Localized Proxy Simulation Schemes
نویسندگان
چکیده
For the numerical calculation of partial derivatives (aka. sensitivites or greeks) from a MonteCarlo simulation there are essentially two possible approaches: The pathwise method and the likelihood ratio method. Both methods have their shortcomings: While the pathwise method works very well for smooth payouts it fails for discontinuous payouts. On the other hand, the likelihood ratio gives much better results on discontinuous payouts, but falls short of the pathwise method if smooth payouts are considered. In this paper, we present a modification to the (partial) proxy simulation scheme framework, resulting in a per-path selection of either the pathwise method or the likelihood ratio method. This allows us to chose the optimal simulation method on a path-by-path basis. Since the method is implemented as a proxy simulation scheme as well, the sensitivities can be calculated from simple finite differences applied to the pricing engine.
منابع مشابه
CLAM: Cross-layer Localized Authentication Mechanism based on Proxy MIPv6 and SIP in Next Generation Networks
Abstract—In this paper we propose a novel Cross-layer Localized Authentication Mechanism (CLAM) to secure mobility in Next Generation Networks. The proposed mechanism integrates Proxy MIPv6 and Session Initiation Protocol (SIP) to handle the authentication locally in real-time and non-real-time communications. The design objectives of CLAM are three fold: i) handover latency is minimized by th...
متن کاملEnhancing inter-PMIPv6-domain for superior handover performance across IP-based wireless domain networks
As a network-based localized mobility management protocol, Proxy Mobile IPv6 (PMIPv6) enables a Mobile Host (MH) to roam within a localized domain without MH intervention in the mobility-related signalling. However, the PMIPv6 maintains MH mobility support in a restriction domain. Therefore, whenever the MH roams away from the PMIPv6 domain, its reachability status will be broken-down causing h...
متن کاملTolerating Denial - of - Service Attacks A System Approach
OF THE DISSERTATION Tolerating Denial-of-Service Attacks A System Approach by Ju Wang Doctor of Philosophy in Computer Science University of California, San Diego, 2005 Professor Andrew A. Chien, Chair Proxy network-based defense has recently emerged to address an open research challenge protecting Internet service applications from Denial-of-Service (DoS) attacks. Such schemes use a proxy ...
متن کاملProxy Ecology - Cooperative Proxies with Artificial Life
Proxy servers have been widely used by institutions to serve their clients behind firewalls. Recently many schemes have been proposed to organize the proxy servers into a cooperative proxy cache system. However most of existing proxy cache schemes require manual configuration of the cooperative proxies based on the network architecture. In this paper, we propose a novel P2P proxy caching scheme...
متن کاملEvaluating Hardware and Software Web Proxy Caching Solutions Analysis of the Effectiveness of Web Caching in the Gigabit Research Network G-win
Commercial Web caching solutions include CacheFlow’s Server Accelerator, Cisco CacheEngine, InforLibria’s DynaCache, Network Appliance NetCache, Inktomie’s Traffic Server, and Novell’s InternetCache System. These products differ in cache size, disk storage, and throughput. However, all commercial Web caching products currently on the market solely rely on the replacement scheme Least Recently U...
متن کامل