• Aucun résultat trouvé

Limit Theorem for a Modified Leland Hedging Strategy under Constant Transaction Costs rate

N/A
N/A
Protected

Academic year: 2021

Partager "Limit Theorem for a Modified Leland Hedging Strategy under Constant Transaction Costs rate"

Copied!
39
0
0

Texte intégral

(1)

HAL Id: hal-00467704

https://hal.archives-ouvertes.fr/hal-00467704

Preprint submitted on 14 Apr 2010

HAL

is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire

HAL, est

destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Limit Theorem for a Modified Leland Hedging Strategy under Constant Transaction Costs rate

Sebastien Darses, Emmanuel Denis

To cite this version:

Sebastien Darses, Emmanuel Denis. Limit Theorem for a Modified Leland Hedging Strategy under

Constant Transaction Costs rate. 2010. �hal-00467704�

(2)

STRATEGY UNDER CONSTANT TRANSACTION COSTS RATE

SEBASTIEN DARSESANDEMMANUEL DENIS

Abstract. We study the Leland model for hedging portfolios in the presence of a constant proportional transaction costs coefficient. The modified Leland’s strategy defined in [2], contrarily to the classical one, ensures the asymptotic replication of a large class of payoff. In this setting, we prove a limit theorem for the deviation between the real portfolio and the payoff. As Pergamenshchikov did in the framework of the usual Leland’s strategy [11], we identify the rate of convergence and the associated limit distribution. This rate turns out to be improved using the modified strategy and non periodic revision dates.

Keywords: Asymptotic hedging – Leland-Lott strategy – Transaction costs – Martingale limit theorem.

1. Introduction

The present paper is concerned with the study of asymptotic hedging in the pres- ence of transaction costs. The asymptotic replication of a given payoff is performed via a modified Leland’s strategy recently introduced in [2].

Let us briefly recall the history and the main known results about Leland’s strategy. In 1985 Leland suggested an approach to price contingent claims under proportional transaction costs. His main idea was to use the classical Black-Scholes formula with a suitably adjusted volatility for a periodically revised portfolio whose terminal value approximates the payoff. The intuition behind this practical method is to compensate for transaction cost by increasing the volatility in the following way:

(1.1) bσt22+σ√ nkn

p8/πp f(t),

where n is the number of the portfolio revision dates and kn =k0nα, α∈[0,12] is the transaction costs coefficient generally depending ofn;f is an increasing and smooth function whose inverse g := f1 defines the revision dates tni := g(ni), 1≤i≤n.

The principal results on convergence for models with transaction costs can be described as follows. First consider the case of approximate hedging of the European call option using the strategy with periodic portfolio revisions (i.e g(t) =t). We know the following results withT = 1:

(a) For α = 12, Lott gave the first rigorous result on the convergence of the approximating portfolio value V1n to the payoff V1 = (S1 −K)+. The sequence V1n−V1 tends to zero in probability [10], and a stronger result holds: nE(V1n−V1)2converges to a constantA1>0[5];

1

(3)

(b) Forα∈(0,12), the sequenceV1n−V1tends to zero in probability (see [8]), and it is shown in [1] thatnpαE (V1n−V1)2→0as n→ ∞, withpα< α.

(c) Forα= 0, the terminal values of portfolios do not converge to the European call as shown by Kabanov and Safarian [8]. Namely, there is a negative σ{S1}-measurable random variableξsuch thatV1n−V1→ξin probability.

Pergamenshchikov [11] then analyzed the rate of convergence and proved a limit theorem: the sequencen14(V1n−V1−ξ)converges in law to a mixture of Gaussian distributions [11]. He noticed that one can increase the modified volatility to obtain the asymptotic replication. To do so, he utilizes the explicit form of the systematic hedging error for the European call option.

For related results see also [6] and [12].

For models including uniform and non-uniform revision intervals one needs to im- pose certain conditions on the scale transform g. Generalizations of some of the above results to this more technical case as well as extensions to contingent claims of the form h(S1) can be found in [12, 5, 1]. In particular, n1/2+αE (V1n−V1)2 converges to a constant in the case α >0. Moreover, forα= 12, the distributions of the processYtn :=n12(Vtn−Vbt)in the Skorohod spaceD[0,1]converges weakly to the distribution of a two-dimensional Markov diffusion process component (see [4]). Notice that the asymptotic replication still does not hold for α = 0 in this more general setting. For more details we refer to [1, 3, 4] and references therein.

We solve the caseα= 0for a large class of payoff and with specific non uniform revision dates by means of the modified strategy introduced in [2]. This one makes the portfolio’s terminal value converge to the contingent claim asntends to infinity, that is the approximation error vanishes. The analysis we performed here suggests that it might be difficult to obtain a better convergence rate regarding uniform revision dates. In the framework of the non uniform grid we use, concentrating the revision dates near the maturityT = 1 accelerates the convergence rate. We leave the issue concerning periodic revision dates as an open problem.

The asymptotic behavior of the hedging error is a practical important issue.

Since traders obviously prefer gains than losses, measuring theL2-norm of hedging errors is strongly criticized. Of course, the limiting distribution of the hedging error is much more informative. Our present work also aims at tackling this issue: we prove that

n14+p(V1n−h(S1))−−−−→n d

→∞ Z,

where the law ofZ is explicitly identified andp >0depends on the choosen grid.

The paper is organized as follows. In Section2, we introduce the basic notations, models and assumptions of our study; In particular we recall the modified Leland’s strategy defined in [2]. In Section 3, we state our main result: a limit theorem for the renormalized asymptotic hedging error. In Section 4, we establish two lemmas concerning, on one hand, random variables constructed from the geometric Brownian motion, and on the other hand, some change of variables for the revision dates. These auxiliary results will be used repeatedly throughout the paper. In

Note thatYtncorresponds to the deviation (up to a multiplicative constant) between the “real world” portfolio and the theoretical Leland’s portfolioVbt=C(t, Sb t)whereCbis the modified heat equation solution suggested by Leland whose terminal value is the payoff function.

(4)

Section 5, we prove the main result. An appendix finally recalls all the known technical results we need for the various proofs.

2. Notations and Models

2.1. Black–Scholes model and hedging strategy. We are given a filtered prob- ability space(Ω,F,(Ft)[0,1],P)on which a standard one-dimensional(Ft)-adapted Brownian motionW is defined. As usual, we denote byL2(Ω)the space of square in- tegrableF1-measurable random variables endowed with its normkXk2:=√

E X2. We consider the classical Black–Scholes model composed of two assets without transaction costs, i.e. k0 = 0and bσ=σ. The first one is riskless (bond) with the interest rater= 0and the second asset isS= (St),t∈[0,1], a geometric Brownian motion that is

St = S0eσWt12σ2t. (2.2)

It satisfies the SDE

dSt = σStdWt,

with positive constants S0, σ. It means that the risky asset is seen under the martingale measure.

The well-known Black and Scholes problem without transaction costs is to hedge a payoff h(S1), h being a continuous function of polynomial growth. The pricing function solves the terminal valued Cauchy problem

(2.3)





Ct(t, x) +σt2

2 x2Cxx(t, x) = 0, t∈[0,1], x >0, C(1, x) = h(x).

Its solution can be written as C(t, x) =

Z

−∞

h

xeρtyρ

2 t 2

ϕ(y)dy (2.4)

whereρ2t = (1−t)σ2 andϕis the standard Gaussian density.

Without transaction costs (σ=bσ) the self–financed portfolio process reads Vt = C(0, S0) +

Z t 0

Cx(u, Su)dSu. (2.5)

In the Itô formula for C(t, St) the integral over dt vanishes and, therefore, Vt = C(t, St) for allt ∈ [0,1]. In particular, V1 =h(S1): At maturity the portfolioV replicates the terminal payoff of the option. Modeling assumptions of the above formulation include frictionless market and continuous trading for instance.

However, an investor revises the portfolio at a finite set of dates Tn ={ti∈[0,1], i= 0,· · · , n}

and keeps Cx(ti, Sti) units of the stock until the next revision date ti+1. It is well known that this discretized model converges to the Black–Scholes one in the sense that the corresponding portfolio terminal value converges to the payoff as the number of revision dates tends to infinity.

(5)

2.2. Reminder about Leland’s strategy. We are now concerned with transac- tion costs. We directly work in a discrete time setting.

Leland suggested to replaceσin the Cauchy problem above by a suitable modi- fied volatilitybσ. In the case whereσbdoes not depend ont, the solutionCb satisfies

C(t, x) =b C(t, x,bσ), (2.6)

i.e. practitioners do not need to rectify their algorithms to compute the strategy.

Leland obtained an explicit expression of bσby equalizing the transaction costs of the portfolio and the drift term generated by the additional term bσ−σ2 > 0 in the Ito expansion of the payoff h(S1) =C(1, Sb 1). In the general case, the pricing function can be written as

C(t, x) =b Z

−∞

h

xeρntynt)2/2 ϕ(y)dy (2.7)

where

nt)2 :=

Z 1 ts2ds, (2.8)

b

σ2t := σ2+σ√ nkn

p8/πp f(t), (2.9)

ϕis the Gaussian density andg=f1 is the revision date function.

2.3. A possible modification of Leland’s strategy. In the model with propor- tional transaction costs and a finite number of revision dates the current value of the portfolio process at timetis described as

(2.10) Vtn:=V0n+ Z t

0

DundSu−X

ti<t

k0Sti|Dni+1−Dni|

where Dn is a piecewise-constant process with Dn =Din on the interval (ti1, ti], ti =tni, i≤n, are the revision dates, andDni areFti−1-measurable random vari- ables.

Recall that the transaction costs coefficient is a constantk0>0(that isα= 0in the Leland model) and the datesti are defined by a functiong, namelyti =g(ni).

Let us denote byf the inverse ofg. Set for alli0< n Jin0(t) = {i≥i0, ti ≤t, ti∈ Tn} and let us define the dates

tn(t) = t(n1)maxJ0n(t)

t+n(t) = t1+(n1)maxJ0n(t).

The “enlarged volatility”, depending onn, is given by the formula (2.9).

We modify the usual Leland strategy (see [2]) by considering the process Dn with

Dni := Cbx(ti1, Sti1)−

i1

X

j=1

Z tj

tj−1

Cbxt(u, Stj−1)du.

(2.11)

Moreover, let us define

Ktn:= X

iJ1n(t)

∆Ktnn

i

(6)

where∆Ktnn

0 := 0and fori≥1,

∆Ktnn

i :=−

Z ti ti−1

Cbxt(u, Su)du.

(2.12)

In the same way, we set

Lnt := X

iJ1n(t)

∆Lntn

i

where∆Lntn

0 := 0and fori≥1,

∆Lntn

i :=−

Z ti

ti−1

Cbxt(u, Sti−1)du.

(2.13)

2.4. Assumptions and notational conventions. Throughout the paper, we adopt the following rules:

(i) we will often omit the indexes n and the variablet (especially in the ap- pendix) when there is no ambiguity;

(ii) the constants C appearing in the various inequalities is independent of n and may change from one line to the next;

(iii) we use the classical Landau notations O and o. These quantities will be always deterministic.

We use the abbreviations

δt := Cbx(t, St), (2.14)

γt := Cbxx(t, St).

(2.15)

We denote by(δnt)t the process equal toδtni on the interval[tni, tni+1)and (γtn)t is defined similarly. For an arbitrary processH, we set ∆Hti =Hti−Hti−1.

We will work under the following assumptions:

(A1) The functiong has the following form:

(2.16) g(t) = 1−(1−t)µ, µ∈ 1,3 +√ 57 8

! .

(A2) his a convex and continuous function on[0,∞)which is twice differentiable except the pointsK1<· · ·< Kpwherehandh′′admit right and left limits;

|h′′(x)| ≤M xβ forx≥Kp whereβ≥3/2.

Assumption (A1) is not too restrictive. A trader can in particular choose µ sufficiently close to1to balance its portfolio quasi periodically. However, as we will see, it is more preferable to increaseµto obtain a better rate of convergence.

Note thatf(t) = 1−(1−t)1/µ, hence the derivativef forµ >1explodes at the maturity date and so does the enlarged volatility. We define the increasing function

p:=p(µ) := µ−1 4(1 +µ). (2.17)

Under Assumption (A1), we have0< p <1/16.

In the sequel, the quantity

Q(µ) = µ1/22p(1 +µ)4p 24pp

8/π4p+1

(2.18)

will frequently appear.

(7)

0 i-1 i i+1 i+2 i+3 1

0 t(i-1) t(i) t(i+1) t(i+2) t(i+3) 1

Revision dates

f(t, 1/mu)

Figure 1. Revision dates withf(t) = 1−(1−t)1µ, µ= 1.5 andn= 10.

3. Main Result

In [2], it is proven thatV1n converges in probability toh(S1). Our main result here provides the rate of convergence and identifies the associated limit distribution of the deviation:

Theorem 3.1. Consider the portfolioVn defined by (2.10) and (2.11) under As- sumptions (A1) and (A2). The following convergence then holds:

n14+p(V1n−h(S1))−−−−→n d

→∞ Z, (3.19)

where the law ofZ is given by the characteristic functionφZ(s) =Ees

2 2η2 with η2 := Q(µ)(k0σ)14pS12×

Z

0

x4p

(Z

x

J(y, S1)dy 2

+

1− 2 π

Je(x, S1)2 )

dx, and

J(x, S1) := 1 2x

Z

−∞

h(Suexy+x/2)(−y2−√

xy+ 1)ϕ(y)dy (3.20)

J(x, Se 1) := 1

√x Z

−∞

h(Suexy+x/2)yϕ(y)dy.

(3.21) Moreover

n12+2pE (V1n−h(S1))2−−−−→n

→∞ E η2.

(8)

4. Auxiliary results

4.1. Geometric Brownian motion and related quantities. In the sequel, we shall use the decomposition given by Ito formula

(4.22) Cbx(t, St) =Cbx(0, S0) +Mctn+Abnt where

Mctn :=

Z t 0

σuSuCbxx(u, Su)dWu, Abnt :=

Z t 0

Cbxt(u, Su) +1

2uSu2Cbxxx(u, Su)

du.

The processMcn is a square integrable martingale on[0,1]by virtue of [2].

We set foru < v

Euv= Sv

Su −1, and

[Euv]c = E (|Euv|)− |Euv|. {Euv}2s := (Euv)2sgnEuv.

In the sequel, we will use several times the following basic results.

Lemma 4.1. For alli the following inequalities and expansions hold:

E (Euv)2m ≤ Cm(v−u)m, u≤v (4.23)

E Etti−i 1

2

= σ2∆ti(1 +o(1)) (4.24)

E h Etti−1i

i2

c =

1−2

π

σ2∆ti(1 +o(1)) (4.25)

E h Etti−i 1

i2

csgnEuv =

1−2 π

σ2(∆ti)32(1 +o(1)) (4.26)

E {Etti−1i }2s = k(∆ti)3/2

1 +o(n1/4) . (4.27)

Proof. We refer to [1] or [4]. For the sake of completeness we recall the proof of the last one. Let us notice the equality in law

{Etti−i 1}2s

=d expn

σp

∆tjξ−σ2∆tj/2o

−12 1ξσ

∆tj/2−1ξσ

∆tj/2

,

whereξ is the standard Gaussian variable. Sinceξ and−ξ has the same law, this yields

E{Etti−1i }2s = E

eu2/2−12

eu2/2−12 1ξu/2

−E

eu/2−12

1|ξ|≤u/2, whereu=σp

∆tj. Moreover, we have the inequality E

eu2/2−12

1|ξ|≤u/2≤u4.

(9)

From [5], we recall that E

eu2/2−12

eu2/2−12

1ξu/2= 2

√2πu3+O(u4).

We then conclude.

4.2. Basic results concerning the revision dates. The function ρt decreases fromρ0 to0. The following useful bounds are obvious:

ρ2t ≥ (σ2+cn12)(1−t) (4.28)

ρ2t ≤ σ2(1−t) +σk0n12p

8/π(1−t)12(1−f(t))12. (4.29)

Moreover, it is straightforward that ρ2t ≥ cn12p

f(t)(1−t), (4.30)

provided thatf is no decreasing.

Note that there is a constantC independent ofnsuch that for alli≤n−1, 1−ti1

1−ti ≤ C.

(4.31)

From there we deduce

∆ti

1−ti ≤ C.

(4.32)

We shall often use the inequality

nX1 i=1

∆ti

1−ti ≤C log(n) whereC is a constant independent ofn.

Lemma 4.2. Fix x > 0 and t := t(n, x) such that x = ρ2t. Set xi1 = ρ2ti−1 and xi = ρ2ti where ti1, ti are such that t ∈[ti1, ti). Then, x∈ (xi, xi1] with

|xi1−xi| ≤c n1/2,c is a constant. There exists a constantC >0 such that

∆tin1/2+2p

xi1−xi ≤ C(x+ 1).

(4.33)

Moreover, for a givenx,(1−t)≤cn1/2x→0asn→ ∞and

∆tin1/2+2p xi1−xi −−−−→n

→∞

Q(µ)x4p (σk0)4p+1. (4.34)

Proof. Let us write

∆tin1/2+2p xi1−xi

= n2p

σ2n1/2+σk0

p8/π∆t1

i

Rti

ti−1

pf(u)du

n→∞

n2p σk0

p8/πp f(˜ti) where˜ti∈[ti1, ti]. Moreover

x=ρ2t = σ2(1−t) +σk0

p8/πn1/2 Z 1

t

pf(u)du

= σ2(1−t) +σk0

p8/πn1/21/2

1 +µ(1−t)1+µ

(10)

and

1−t= x−σ2(1−t) σk0

p8/πn1/2 1 +µ 2µ1/2

!1+µ .

Note thatx≥cn1/2(1−t)so that(1−t)≤cn1/2x→0. In a similar way, we have

xi1−xi2ti−1−ρ2ti2∆ti+cn1/2 q

f(ˇti)∆ti

whereˇti∈[ti1, ti]. We deduce that xi1−xi2∆ti+cn1/2

q

f(ˇti)gi)n1 whereθi∈[(i−1)/n, i/n]. Moreover,

q

f(ˇti)gi) = gi) pg(f(ˇti))

is bounded since f(ˇti) ∈ [(i−1)/n, i/n], i ≤n−1. Hence there is a constant c satisfyingxi1−xi≤cn1/2. Sinceρis decreasing,x∈[xi, xi1].

Eventually,˜ti∈[ti1, ti] is such thatx˜i2˜t

i∈[xi, xi1]andx˜i→x. Similarly we have

1−t˜i= x˜i−σ2(1−t˜i) σk0

p8/πn1/2 1 +µ 2µ1/2

!1+µ (4.35)

which yields q

f(˜ti) =µ1/2i−σ2(1−˜ti) σk0

p8/πn1/2 1 +µ 2µ1/2

!11+µ−µ (4.36)

and

∆tin1/2+2p xi1−xi n

→∞

n2p σk0

p8/πp f(˜ti)

n→∞

n2p σk0

p8/πµ1/2 σk0

p8/πn1/2

˜

xi−σ2(1−˜ti) 2µ1/2 1 +µ

!1−µ1+µ

n→∞

1 σk0

p8/πµ1/2 σk0

p8/π

˜

xi−σ2(1−˜ti) 2µ1/2 1 +µ

!1−µ1+µ . Sincex˜i→xandt˜i→0, we deduce that

∆tin1/2+2p xi1−xi −−−−→n

→∞

1 σk0

p8/πµ1/2 σk0

p8/π x

1/2 1 +µ

!1−µ1+µ . Since0<(µ−1)/(1 +µ)<1, we also find a constantcsuch that

∆tin1/2+2p

xi1−xi ≤c˜xi−σ2(1−t˜i)µ−1+µ1 ≤c(x+ 1),

which concludes the proof.

(11)

We now stress an important remark regarding a slight abuse of notation repeat- edly used along the paper.

Remark 4.3. Throughout the sequel, we shall often use the change of variable x=ρ2t withdx=−bσ2tdt. For ease of notation, we will use the abuse of notation t instead oft(n, x) := (ρ2)1(x)when applying this change of variable in an integral.

Similarly, a direct computation yields the following lemma.

Lemma 4.4. Sety >0 andv:=v(n, y)such thaty=ρ2v. There exists a constant C >0 such that

(1−v)n1/2+2p

y ≤C y.

Moreover, for a giveny,(1−v)≤cn1/2y →0as n→ ∞and (1−v)n1/2+2p

y −−−−→n

→∞

µ1/22p(1 +µ)4p+1y4p 24p

σk0

p8/π4p+1 .

(12)

5. Proof of the limit theorem

The proof is divided into three parts. In Step1we split the hedging error into a martingale partM and a residual partε. In Step2we show that the residual terms tend to0inL2(Ω) with raten14+pas ntends to infinity. We identify in Step3the asymptotic distribution of the martingale n14+pMn and we conclude the proof of the main result.

5.1. Step 1: Splitting of the hedging error. Comparing Expression (2.10) with the Ito expansion of h(S1) = C(1, Sb 1) yields the following decompositions.

The hedging error reads

V1n−h(S1) =M1nn1 (5.37)

where for alln∈N,Mn is a martingale of terminal value M1n := k0

X

in1

γti−1St2i−1h Etti−i 1

i

c+ Z 1

0

KundSu. (5.38)

The residual term can be splited as

εnt =Rn0(t) +Rn1(t) +Rn2(t) +Rn3(t) (5.39)

where

Rn0(t) := k0

X

iJ1n(t)

γti−1S2ti−1 σ r2

π

pnf(ti1)∆ti−E Etti−i 1

! (5.40)

Rn1(t) :=

Z t 0

nu−δu)dSu, (5.41)

Rn2(t) := k0

X

iJ1n(t)

|∆δtni+ ∆Ktni| − |∆δtni+ ∆Lnti| Sti, (5.42)

Rn3(t) :=

Z t 0

(Lnu−Kun)dSu. (5.43)

5.2. Step2: The mean square residue tends to 0 with rate n12+2p.

The most technical part of this paper is the following. The deviation of the approximating portfolio from the payoff has been written in an integral form by virtue of the Ito formula. The “real world” portfolio may be interpreted as a discrete- time approximation of the theoretical portfolioC(t, Sb t)yielding the residual terms above. Consequently, the following analysis is mainly based on Taylor approxima- tions involving the successive derivatives of Cb and so heavily utilizes estimates of the appendix. Standard tools from stochastic calculus are also frequently used.

Theorem 5.1. The following convergence holds:

n12+2pE(εnt)2−−−−→

n→∞ 0.

(5.44)

To prove this theorem, we show the suitable convergence to 0 concerning the Rj, 0≤j≤3.

Lemma 5.2.

n12+2pE (Rn0)2−−−−→n

→∞ 0.

(5.45)

(13)

Proof. We have E Etti−1i

= 4Φ

σ√

∆ti

2

−2 = σ r2

π

p∆ti+ (∆ti)o(1),

σ r2

πn12p

f(ti1)∆ti = σ r2

π

p∆tiεi

whereεi=n12

∆ti

pf(ti1)verifies

i−1| ≤ c∆ti

1−ti

by virtue of Lemma 6.12. Hence, there is a constantC >0 such that:

sup

t |R0n(t)| ≤ Ck0 nX1

i=1

γti−1St2i−1(∆ti)32 1−ti

.

From Corollary 6.5 and Inequalities (4.28–4.32), we deduce the following n14+p

s E

sup

t |Rn0(t)| 2

≤ Cn18+p

nX1 i=1

(∆ti)32 (1−ti)5/4 (5.46)

≤ Cn18+p

n14 logn−−−−→n

→∞ 0.

(5.47)

A Taylor formula suggests to write the following splitting:

Rn1 = σ(Rn10−Rn11−Rn12−Rn13+ 2Rn14), (5.48)

where

Rn10(t) := X

in

γti−1St2i−1 Z tit

ti−1tEtui−1

Su

Sti−1

dWu

Rn11(t) :=

nX1 i=1

Z tit ti−1t

Cbxt(ti1, Sti−1)(u−ti1)SudWu,

Rn12(t) := 1 2

n1

X

i=1

St3i−1 Z tit

ti−1t

Cbxxx(eti1,Seti−1) Etui−1

2 Su

Sti−1dWu, Rn13(t) := 1

2

n1

X

i=1

Sti−1

Z tit ti−1t

Cbxtt(eti1,Seti−1)(u−ti1)2 Su

Sti−1dWu, Rn14(t) := −1

2

nX1 i=1

S2ti−1 Z tit

ti−1t

Cbxxt(eti1,Seti−1)Etui−1(u−ti1) Su

Sti−1dWu. Lemma 5.3.

n32+2pE sup

t[0,1]

Rn10(t)

!2

−−−−→

n→∞ 0.

(5.49)

Proof. The Doob inequality yields n32+2pE sup

t (Rn10(t))2≤4n32+2pE(Rn10(1))2

(14)

where the r.h.s tends to 0 as shown below. Indeed, by the independence of the increments of the Wiener process, we write:

E (Rn10(1))22 Xn i=1

Λti−1

Z ti

ti−1

E Etui−1

2 Su2 St2i−1du where

Λt:=ECbxx2 (t, St)St4. (5.50)

It is easy to check the following asymptotic

E Etui−1

2 Su2

St2i−1 = σ2(u−ti1) + (u−ti1)O(n1).

Therefore

E(R10n(1))24 2

X

in

Λti−1(∆ti)2(1 +O(n1)) where∆ti=gi)/n withθi∈[(i−1)/n, i/n].We then deduce

n32+2pE(Rn10(1))2= σ4(1 +O(n1)) 2

X

in

Λti−1(∆tin)∆tin12+2p xi1−xi

(xi1−xi)

wherexi2ti. So, we have:

n32+2pE(Rn10(1))2= σ4(1 +O(n1)) 2

Z ρ20 0

fn(x)dx where

fn(x) = Xn i=1

Λti−1(∆tin)∆tin12+2p xi1−xi

1(xi,xi−1](x).

Let us remark the abuse of notations ρ20 = ρ20,n and ti = t(n, xi) as previously mentioned.

First, let us show thatfn satisfies the dominated convergence bound condition.

Ifx∈(xi, xi1]then from Corollary 6.5, we have 0≤Λti−1 ≤ C

√xi1exi−1/4≤ C

√xex/4. Thus, from (4.33) we obtain

fn(x)≤ C

√xex/4(1 +x).

(5.51)

Regarding the pointwise convergence offn, for a givenx∈(xi, xi1], there exists u∈[ti1, ti)such that x=ρ2u ≥cn12(1−u). It follows that not onlyu→1 but also ti, ti1 → 1. Recall that ∆ti = gi)n1 where θi ∈ [(i−1)/n, i/n]. Thus g(θi)→1andθi→1sincef is continuous. Therefore∆tin→g(1) = 0. Moreover, note that

Λti−1 = 1 xi1

Z

−∞

eti−1zσ2ti−1Υi(z)ϕ(z)dz

(15)

where

Υi(z) = Z

−∞

h

eσti−1zσ

2ti−1

2 +xi−1y+xi−21

yϕ(y)dy 2

. Applying the Lebesgue theorem, we deduce that Λti−1 converges to

Λ(x) := 1 x

Z

−∞

e2σzσ2 Z

−∞

h eσzσ

2

2 +xy+x2

yϕ(y)dy 2

ϕ(z)dz.

Finally, together with (4.34),fn−−−−→

n→∞ 0a.e. We then apply the Lebesgue theorem to conclude the following limit

σ4(1 +O(n1)) 2

Z ρ20 0

fn(x)dx−−−−→n

→∞ 0.

Lemma 5.4. n12+2pE(suptRn11(t))2−−−−→

n→∞ 0.

Proof. Using the Doob inequality, we obtain thatE(suptRn11(t))2≤4E(Rn11(1))2. By independence of the increments of the Wiener process, we deduce that

n12+2pE(R11n(1))2=n12+2p

n1

X

i=1

ECbxt2(ti1, Sti−1)St2i−1 Z ti

ti−1

(u−ti1)2E Su

Sti−1

2

du.

It follows that

n12+2pE (Rn11(1))2≤cn12+2p

n1

X

i=1

ECbxt2(ti1, Sti−1)St2i−1(∆ti)3≤cn14+2plogn, since Corollary 6.14 gives

ECbxt2(ti1, Sti−1)St2i−1 ≤cn14f(ti1) (1−ti1)32

wherenf(ti1)∆ti is bounded. We then conclude.

Lemma 5.5. n12+2pE(suptRn12(t))2−−−−→n

→∞ 0.

Proof. As previously, we have the Doob inequalityE(suptRn12(t))2≤4E(Rn12(1))2 and the equality

4E (Rn12(1))2=

nX1 i=1

Z ti

ti−1

E Cbxxx2 (eti1,Seti−1)St6i−1

1− St

Sti−1

4

St2 St2i−1

! dt.

From (6.125), there exists a constantC such that:

E Cbxxx4 (eti1,Seti−1) ≤ C ρ8ti. (5.52)

Using the Cauchy-Schwarz inequality and (4.23) withm= 8, we deduce that n12+2pE(Rn12(1))2 ≤ Cn12+2p

nX1 i=1

(∆ti)3 n(1−ti)2

≤ Cn2plogn n32

(16)

which proves the desired convergence to0.

Lemma 5.6. n12+2pE(suptRn13(t))2−−−−→

n→∞ 0.

Proof. We still consider the Doob inequalityE(suptRn13(t))2≤4E (Rn13(1))2 and 4E(Rn13(1))2

n1

X

i=1

Z ti

ti−1

E

Cbxtt2 (eti1,Seti−1)(t−ti1)4St2 dt.

Moreover, using Lemma 6.19 and the Cauchy-Schwarz inequality, we deduce that E

Cbxtt2 (eti1,Seti−1)St2

≤ c (1−ti)4. Then, we obtain

n12+2pE(Rn13(1))2≤Cn12+2p

n1

X

i=1

(∆ti)5

(1−ti)4 ≤C n12+2plogn.

The conclusion follows.

Lemma 5.7. n12+2pE(suptRn14(t))2−−−−→

n→∞ 0.

Proof. We use the Doob inequalityE(suptRn14(t))2≤4E(Rn14(1))2and the equal- ity

4E(Rn14(1))2=

nX1 i=1

Z ti

ti−1

E St4i−1Cbxxt2 (eti1,Seti−1)

1− St

Sti−1

2

(t−ti1)2 St2 S2ti−1

! dt.

From (6.126), we deduce that E S4ti−1Cbxxt2 (eti1,Seti−1)

1− St

Sti−1

2

S2t St2i−1

!

≤ct−ti1

(1−ti)3. Then,

n12+2pE (Rn14(1))2≤cn12+2p

n1

X

i=1

(ti−ti1)4

(1−ti)3 ≤c n12+2plogn.

Thus, we can conclude.

Let us now study the residual term Rn2. Again, a Taylor formula suggests to write the following splitting:

Rn2 =Rn20+· · ·+Rn24, (5.53)

Références

Documents relatifs

Adoptant une position résolument antiréaliste (les entités mathématiques n’ont pas une existence indépendante de l’esprit humaine), Changeux cherche à comprendre la façon dont

♦ La réforme des études de santé, qui se traduit par l’intégration dans le LMD des quatre filières médicales (médecine, odontologie, pharmacie, sages-femmes) et par

Et parfois, elle en prenait une qu'elle essayait de coincer dans ses cheveux comme elle le faisait quand elle était plus

The resources can either be considered as devoted to the setting up of an informal institution, either be considered as accumulating social and human capital – by insuring information

We extend the general local risk minimisation approach introduced in [1] to account for liquidity costs, and derive the corresponding optimal strategies in both the discrete-

Hedging theorems are results claiming that a contingent claim ξ (in physical units) can be super-replicated starting from an initial endowment x by a self-financing portfolio if

We study the problem of option replication in general stochastic volatility markets with transaction costs using a new form for enlarged volatility in Leland’s algorithm [23]..

A close genetic relatedness between serotype d isolates and some strains of serotypes a and b was identified, There are strong patterns of geographic variation, on an intercon-