Hedging without sweat: a genetic programming approach

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hedging derivative securities with genetic programming

One of the most recent applications of GP to finance is to use genetic programming to derive option pricing formulas. Earlier studies take the Black–Scholes model as the true model and use the artificial data generated by it to train and to test GP. The aim of this paper is to provide some initial evidence of the empirical relevance of GP to option pricing. By using the real data from S&P 500 i...

متن کامل

Genetic Programming without Fitness

This paper provides a short, informal illustration of a selection scheme based on the key idea of competition, particularly suited for genetic programming, which provides a way to do without the explicit deenition of a tness function. In many tasks, competition between two individuals on one problem instance chosen according to some probability can be a valid alternative to deening an appropria...

متن کامل

Genetic Programming Bloat without Semantics

To investigate the fundamental causes of bloat, six artificial random binary tree search spaces are presented. Fitness is given by program syntax (the genetic programming genotype). GP populations are evolved on both random problems and problems with “building blocks”. These are compared to problems with explicit ineffective code (introns, junk code, inviable code). Our results suggest the entr...

متن کامل

Bankruptcy Prediction: Dynamic Geometric Genetic Programming (DGGP) Approach

 In this paper, a new Dynamic Geometric Genetic Programming (DGGP) technique is applied to empirical analysis of financial ratios and bankruptcy prediction. Financial ratios are indeed desirable for prediction of corporate bankruptcy and identification of firms’ impending failure for investors, creditors, borrowing firms, and governments. By the time, several methods have been attempted in...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantitative Finance Letters

سال: 2013

ISSN: 2164-9502,2164-9510

DOI: 10.1080/21649502.2013.813166