9 research outputs found
Cowries in the archaeology of West Africa: the present picture
Despite the perceived importance of cowrie shells as indicators of long-distance connections in the West African past, their distribution and consumption patterns in archaeological contexts remain surprisingly underexplored, a gap that is only partly explicable by the sparse distribution of archaeological sites within the sub-continent. General writings on the timeline of importation of cowries into West Africa often fail to take into account the latest archaeological evidence and rely instead on accounts drawn from historical or ethnographic documents. This paper is based on a first-hand assessment of over 4500 shells from 78 sites across West Africa, examining chronology, shell species and processes of modification to assess what distribution patterns can tell us about the history of importation and usage of cowries. These first-hand analyses are paralleled by a consideration of published materials. We re-examine the default assumption that two distinct routes of entry existed — one overland from North Africa before the fifteenth century, another coming into use from the time sea links were established with the East African coast and becoming predominant by the middle of the nineteenth century. We focus on the eastern part of West Africa, where the importance of imported cowries to local communities in relatively recent periods is well known and from where we have a good archaeological sample. The conclusion is that on suitably large assemblages shell size can be an indication of provenance and that, while the present archaeological picture seems largely to confirm historical sources, much of this may be due to the discrepancy in archaeological data available from the Sahara/Sahel zone compared to the more forested regions of the sub-continent. Future archaeological work will clarify this matter
On probabilities and loss aversion
Choice behavior, Loss aversion, Probability weighting, Prospect theory, Utility, D81, C60,
Computational Issues
Proposed portfolio models are computationally attractive as they give rise to linear and mixed integer programming problems. The introduction of real features, when requiring integer and/or binary variables, may increase problem complexity significantly. In this chapter, we address the computational issues related to the solution and comparison of the described models. We briefly discuss the solution of the models through out-of-the shelf software packages and provide, whenever possible, hints to researchers and practitioners facing the solution of LP/MILP portfolio problems. To tackle large size MILP problems, one has to resort to heuristics. General purpose methods with respect to specific algorithms have the advantage that can be applied to large classes of MILP problems. We present a matheuristic, called Kernel Search, that is general and flexible, and requires very limited implementation effort. An important part of the chapter covers the computational issue related to the data needed by a model. The models presented must be fed with data, the most crucial being the rates of return of the assets under the different scenarios. Although several techniques can generate such data, we just present some of them focusing our attention on the one based on historical realizations as the simplest and most frequently used. The type of generation technique adopted affects the number of scenarios that have to be generated, and in turn the time required to solve the portfolio optimization model, where the number of constraints is proportional to the number of scenarios. A part of the chapter is dedicated to the problem of solving large scale LP models. When the number of scenarios, and consequently the number of constraints and slack variables associated with models, grows to the order of several thousands, then solving an LP problem may take a large amount of time. We show how, in such cases, the computational efficiency can be achieved solving the dual problem. Finally, we deal with the comparison and testing of different models. In previous chapters we present different risk/safety performance measures, different ways to include the transaction costs in a model, different constraints that may be added. The question is: Which model is the most appropriate to represent the problem? How can different models be compared? Are there any recognized methodologies? We discuss how models can be validated providing hints based on our personal experience