24,025 research outputs found

    Online Risk Monitoring Using Offline Simulation

    Get PDF
    Estimating portfolio risk measures and classifying portfolio risk levels in real time are important yet challenging tasks. In this paper, we propose to build a logistic regression model using data generated in past simulation experiments and to use the model to predict portfolio risk measures and classify risk levels at any time. We further explore regularization techniques, simulation model structure, and additional simulation budget to enhance the estimators of the logistic regression model to make its predictions more precise. Our numerical results show that the proposed methods work well. Our work may be viewed as an example of the recently proposed idea of simulation analytics, which treats a simulation model as a data generator and proposes to apply data analytics tools to the simulation outputs to uncover conditional statements. Our work shows that the simulation analytics idea is viable and promising in the field of financial risk management

    Hang With Your Buddies to Resist Intersection Attacks

    Full text link
    Some anonymity schemes might in principle protect users from pervasive network surveillance - but only if all messages are independent and unlinkable. Users in practice often need pseudonymity - sending messages intentionally linkable to each other but not to the sender - but pseudonymity in dynamic networks exposes users to intersection attacks. We present Buddies, the first systematic design for intersection attack resistance in practical anonymity systems. Buddies groups users dynamically into buddy sets, controlling message transmission to make buddies within a set behaviorally indistinguishable under traffic analysis. To manage the inevitable tradeoffs between anonymity guarantees and communication responsiveness, Buddies enables users to select independent attack mitigation policies for each pseudonym. Using trace-based simulations and a working prototype, we find that Buddies can guarantee non-trivial anonymity set sizes in realistic chat/microblogging scenarios, for both short-lived and long-lived pseudonyms.Comment: 15 pages, 8 figure

    Sequential Empirical Bayes method for filtering dynamic spatiotemporal processes

    Get PDF
    We consider online prediction of a latent dynamic spatiotemporal process and estimation of the associated model parameters based on noisy data. The problem is motivated by the analysis of spatial data arriving in real-time and the current parameter estimates and predictions are updated using the new data at a fixed computational cost. Estimation and prediction is performed within an empirical Bayes framework with the aid of Markov chain Monte Carlo samples. Samples for the latent spatial field are generated using a sampling importance resampling algorithm with a skewed-normal proposal and for the temporal parameters using Gibbs sampling with their full conditionals written in terms of sufficient quantities which are updated online. The spatial range parameter is estimated by a novel online implementation of an empirical Bayes method, called herein sequential empirical Bayes method. A simulation study shows that our method gives similar results as an offline Bayesian method. We also find that the skewed-normal proposal improves over the traditional Gaussian proposal. The application of our method is demonstrated for online monitoring of radiation after the Fukushima nuclear accident

    Real time resource scheduling within a distributed collaborative design environment

    Get PDF
    Operational design co-ordination is provided by a Virtual Integration Platform (VIP) that is capable of scheduling and allocating design activities to organisationally and geographically distributed designers. To achieve this, the platform consists of a number of components that contribute to the engineering management and co-ordination of data, resources, activities, requirements and processes. The information required to schedule and allocate activities to designers is defined in terms of: the designers' capability to perform particular design activities; commitment in terms of the design activities that it is currently performing, and capacity to perform more than one design activity at the same time as well as the effect of increased capacity on capability. Previous approaches have been developed by the authors to automatically allocate resources to activities [1-3], however these approaches have generally been applied either within the context of real-time allocation of computational resources using automated design tools, or in the planning of human resources within future design projects and not for the real-time allocation of activities to a combination of human and computational resources. The procedure presented here is based upon this previous research and involves: the determination of the design activities that need to be undertaken on the basis of the goals that need to be achieved; identification of the resources that can undertake these design activities; and, the use of a genetic algorithm to optimally allocate the activities to the resources. Since the focus of the procedure is toward the real-time allocation of design activities to designers, additional human issues with respect to scheduling are considered. These human issues aspects include: consideration of the improvement in performance as a result of the experience gained from undertaking the activity; provision of a training period to allow inexperienced designers the opportunity to improve their performance without their performance being assessed; and the course of action to take when a designer is either unwilling or unable to perform an activity
    • …
    corecore