Extracting information from the signature of a financial data stream
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Daniel Levin & Terry Lyons & Hao Ni, 2013. "Learning from the past, predicting the statistics for the future, learning an evolving system," Papers 1309.0260, arXiv.org, revised Mar 2016.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Takanori Adachi & Yusuke Naritomi, 2021. "Discrete signature and its application to finance," Papers 2112.09342, arXiv.org, revised Jan 2022.
- Fermanian, Adeline, 2021. "Embedding and learning with signatures," Computational Statistics & Data Analysis, Elsevier, vol. 157(C).
- Hans Buhler & Blanka Horvath & Terry Lyons & Imanol Perez Arribas & Ben Wood, 2020. "A Data-driven Market Simulator for Small Data Environments," Papers 2006.14498, arXiv.org.
- Stefanos Bennett & Mihai Cucuringu & Gesine Reinert, 2022. "Lead-lag detection and network clustering for multivariate time series with an application to the US equity market," Papers 2201.08283, arXiv.org.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Hans Buhler & Blanka Horvath & Terry Lyons & Imanol Perez Arribas & Ben Wood, 2020. "A Data-driven Market Simulator for Small Data Environments," Papers 2006.14498, arXiv.org.
- Guy P. Nason & Ben Powell & Duncan Elliott & Paul A. Smith, 2017. "Should we sample a time series more frequently?: decision support via multirate spectrum estimation," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 180(2), pages 353-407, February.
- Stefanos Bennett & Mihai Cucuringu & Gesine Reinert, 2022. "Lead-lag detection and network clustering for multivariate time series with an application to the US equity market," Papers 2201.08283, arXiv.org.
- Erdinc Akyildirim & Matteo Gambara & Josef Teichmann & Syang Zhou, 2022. "Applications of Signature Methods to Market Anomaly Detection," Papers 2201.02441, arXiv.org, revised Feb 2022.
More about this item
NEP fields
This paper has been announced in the following NEP Reports:- NEP-ICT-2013-08-05 (Information and Communication Technologies)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:arx:papers:1307.7244. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: arXiv administrators (email available below). General contact details of provider: http://arxiv.org/ .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.