Article

Special issue on computational statistics

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
The peaks over random threshold (PORT) methodology and the Pareto probability weighted moments (PPWM) of the largest observations are used to build a class of location-invariant estimators of the Extreme Value Index (EVI), the primary parameter in statistics of extremes. The asymptotic behaviour of such a class of EVI-estimators, the so-called PORT-PPWM EVI-estimators, is derived, and an alternative class of location-invariant EVI-estimators, the generalized Pareto probability weighted moments (GPPWM) EVI-estimators is considered as an alternative. These two classes of estimators, the PORT-PPWM and the GPPWM, jointly with the classical Hill EVI-estimator and a recent class of minimum-variance reduced-bias estimators are compared for finite samples, through a large-scale Monte-Carlo simulation study. An adaptive choice of the tuning parameters under play is put forward and applied to simulated and real data sets.
Article
Full-text available
Inferential studies for the regression coefficients of a linear model for interval-valued random variables are addressed. Confidence sets and hypothesis tests are investigated and solved through asymptotic and bootstrap techniques. The inferences are based on the least-squares estimators of the model which have been shown to be coherent with the interval arithmetic defining the model and to verify good statistical properties. Theoretical results assure the validity of the procedures. Moreover, some simulation studies and examples are considered to show the empirical behaviour and the practical applicability of the inferences.
Article
Full-text available
We treat the way to achieve great computational savings and accuracy in the evaluation of barrier options through Boundary Element Method (BEM). The proposed method applies to quite general pricing models. The only requirement is the knowledge of the characteristic function for the underlying asset distribution, usually available under general asset models. This paper serves as an introductory work to illustrate the implementation of BEM using numerical Fourier inverse transform of the characteristic function and to numerically show its stability and efficiency under simple frameworks such as the Black-Scholes model.
Article
We study different approaches for modelling intervention effects in time series of counts, focusing on the so-called integer-valued GARCH models. A previous study treated a model where an intervention affects the non-observable underlying mean process at the time point of its occurrence and additionally the whole process thereafter via its dynamics. As an alternative, we consider a model where an intervention directly affects the observation at its occurrence, but not the underlying mean, and then also enters the dynamics of the process. While the former definition describes an internal change of the system, the latter can be understood as an external effect on the observations due to e.g. immigration. For our alternative model we develop conditional likelihood estimation and, based on this, tests and detection procedures for intervention effects. Both models are compared analytically and using simulated and real data examples. We study the effect of model misspecification and computational issues.
Article
We discuss two recently proposed adaptations of the well-known Stahel-Donoho estimator of multivariate location and scatter for high-dimensional data. The first adaptation adjusts the calculation of the outlyingness of the observations while the second adaptation allows to give separate weights to each of the components of an observation. Both adaptations address the possibility that in higher dimensions most observations can be contaminated in at least one of its components. We then combine the two approaches in a new method and investigate its performance in comparison to the previously proposed methods.