CQF - Information Sessions & Free Sample Lectures
Subscribe to Wilmott
Follow us on Twitter
join wilmott
audio visual
file share
jobs board
about us
Multivariate Smiling: Wilmott Magazine Article
Peter Leoni & Wim Schoutens 453 Views

The paper presents an application of the Variance-Gamma distribution to price multivariate derivatives. The paper focuses on the practical implementation of the model in a multivariate setting. Several calibration procedures are discussed and applied to examples. In particular, we focus on the pricing differences for several exotic structures between the MultiVariate Variance-Gamma Model and the MultiVariate Black-Scholes Flat Volatility Model.
xVA - Coping with the Tsunami of Compute Load
Jorg Lotze and Hicham Lahlou


This article gives an overview of the different xVA adjustments, such as CVA, DVA, and FVA, shows how they are typically computed, and outlines where the computational complexities lie. We give recommendations on how to achieve high performance, portability, and scalability for centralised in-house xVA implementations. We show how, by careful software design, we can easily harness, not only the power of multi-core CPUs, but also accelerator co-processors such as graphic processing units (GPUs) and the Intel Xeon Phi.

When God Changes His Dice: Wilmott Magazine Article
Kent Osband 4508 Views

For all his genius, Einstein never accepted the uncertainty inherent in quantum theory."  I just cannot believe that God would choose to play dice with the universe," he said. This statement endeared Einstein to modern physicists more than anything else he ever said, because it gave even the lowliest grad student an opportunity to feel brighter and less dogmatic than Einstein.

Cyber Threat & Operational Risk - 1 July 2014 | Central London - SAVE 15%
Cyber Threat & Operational Risk
1 July 2014 | Central London

*Visit the website for more information and to SAVE 15% on registration fees courtesy of Wilmott, quote VIP code FKM62837WML*

Enhancing cyber risk management frameworks:
  • Key characteristics & technical terminology
  • UK government's '10 steps to cyber security'
  • Monitoring key systems and networks
  • Network security and penetration testing

    Effectively monitoring the cyber threat environment:
  • Horizon scanning & internal defence monitoring
  • Learning from external events
  • IT and cyber risk indicators triggers and limits
  • Integrating IT and operational risk indicators

    Benefiting from value adding IT governance:
  • Incorporating IT within the Op Risk framework
  • Bringing business and IT managers together
  • Building the Information Security Policy
  • Third party management

    *Visit the website for more information and to SAVE 15% on registration fees quote VIP code FKM62837WML*

  • Oanda
    Latest Tweets
    New & Improved Wilmott Jobs Board
    Now Playing
    Finance Focus: Bill Ziemba
    Finance Focus: Brian Sentance, Xenomorph Software
    Latest Blogs
    You Naughty Spies
    29 01 14: 12:10 PM
    Quiz 7 - The problem with "drift" (The 1st who gets it wins a copy of The Black Swan )
    13 03 07:12:48 PM
    03 05 14:2:32 AM
    Emanuel Derman
    RSS Feed to Reuters Blog
    01 07 11: 4:02 PM
    Satyajit Das
    The Truth of the Matter
    04 11 13: 4:57 AM
    deMorgans Law
    22 07 09: 3:04 PM
    Pablo Triana
    Models On Models
    21 05 11: 4:49 PM
    Jan Dash
    New paper "Market Crises, Earthquakes, and the Reggeon Field Theory"
    11 06 13: 2:36 AM
    Dan Goldstein
    Taxi Drivers Get Bigger Tips When Paid By Credit Card
    10 03 10: 10:28 PM
    Iris Mack
    Senior Energy Analyst Job
    21 08 14: 4:58 PM
    Summer time
    27 06 14: 9:55 AM