASPECTS OF GAMBLING WITH THE KELLY CRITERION RAVI PHATARFOD *, Monash University Abstract We consider two aspects of gambling with the Kelly criterion. First, we show that for a wide range of final
More informationLaurence Boxer and Ismet KARACA
SOME PROPERTIES OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we study digital versions of some properties of covering spaces from algebraic topology. We correct and
More informationCOMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS
COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence
More informationEstimation of Value at Risk and ruin probability for diffusion processes with jumps
Estimation of Value at Risk and ruin probability for diffusion processes with jumps Begoña Fernández Universidad Nacional Autónoma de México joint work with Laurent Denis and Ana Meda PASI, May 21 Begoña
More informationLaurence Boxer and Ismet KARACA
THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.
More informationOPTIMAL PORTFOLIO CONTROL WITH TRADING STRATEGIES OF FINITE
Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference 005 Seville, Spain, December 1-15, 005 WeA11.6 OPTIMAL PORTFOLIO CONTROL WITH TRADING STRATEGIES OF
More informationTheorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice.
CONGRUENCE-PRESERVING EXTENSIONS OF FINITE LATTICES TO SEMIMODULAR LATTICES G. GRÄTZER AND E.T. SCHMIDT Abstract. We prove that every finite lattice hasa congruence-preserving extension to a finite semimodular
More informationUniversity of California Berkeley
University of California Berkeley Improving the Asmussen-Kroese Type Simulation Estimators Samim Ghamami and Sheldon M. Ross May 25, 2012 Abstract Asmussen-Kroese [1] Monte Carlo estimators of P (S n >
More informationFactors of 10 = = 2 5 Possible pairs of factors:
Factoring Trinomials Worksheet #1 1. b 2 + 8b + 7 Signs inside the two binomials are identical and positive. Factors of b 2 = b b Factors of 7 = 1 7 b 2 + 8b + 7 = (b + 1)(b + 7) 2. n 2 11n + 10 Signs
More informationCONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION
Bulletin of the Section of Logic Volume 42:1/2 (2013), pp. 1 10 M. Sambasiva Rao CONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION Abstract Two types of congruences are introduced
More informationA lower bound on seller revenue in single buyer monopoly auctions
A lower bound on seller revenue in single buyer monopoly auctions Omer Tamuz October 7, 213 Abstract We consider a monopoly seller who optimally auctions a single object to a single potential buyer, with
More informationCumulants and triangles in Erdős-Rényi random graphs
Cumulants and triangles in Erdős-Rényi random graphs Valentin Féray partially joint work with Pierre-Loïc Méliot (Orsay) and Ashkan Nighekbali (Zürich) Institut für Mathematik, Universität Zürich Probability
More informationAn Optimal Odd Unimodular Lattice in Dimension 72
An Optimal Odd Unimodular Lattice in Dimension 72 Masaaki Harada and Tsuyoshi Miezaki September 27, 2011 Abstract It is shown that if there is an extremal even unimodular lattice in dimension 72, then
More information25 Increasing and Decreasing Functions
- 25 Increasing and Decreasing Functions It is useful in mathematics to define whether a function is increasing or decreasing. In this section we will use the differential of a function to determine this
More informationBest response cycles in perfect information games
P. Jean-Jacques Herings, Arkadi Predtetchinski Best response cycles in perfect information games RM/15/017 Best response cycles in perfect information games P. Jean Jacques Herings and Arkadi Predtetchinski
More informationTHE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES
THE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES FU LIU AND BRIAN OSSERMAN Abstract. We study pure-cycle Hurwitz spaces, parametrizing covers of the projective line having only one ramified point
More informationREMARKS ON K3 SURFACES WITH NON-SYMPLECTIC AUTOMORPHISMS OF ORDER 7
REMARKS ON K3 SURFACES WTH NON-SYMPLECTC AUTOMORPHSMS OF ORDER 7 SHNGO TAK Abstract. n this note, we treat a pair of a K3 surface and a non-symplectic automorphism of order 7m (m = 1, 3 and 6) on it. We
More informationMAC Learning Objectives. Learning Objectives (Cont.)
MAC 1140 Module 12 Introduction to Sequences, Counting, The Binomial Theorem, and Mathematical Induction Learning Objectives Upon completing this module, you should be able to 1. represent sequences. 2.
More informationTHE USE OF NUMERAIRES IN MULTI-DIMENSIONAL BLACK- SCHOLES PARTIAL DIFFERENTIAL EQUATIONS. Hyong-chol O *, Yong-hwa Ro **, Ning Wan*** 1.
THE USE OF NUMERAIRES IN MULTI-DIMENSIONAL BLACK- SCHOLES PARTIAL DIFFERENTIAL EQUATIONS Hyong-chol O *, Yong-hwa Ro **, Ning Wan*** Abstract The change of numeraire gives very important computational
More information3.1 Properties of Binomial Coefficients
3 Properties of Binomial Coefficients 31 Properties of Binomial Coefficients Here is the famous recursive formula for binomial coefficients Lemma 31 For 1 < n, 1 1 ( n 1 ) This equation can be proven by
More informationA note for hybrid Bollinger bands
Journal of the Korean Data & Information Science Society 2010, 21(4), 777 782 한국데이터정보과학회지 A note for hybrid Bollinger bands Jungsoo Rhee 1 1 Department of Mathematics, Pusan University of Foreign Studies
More informationSHORT-TIME IMPLIED VOLATILITY IN EXPONENTIAL LÉVY MODELS
SHORT-TIME IMPLIED VOLATILITY IN EXPONENTIAL LÉVY MODELS ERIK EKSTRÖM1 AND BING LU Abstract. We show that a necessary and sufficient condition for the explosion of implied volatility near expiry in exponential
More informationOn Complexity of Multistage Stochastic Programs
On Complexity of Multistage Stochastic Programs Alexander Shapiro School of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, Georgia 30332-0205, USA e-mail: ashapiro@isye.gatech.edu
More informationA RIDGE REGRESSION ESTIMATION APPROACH WHEN MULTICOLLINEARITY IS PRESENT
Fundamental Journal of Applied Sciences Vol. 1, Issue 1, 016, Pages 19-3 This paper is available online at http://www.frdint.com/ Published online February 18, 016 A RIDGE REGRESSION ESTIMATION APPROACH
More informationarxiv: v1 [math.lo] 27 Mar 2009
arxiv:0903.4691v1 [math.lo] 27 Mar 2009 COMBINATORIAL AND MODEL-THEORETICAL PRINCIPLES RELATED TO REGULARITY OF ULTRAFILTERS AND COMPACTNESS OF TOPOLOGICAL SPACES. V. PAOLO LIPPARINI Abstract. We generalize
More informationOptimizing Portfolios
Optimizing Portfolios An Undergraduate Introduction to Financial Mathematics J. Robert Buchanan 2010 Introduction Investors may wish to adjust the allocation of financial resources including a mixture
More informationOption Pricing under Delay Geometric Brownian Motion with Regime Switching
Science Journal of Applied Mathematics and Statistics 2016; 4(6): 263-268 http://www.sciencepublishinggroup.com/j/sjams doi: 10.11648/j.sjams.20160406.13 ISSN: 2376-9491 (Print); ISSN: 2376-9513 (Online)
More informationOPTION PRICE WHEN THE STOCK IS A SEMIMARTINGALE
DOI: 1.1214/ECP.v7-149 Elect. Comm. in Probab. 7 (22) 79 83 ELECTRONIC COMMUNICATIONS in PROBABILITY OPTION PRICE WHEN THE STOCK IS A SEMIMARTINGALE FIMA KLEBANER Department of Mathematics & Statistics,
More informationMartingales. by D. Cox December 2, 2009
Martingales by D. Cox December 2, 2009 1 Stochastic Processes. Definition 1.1 Let T be an arbitrary index set. A stochastic process indexed by T is a family of random variables (X t : t T) defined on a
More informationThe Binomial Theorem and Consequences
The Binomial Theorem and Consequences Juris Steprāns York University November 17, 2011 Fermat s Theorem Pierre de Fermat claimed the following theorem in 1640, but the first published proof (by Leonhard
More informationKAPLANSKY'S PROBLEM ON VALUATION RINGS
proceedings of the american mathematical society Volume 105, Number I, January 1989 KAPLANSKY'S PROBLEM ON VALUATION RINGS LASZLO FUCHS AND SAHARON SHELAH (Communicated by Louis J. Ratliff, Jr.) Dedicated
More information