Asymptotics of the Probability Minimizing a Down-side Risk

Embed Size (px)

Citation preview

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    1/40

    arXiv:1001

    .2131v1

    [math.PR]13Jan2010

    The Annals of Applied Probability

    2010, Vol. 20, No. 1, 5289DOI: 10.1214/09-AAP618

    c Institute of Mathematical Statistics, 2010

    ASYMPTOTICS OF THE PROBABILITY MINIMIZING

    A DOWN-SIDE RISK

    By Hiroaki Hata, Hideo Nagai1 and Shuenn-Jyi Sheu2

    Academia Sinica, Osaka University and Academia Sinica

    We consider a long-term optimal investment problem where aninvestor tries to minimize the probability of falling below a targetgrowth rate. From a mathematical viewpoint, this is a large devi-ation control problem. This problem will be shown to relate to arisk-sensitive stochastic control problem for a sufficiently large time

    horizon. Indeed, in our theorem we state a duality in the relationbetween the above two problems. Furthermore, under a multidimen-sional linear Gaussian model we obtain explicit solutions for the pri-mal problem.

    1. Introduction. In recent studies of finance, it has been of great concernto consider problems from risk management. In this paper, we consider theproblem of the control of a down-side risk probability for an investor. Tominimize such probabilities and obtain an optimal (or nearly optimal) port-folio, we relate the problem of the portfolio optimization with risk sensitivecriterion. In [35, 36], from the consideration of a performance index for fundswhen compared to a benchmark, a similar problem is considered. In [30, 31],problems of maximizing the up-side chance probability are studied. Thesestudies show potential applications of risk-sensitive dynamic managementto the problem of risk management.

    Portfolio optimization with risk-sensitive criterion has been considered inseveral recent works (see [24, 7, 10, 1416, 18, 19, 21, 25, 28] and [29]).The problem is to maximize the expected utility of terminal wealth with theHARA utility function being considered,

    max

    E

    1

    (XT)

    ,(1.1)

    Received August 2007; revised September 2008.1Supported in part by Grant-in-Aid for scientific research 20340019 JSPS.2

    Supported by NSC Grant 96-2119-M-001-002.AMS 2000 subject classifications. 35J60, 49L20, 60F10, 91B28, 93E20.Key words and phrases. Large deviation, long-term investment, risk-sensitive stochas-

    tic control, Bellman equation.

    This is an electronic reprint of the original article published by theInstitute of Mathematical Statistics in The Annals of Applied Probability,2010, Vol. 20, No. 1, 5289. This reprint differs from the original in paginationand typographic detail.

    1

    http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://arxiv.org/abs/1001.2131v1http://www.imstat.org/aap/http://dx.doi.org/10.1214/09-AAP618http://www.imstat.org/http://www.imstat.org/http://www.ams.org/msc/http://www.imstat.org/http://www.imstat.org/aap/http://www.imstat.org/aap/http://dx.doi.org/10.1214/09-AAP618http://dx.doi.org/10.1214/09-AAP618http://dx.doi.org/10.1214/09-AAP618http://www.imstat.org/aap/http://www.imstat.org/http://www.ams.org/msc/http://www.imstat.org/http://dx.doi.org/10.1214/09-AAP618http://www.imstat.org/aap/http://arxiv.org/abs/1001.2131v1
  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    2/40

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    3/40

    DOWN-SIDE RISK MINIMIZATION 3

    for large T where the maximization is taken for in a class of admissiblestrategies. Or more generally,

    max

    P

    1

    Tlog

    XTIT

    c

    ,(1.6)

    where IT is a benchmark process. For simplicity, we take It = 1 in the fol-lowing discussion. A mathematical theory was developed in [30] and [31] forthe maximization of the up-side chance probabilities. It is shown that theprobabilities in (1.5) are related to those in (1.1) with 0 < < 1 through aduality relation. A nearly optimal portfolio for (1.5) can be obtained from anoptimal portfolio for (1.1) for a particular chosen . Some idea from large de-viation theory is implicitly used in his approach. This will be described laterin this section. Interestingly, the maximization of the probability of up-sidechance is not a conventional optimization problem and, in general, is difficultto treat. Therefore, studies in [30, 31] suggest the possibility of indirectly us-ing the theory of stochastic control in such a nonconventional optimizationproblem. See also [19] for more studies on this problem. However, Sekine[33] recently tried to use a duality approach to treat such problems. In [ 30],Pham also proposed to develop a mathematical theory for the down-siderisk probability,

    min

    P

    1

    Tlog XT k

    ,(1.7)

    or more generally,

    min

    P

    1

    Tlog

    XTIT

    k

    .(1.8)

    The problem is to minimize (1.6) and obtain an optimal (or nearly optimal)portfolio. Here k is considered such that the event has small probabilities.Hence we are dealing with a rare event. From the consideration of finance,such rare events in down-side risk are not favorable to an investor. Thereforeits occurrence may result in a significant consequence in portfolio manage-ment. Hence the study of (1.7) or (1.8) may be of meaningful implicationsin finance. See interesting discussions in [5, 6] and [35, 36] for some relatedproblems where the consideration is the performance index for funds. In this

    paper, we develop some mathematical analyses for (1.7). Similar to [30, 31],we will show a dual relation between (1.1) and (1.7) for large T. The resultsays that for k, there is a correspondence (k) < 0 such that an optimalportfolio of (1.1) with = (k) is a nearly optimal portfolio of (1.7). Themeaning of this result is that an investor who wants to control (1.7) for aparticular k will have the same behavior as an investor whose risk parameteris (k). See a similar result in [36] for some discrete time models.

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    4/40

    4 H. HATA, H. NAGAI AND S.-J. SHEU

    In this paper we consider only the linear Gaussian models. But our methodmay be applied to more general (nonlinear) models. Gaussian models havepractical uses for practitioners. A simple Gaussian factor model was firstproposed in [26]. Such models have several important properties. It is mucheasier to estimate the coefficients by using linear regression (see [32]). Thishas practical applications. Tractibility is another big advantage of thesemodels. For such models, a closed-form solution for the optimal portfolioselection problem (1.1) is possible by solving a Ricatti equation, which isa matrix equation and is easier to solve [[2, 3], [1416, 25]]. For Gaussianmodels, we have some finer mathematical results [25]. In the later sections,we will see that these results will be crucial for our analysis. It is important

    to consider the model when some factors cannot be observed directly. Thesolution is far away from complete. One can find some results for linearGaussian models in [18, 29, 34]. However, this is not our main concern inthis paper.

    The papers [30, 31] (and also this paper) consider (1.5) [and (1.7), respec-tively] for such c (and k) that (1.5) [and (1.7)] has small probability. Thatis, we are dealing with large deviation probabilities. Therefore, we expectthat some idea from large deviation theory can be used to relate (1.1) and(1.5) [or (1.7)] that we now explain. The formal calculation given in thefollowing may be instructive to see the idea. For a given strategy , assumeZT= log X

    T satisfies a large deviation principle with rate I(k, ). Formally,

    this means

    P log XT

    T k exp(I(k, )T)

    as T. The LaplaceVaradhan lemma (see [8]) implies

    E[(XT)] = E[exp(log XT)] exp(T(, )),

    where

    (, ) = supk{k + I(k, )}.

    If we want to minimize (, ) [and minimize I(k, )] over , then

    inf

    (, ) = inf

    supk{k + I(k, )}.(1.9)

    Denote

    J(k) = inf{I(k, )},

    () = inf{(, )}.

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    5/40

    DOWN-SIDE RISK MINIMIZATION 5

    If we are allowed to change the order of inf and sup on the right-hand sideof (1.9), then we obtain

    () = supk{k + J(k)}.(1.10)

    If J(k) is a concave function, then we expect to have the dual relation

    J(k) = inf{() k}(1.11)

    (see [9]). On the other hand, if we want to maximize (, ) [and maximizeI(k, )] over possible , then

    sup (, ) = sup supk {k + I(k, )}.(1.12)

    Denote

    I(k) = sup{I(k, )},

    () = sup{(, )}.

    Then

    () = supk{k + I(k)}.

    If I(k) is concave function, then we expect to have the dual relation,I(k) = inf

    {() k}.

    In [30, 31], through the above intuition, the following relation was proved:

    (c) = inf0

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    6/40

    6 H. HATA, H. NAGAI AND S.-J. SHEU

    The problem analyzed here is closely related to the problem studied in[30, 31], since

    P

    1

    Tlog XT k

    = 1P

    1

    Tlog XT> k

    .

    However, in both studies we are interested in the region of c and k suchthat probabilities in (1.5) and (1.7) are small. This means in this paper westudy the region of c such that (1.5) has large probability while in [30, 31],it is studied in the region of c that (1.5) has small probability. This explainswhy the results of [30, 31] cannot be readily applied to the calculation of thedown-side risk probabilities. We consider both of the problems for large T.

    We show in this paper that the minimization of (1.7) relates to the problem(1.1) for < 0. However, the probability in (1.5) relates to problem (1.1)for 0 < < 1 as was shown in [30]. We will show that an optimal (or nearlyoptimal) portfolio for (1.7) can be derived from an optimal portfolio of (1.1)for a proper chosen < 0 that relates to k through the duality relation.This is expected, after [30, 31]. However, our result does not follow from asimple Markov inequality as in [30, 31]. We need to use some finer resultsfor (1.1), taken from [25] and some extensions given in Section 2 later. Thisis unexpected from the argument in [30, 31] and is also unexpected from thelarge deviation theory. Intuitively, when changing the order of inf and supin (1.9) to obtain (1.10), it may cause some difficulty. Mathematically, wealso want to mention another important point. The convexity of the value

    of (1.1b) with respect to after taking limit for large T will be crucial inour analysis. We note that the convexity of (1.1b) does not follow for finiteT. This property is easily seen for (1.1a) from our formal derivation givenin the previous paragraph, since taking the maximum of a family of convexfunctions is a convex function.

    The paper is organized as follows. In Section 2, the model will be explicitlystated and the mathematical problem of down-side risk will be formulated.The associated problems of portfolio optimization will also be described.Since the problem has different formulations in an infinite time horizon,we will careful state our problem. We also give some remarks to mentionother related problems. The main results will be stated in this section. Theseinclude the main theorem (Theorem 2.1), and several important propositions

    (Propositions 2.12.7). The results are presented in a way that a proof ofTheorem 2.1 will follow using mainly results in the propositions and someminor properties. The proof of our main theorem also suggests that our mainresult will follow when we can prove the statements given in several crucialpropositions. Therefore, the approach in this paper can be applied to moregeneral models (including some nonlinear models). The problem for somenonlinear models is currently under investigation.

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    7/40

    DOWN-SIDE RISK MINIMIZATION 7

    In Section 3, we give the proof of our main theorem. In Section 4, weprove the propositions stated in Section 2. These propositions concern theportfolio optimization problem (1.1) and the behaviors of the solution of theBellman equation. Some results in these propositions have been obtained in[25]. They include Propositions 2.1, 2.2 and 2.3. Therefore, in the proof ofthese results, we give a sketch or modification of the arguments in [25] andmention the places in [25] where one can find the details of analysis used.Propositions 2.4, 2.5, 2.6 and 2.7 are some new results that are suggestedby the problem studied in this paper. Therefore, some more details of theproofs will be given for these propositions.

    2. The problem and main results.

    2.1. Down-side risk problem. We consider a market model consisting ofone bank account and m risky stocks. The interest rate of bank account aswell as the returns and volatility of stocks are affected by n economic factors.The price of bank account S0 and the price of risky stocks Si, i = 1, . . . , m ,are given by

    dS0t = r(Yt)S0t dt, S

    00 = s

    0,(2.1)

    dSit = Sit

    i(Yt) dt +

    n+mk=1

    ik(Yt) dWkt

    , Si(0) = si, i = 1, . . . , m ,(2.2)

    where Wt = (Wkt )k=1,...,(n+m) is an (n + m)-dimensional standard Brown-ian motion process defined on a filtered probability space (,F, P,Ft). Thefactor process Yt with n components is described by

    dYt = (Yt) dt + (Yt) dWt, Y(0) = y Rn.(2.3)

    In this paper we assume that r(y), (y), (y), (y) and (y) are given by

    r(y) := r,

    (y) := a + Ay, (y) := ,(2.4)

    (y) := b + By and (y) :=

    with constants r 0, a Rm

    and b Rn

    . Moreover, A,B, , are m n,n n, m (n + m), n (n + m) constant matrices, respectively. In thispaper, we assume the following conditions (A):

    > 0,(A1)

    G := B ()1A is stable.(A2)

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    8/40

    8 H. HATA, H. NAGAI AND S.-J. SHEU

    Remark 2.1. The matrix G is stable if the real parts of its eigenvaluesare negative.

    Consider an investor who invests at time t a proportion it of his wealthin the ith risky stock Si, i = 1, . . . , m. With t = (

    1t , . . . ,

    mt )

    chosen, theproportion of wealth invested in the bank account is 1 t 1 where ()

    denotes the transpose of a vector or a matrix. Here 1= (1, . . . , 1). We allowshort selling (it < 0 for some i) or borrowing (1

    t 1< 0).

    We assume the self-financing condition. Then the investors wealth, Xt ,starting with the initial capital x satisfies the equation

    dXt

    Xt= (1

    t1)

    dS0t

    S0t+

    m

    i=1 it dSit

    Sit,

    X0 = x.(2.5)

    This equation can be solved and we have

    XT= x exp

    T0

    r + (a + AYt r1)

    t

    (2.6)

    1

    2t

    t

    dt +

    T0

    t dWt

    .

    For a finite T and given target growth rate k, we shall consider the proba-bility of minimizing the down-side risk,

    infAT

    P log XTT

    k,(2.7)where AT is the set of all admissible investment strategies which will beprescribed in Section 2 [see (2.31)]. Here, the investor is interested in mini-mizing the probability that his wealth falls below a target growth rate. Wewill be mainly concerned with the large T asymptotics. That is,

    (k) := limT

    1

    TinfAT

    log P

    log XT

    T k

    .(2.8)

    We shall calculate (k). Connecting to this, we will obtain a (nearly) optimalstrategy for (2.7) for large T.

    2.2. Portfolio optimization problem. Since it is difficult to directly calcu-late (2.7) and (2.8), in order to solve our problem we need to introduce thefollowing portfolio optimization problem of maximizing the expected utility.For < 0, we consider

    supAT

    E

    1

    (XT)

    .

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    9/40

    DOWN-SIDE RISK MINIMIZATION 9

    This is the same as

    infAT

    E((XT)).(2.9)

    The large T asymptotics are given by

    () := limT

    1

    TinfAT

    log E(XT), < 0.(2.10)

    For (2.9), we define

    J(x,y,; T) := xE(XT),(2.11)

    where X0 = x, Y0 = y, and is taken from the set AT. AT will be defined

    in (2.31). We then define

    v(t, y) = inf ATt

    log J(x,y,; T t), < 0.(2.12)

    Using (2.6), we have

    J(x,y,; T) = E

    exp

    T0

    (Yt, t) dt

    T

    ,

    where (y, p) is defined by

    (y, p) := r + ((y) r1)p1

    2pp(2.13)

    and

    T= exp

    T0

    t dWt1

    2

    T0

    2|t|2 dt

    .(2.14)

    If we assume

    E(T) = 1,(2.15)

    then by Girsanov theorem, we have

    J(x,y,; T) = E

    exp

    T0

    (Yt, t) dt

    ,(2.16)

    where E

    () is the expectation with respect to the probability measure P

    defined by

    dP

    dP

    FT

    = T.(2.17)

    We can rewrite the equation for Yt as

    dYt = (Yt, t) dt + dW(t),(2.18)

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    10/40

    10 H. HATA, H. NAGAI AND S.-J. SHEU

    where

    (y, ) = (y) + (2.19)

    and

    Wt = Wt

    t0

    s ds.(2.20)

    Wt is a (n + m)-dimensional Brownian motion under P . (2.9) becomes a

    stochastic control problem with criterion log J(x,y,; T) [given in (2.16)],(2.18) is the state dynamic and t is the control process. Here we note thatJ(x,y,; T) is not dependent on x. Therefore the value function is given byv(0, y) [and v(t, y) for the problem in (2.12)]. Then, by Bellmans dynamic

    programming principle, v should satisfy the following Bellman equation:v

    t+ infR

    1

    2tr(D2v) + ( + )Dv

    +1

    2(Dv)Dv + (, )

    = 0,

    v(T, y) = 0,

    or, equivalently,

    v

    t+

    1

    2tr(D2v) +

    +

    1 ()1( r1)

    Dv

    +

    1

    2 (Dv)

    I+ 1 ()1Dv+

    2(1 )( r1)()1( r1) + r = 0,

    v(T, y) = 0

    (2.21)

    (see Section VI.8 [17]). Actually, given a solution v(t, y) of (2.21), under somesuitable conditions, t defined below gives an optimal strategy of (2.9):t :=(t, Yt),(2.22)

    (t, y) :=

    1

    1 ()(y)1((y) r1+ Dv(t, y))

    (see [17, 28]). Moreover, in relation to (2.10) we shall consider the ergodictype Bellman equation which is the limiting equation of the above Bellmanequation,

    = infR

    1

    2tr(D2) + ( + )D

    +1

    2(D)D + (, )

    ,

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    11/40

    DOWN-SIDE RISK MINIMIZATION 11

    or, equivalently,

    =1

    2tr(D2) +

    +

    1 ()1( r1)

    D

    +1

    2(D)

    I+

    1 ()1

    D(2.23)

    +

    2(1 )( r1)()1( r1) + r.

    Remark 2.2. The portfolio optimization problem in an infinite time

    horizon is closely connected with (2.10). On an infinite time horizon thecriterion to be minimized is

    limT

    1

    Tlog E(XT)

    ,

    A, A is a class of admissible strategies. The problem is to calculate thevalue

    infA

    limT

    1

    Tlog E(XT)

    (2.24)

    and obtain an optimal strategy. The Bellman equation for (2.24) is also givenby (2.23). Connecting with (2.24), we may consider the minimization of the

    down-side risk probabilities in an infinite time horizon,

    infA

    limT

    1

    Tlog P

    log XT

    T k

    .(2.25)

    There are some more mathematical difficulties that arise from the problemsin an infinite time horizon. Some further discussion for this problem will begiven after we state our main theorem (Theorem 2.1).

    2.3. Main results. The main idea of a stochastic control method for (2.9)or (2.10) is to solve the equations (2.21) or (2.23). From this, we can obtainthe value in (2.9) or (2.10). We may also obtain an optimal strategy for (2.9)from the solution of (2.21). We state in this subsection the relevant results.

    Theorem 2.1 is our main result which also shows the connection between theproblems (2.8) and (2.9) [or (2.10)]. Some propositions are given that willbe used to prove Theorem 2.1.

    Proposition 2.1 [25]. Assume (A1) and < 0. Then (2.21) has a so-lution given by

    v(t, y) = 12yP(t)y + q(t)y + h(t),(2.26)

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    12/40

    12 H. HATA, H. NAGAI AND S.-J. SHEU

    where P(t) satisfies the Riccati differential equation:P(t) + P(t)N1P(t) + K1P(t) + P(t)K1 C

    C= 0,P(T) = 0,

    (2.27)

    where

    N1 :=

    I+

    1 ()1

    > 0,

    K1 := B +

    1 ()1A,(2.28)

    C :=

    1 ()1A,

    and q(t), h(t) satisfy the equationsq(t) + (K1 + N

    1P(t))q(t) + P(t)b

    +

    1 (A + P(t))()1(a r1) = 0,

    q(T) = 0,

    (2.29)

    h(t) +1

    2tr(P(t)) +

    1

    2q(t)q(t) + bq(t) + r

    +

    2(1 )(a r1+ q(t))()1

    (a r1+ q(t)) = 0,

    h(T) = 0.

    (2.30)

    The proof can be found in [25]. We will give some remarks in Section 4.1.We now define the class of admissible investment strategies, AT,

    AT :=

    (t)t[0,T];

    (2.31)

    E

    E

    [(P(s)Ys + q(s))

    + s] dWs

    T

    = 1

    .

    This class of admissible strategies is also used in [25]. Here we use the no-tation, E(Z) := (E(Z)t)t[0,T], for the stochastic exponential of a continuous

    semimartingale Z:E(Z)t := eZt1/2Zt . Therefore, T in (2.14) is equal toE(

    dW)T.

    Proposition 2.2 [25]. Assume (A1) and < 0. Let P(t), q(t), h(t) bedefined as in Proposition 2.1. Then the following defines an admissible strat-egy: (t) :=(t, Yt),

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    13/40

    DOWN-SIDE RISK MINIMIZATION 13

    (2.32) (t, y) = 11

    ()1[a r1+ q(t) + {A + P(t)}y]

    and is optimal for the problem (2.9). Moreover,

    v(0, y) = 12yP(0)y + q(0)y + h(0).

    The proofs of Proposition 2.2 can be found in [25]. Some remarks will alsobe given in Section 4.1.

    In the following, notation v(t, y; T), P(t; T), q(t; T), h(t; T) will be used forthe dependence of P(t), q(t), h(t) on T. Similarly, we use

    v(t, y; T; ), P(t; T; ), q(t; T; ), h(t; T; ),

    if we need to discuss the dependence of the functions on .We now consider (2.10). We consider a solution of (2.23) that is quadratic

    in y. That is,

    (y) := 12yP y + qy,(2.33)

    where P is a symmetric nn matrix, and q is a vector in Rn. P and q willsatisfy the equations:

    K1P + P K1 + PN1PCC= 0,(2.34)

    (K1 + N1P)q + P b(2.35)

    +

    1 (A + P)()1(a r1) = 0.

    We have the following results.

    Proposition 2.3 [25]. In addition to (A1), we assume (A2). Then the following properties hold:

    (i) P(t) = P(t; T) converges as T to a nonpositive definite matrixP, which is a solution of the algebraic Riccati equation (2.34). Moreover,

    K1 + N1P

    is stable, and P satisfies the estimate

    0

    esG

    A()1AesG ds P 0,(2.36)

    where G is given in (A2).

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    14/40

    14 H. HATA, H. NAGAI AND S.-J. SHEU

    (ii) q(t) = q(t; T) converges as T to a constant vector q which satis-fies (2.35). Moreover, h(t) = h(t; T) converges to a constant () definedby

    () =1

    2tr(P) +

    1

    2qq + bq + r

    (2.37)

    +

    2(1 )(a r1+ q)()1(a r1+ q).

    (iii) We obtain

    limT

    v(0; y)

    T= limT

    h(0; T)

    T= ().(2.38)

    The proof of Proposition 2.3 can be found in [25]. Some remarks will bealso given in Section 4.2.

    We use (y), P(), q() for the dependence of (y), P , q on .

    Proposition 2.4. Along with (A1) and (A2), we assume (A3);

    (B, ) is controllable.(A3)

    Then the pair (, ()) is the unique solution of (2.23) with = ()where (y) and () are given by (2.33) and (2.37), respectively.

    The proof of Proposition 2.4 will be given in Section 4.2.

    Remark 2.3. The pair (K, L), of the n n matrix K and the n lmatrix L, is said controllable if the nnl matrix (L,KL,K2L , . . . , K n1L)has rank n. We remark that the generator of Yt, Gf =

    12 tr(

    D2f)+ Df,is an hypoelliptic second-order operator if (A3) holds (see [20]).

    Remark 2.4. It is shown in [22] that there is () such that for any (), (2.23) has a solution (y). There are only finitely many particulars where the solution (y) is quadratic in y. Under certain conditions,(2.23), for = (), has a unique solution (y) satisfying (0) = 0. Theunique pair (), () may also be characterized by the growth conditionof (y) as |y| (see [27]).

    The differentiability of (y) [or (), P(), q()] will play an importantrole in the proof of our main theorem (Theorem 2.1). We have the followingresults.

    Proposition 2.5. Under assumptions (A1) and (A2), the following re-sults hold:

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    15/40

    DOWN-SIDE RISK MINIMIZATION 15

    (i) () and P(), q() are twice differentiable with respect to .(ii) () is convex with respect to .

    The proof of Proposition 2.5(i) [and (ii)] will be given in Section 4.3 (andSection 4.4).

    Similar to (2.32), we use () to define

    (y) =1

    1 ()1((y) r1+ D(y))

    (2.39)

    =1

    1 ()1[a r1+ q() + {A + P()}y].

    Now we also define(y) := (y) +

    (y) + D(y)

    = b + By +

    1 ()1(a + Ay r1)

    (2.40)+ N1(P()y + q())

    = (K1 + N1P())y + f,

    where

    f := b +

    1 ()1(a r1) + N1q.

    Define

    u = u(y) := {D(y) + (y)}

    =

    (P y + q)(2.41)

    +

    1 ()1((P y + q) + a + Ay r1)

    .

    We will show

    E

    E

    u dW

    t

    = 1, t > 0.(2.42)

    Then we define a new probability measure P bydPdP

    Ft

    := E

    u dW

    t

    .(2.43)

    Define Wt byWt = Wt t

    0u(Ys)

    ds.(2.44)

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    16/40

    16 H. HATA, H. NAGAI AND S.-J. SHEU

    Then Wt is a Brownian motion under the probability measure P, and Ysatisfies

    dYt = (Yt) dt + dWt.(2.45)Remark 2.5. We compare (y) in (2.40) and (, ) in (2.19),

    (y) = (y, (y))+ (P()y + q()).

    As shown in (2.16), (y, (y)) is used to change the measure to derive theuseful expression ofJ(x,y,; T). Because of the integral from 0 to T in (2.16)

    when t = (Yt), the expectation may grow exponentially and will causedifficulty in the analysis. The difference of (y) and (y, (y)) is made totake care of this. This gives another measure change, hence another term isadded to (y, (y)) which leads to (y). A similar idea is used in [23]. Inthe proof of our main theorem (Theorem 2.1), we will also see some uses ofP.

    Under P, Yt is a Gaussian process. The variance of Yt is given by U(t),U(t) =

    t0

    e(ts)(K1+N1P)e(ts)(K1+N

    1P) ds,

    and its mean m(t) is the solution of the following equation:

    m(t) = (K1 + N1P)m(t) + f.

    We show in the next proposition that K1 + N1P is stable under as-

    sumption (A2); then Yt is ergodic under P.Proposition 2.6. Under assumptions (A1) and (A2), K1 +

    N1Pis stable. There are c1() > 0, c2() > 0 and a positive definite n n matrixK such that

    yK(y)c1()|y|2 + c2(),(2.46)

    where (y) is given by (2.40).

    The proof is given in Section 4.5.

    Proposition 2.7. Under assumptions (A1) and (A2) we obtain

    lim

    () = r.(2.47)

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    17/40

    DOWN-SIDE RISK MINIMIZATION 17

    For the proof, see Section 4.6. This result gives the range of k in (2.8)that our main result holds (Theorem 2.1).

    We can now state our main theorem. Its proof, given in next section, isbased on the results in Propositions 2.12.7.

    Theorem 2.1. Assume (A1) and (A2). Then, for all r < k < (0),we have the following:

    (k) = inf

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    18/40

    18 H. HATA, H. NAGAI AND S.-J. SHEU

    Hence, to avoid confusion, we may use tT,k for [k]t . Therefore, for = (k),E((X

    T,k

    T )) = infAT

    E((XT)).

    tT,k is an optimal strategy for (2.9) [= (k)] but may not be an optimalstrategy for (2.7). This is the reason we say tT,k is nearly optimal for (2.7)when T is large, since the value using this strategy is close to the optimalvalue when T is large.

    On the other hand, we can use () in (2.39) to define

    (t) = (Yt).

    We may expect that this will also give a nearly optimal strategy. That is, ina sense,

    E((XT ))(2.52)

    is close to

    infAT

    E((XT)),

    ifT is large. There are two problems when one wants to prove this rigorously.For the first problem, it is not easy to show() is an element ofAT. For thesecond problem, it may happen that (2.52) becomes infinite for some finiteT. See [14] for a study of a model where there is one stock in the market.

    When this happens, the problem (2.24) may not have a solution. That is,there is no optimal strategy for (2.24). However, it is shown in [14] thatsome modification of () gives a nearly optimal strategy. Such behavioralso indicates that (2.25) may be more difficult to treat than (2.8). However,if we assume (A1)(A3) and the following condition,

    P()()1P() < A()1A,

    then it is proved in [25] (Theorem 2.3) that

    limT

    1

    Tlog E(X

    T ) = ().

    Using this and following the same argument as in Theorem 2.1, we can obtain

    the upper estimate for down-side risk probability. For the lower estimate,the same argument in Theorem 2.1 can be applied. In conclusion, we havethe following result; its proof is omitted.

    Theorem 2.2. Assume (A1)(A3). Let r < k < (0) and (k) < 0 bethe unique number satisfying ((k)) = k. Assume

    P((k))()1P((k)) < A()1A.

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    19/40

    DOWN-SIDE RISK MINIMIZATION 19

    Define k(t) := (k)(Yt).Then k() AT for any T and k on a sufficiently large time horizon T isa nearly optimal strategy for the problem (2.7). Namely,

    (k) = limT

    1

    Tlog P

    log XkT

    T k

    .

    In (2.25) we define A to be a family consisting of processes t such that|[0,T], the restriction of t to [0, T], is inAT for all T. Then

    k() A and

    is an optimal strategy for (2.25).

    3. Proof of Theorem 2.1. In this section,we shall give a proof of our maintheorem using results in Propositions 2.12.7. The proof of the propositionswill be given in Section 4.

    From Proposition 2.5(ii), is convex. Let us consider(k) := inf r.

    Since is smooth, we see that (k) is strictly concave, nondecreasing andsatisfies

    (k) =

    0, if k (0),((k)) (k)((k)), if r < k < (0),

    where (d) < 0 is such that

    ((d)) = d (r,

    (0)). In Section 4.4, we willshow () > 0 for < 0. Therefore, (d) is uniquely defined. Moreover, is continuous on (r,(0)).

    We now take a small > 0. Then k > r. Suppose < 0 attains thefollowing: (k ) := inf

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    20/40

    20 H. HATA, H. NAGAI AND S.-J. SHEU

    or, equivalently,

    () = 12 tr(D2(y)) + (y)

    D(y) + V0,(3.2)

    where (y) is defined in (2.40) and

    V0 = V0(y)

    := 1

    2D(y)N1D(y)(3.3)

    +

    2(1 )(a + Ay r1)()1(a + Ay r1) + r.

    By differentiation of (3.2) with respect to , we have

    () =1

    2tr(D2(y)) + (y)

    D(y)

    +1

    (1 )2()1(a + Ay r1)D

    +1

    2(1 )2(D)(y)()1D(y)

    +1

    2(1 )2(a + Ay r1)()1(a + Ay r1) + r,

    where =

    . That is,

    () =1

    2tr(D2(y)) + (y)

    D(y) + V1,(3.4)

    V1 = V1(y) :=1

    2(1 )2{D(y) + (a + Ay r1)}()1

    (3.5){D(y) + (a + Ay r1)}+ r.

    Furthermore, from (3.2) and (3.4), we can obtain

    () ()(3.6)

    = 1

    2tr(D2( )(y)) +

    (y)D( )(y) + V

    2,

    where V2 is defined by

    V2 = V2(y) = 12 |u|

    2;(3.7)

    u() is in (2.41). Indeed, from (3.2) and (3.4),

    () () = 12 tr(D2( )(y)) + (y)

    D( )(y) + V0 V1.

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    21/40

    DOWN-SIDE RISK MINIMIZATION 21

    By (3.3) and (3.5), a straightforward calculation shows that

    V0 V1 = 1

    2D(y)D(y)

    1 {D(y) + (a + Ay r1)}()1D(y)

    1

    2

    1

    2{D(y) + (a + Ay r1)}

    ()1{D(y) + (a + Ay r1)}

    = 1

    2

    |u|2,

    where the last equality follows from (2.41). Hence we have (3.7).For AT, we have by (2.6),

    XT= x exp

    T0

    r + (a + AYt r1)

    t 1

    2t

    t

    dt +

    T0

    t dWt

    .

    Then

    log XTT

    =log x

    T+

    1

    T

    T0

    t dWt

    +1

    T T

    0

    1

    2t

    t+ {t (a + AYt r1) + r}

    dt.

    Recalling Wt defined by (2.44), we can rewrite the last relation aslog XT

    T=

    log x

    T+

    1

    T

    T0

    t dWt

    1

    2T

    T0

    t

    1

    1 ()1(D(Yt) + a + AYt r1)

    t

    1

    1 ()1(D(Yt) + a + AYt r1)

    dt

    +1

    T T

    0 1

    2(1 )2

    (D(Yt) + a + AYt r1)

    ()1(D(Yt) + a + AYt r1) + r

    dt.

    From (3.5) and with some calculation, we can rewrite this as

    log XTT

    =log x

    T+

    1

    T

    T0

    1

    1 {()1(D(Yt)

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    22/40

    22 H. HATA, H. NAGAI AND S.-J. SHEU

    + a + AYt r1)} dWt+

    1

    TlogE

    1

    1 ()1(D(Y)(3.8)

    + a + AY r1)

    dW

    T

    +1

    T

    T0

    V1(Yt) dt.

    Define the following events:

    A := ; log XT

    T k,

    A1,T :=

    ;

    1

    T

    T0

    V2(Yt) dt () ()

    ,

    A2,T :=

    ;

    1

    T

    T0

    u(Yt) dWt

    and

    A3,T :=

    ;

    log x

    T+

    1

    T

    T0

    V1(Yt) dt () +

    2

    ,

    A4,T := ; 1T T

    0

    1

    1 {()1(D(Yt)

    + a + AYt r1)}

    dWt 4

    ,

    A5,T :=

    ;

    1

    TlogE

    1

    1 ()1

    (D(Y) + a + AY r1)

    dW

    T

    4

    .

    From (3.1) and (3.8), we see that

    A3,T A4,T A5,TA.(3.9)

    Recall that P is the probability defined by (2.43). By using (3.6), (2.45)and Itos formula, we have

    ( )(YT) ( )(y) = (() ())T

    T0

    V2(Yt) dt

    +

    T0

    D( )(Yt) dWt.

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    23/40

    DOWN-SIDE RISK MINIMIZATION 23

    We apply Chebyshevs inequality:

    P(Ac1,T) 12E() () 1T

    T0

    V2(Yt) dt

    2

    1

    2T2E( )(YT) ( )(y)

    T0

    D( )(Yt) dWt2.Noting that (y), and (y) are quadratic in y, then

    |( )(y)| K(1 + |y|

    2

    ),|D( )(y)| K(1 + |y|).

    Therefore, we have

    E( )(YT) ( )(y) T0

    D( )(Yt)(Yt) dWt2K

    1 + |y|4 + T + E[|YT|4] + T

    0

    E[|Yt|2] dt d1(){|y|

    4 + 1 + (|y|2 + 1)T}

    for some d1

    () > 0 where the last inequality follows from Lemma 3.1 below.Therefore, we see that

    P(Ac1,T) d1(){|y|4 + 1 + (|y|2 + 1)T}2T2and P(Ac1,T) ,(3.10)provided T is sufficiently large.

    By using Chebyshevs inequality again, we have

    P(Ac2,T) 1

    2

    T2E

    T

    0

    u(Yt) dWt

    2

    =1

    2

    T2ET

    0

    |u(Yt)|2 dt.

    By (2.41) and using |D(y)| K(1 + |y|), we obtain

    P(Ac2,T) K2T2

    T +

    T0

    E[|Yt|2] dt

    d2()(|y|2 + 1)

    2T,

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    24/40

    24 H. HATA, H. NAGAI AND S.-J. SHEU

    for some d2() > 0 where the last inequality follows from Lemma 3.1 below.Therefore, we see that P(Ac2,T) ,(3.11)provided T is sufficiently large.

    Using a similar argument, we can showP(Ac4,T) .(3.12)We now consider P(Ac3,T). By (3.4) and Itos formula,

    d(Yt) = V1(Yt) dt + () dt + (D(Yt))

    d

    Wt.

    From this, we haveT0

    V1(Yt) dt = (Y0) (YT) + ()T +

    T0

    (D(Yt)) dWt.

    Then, A3,T is the same as;

    log x

    T+

    (Y0) (YT)

    T+

    1

    T

    T0

    (D(Yt)) dWt

    2

    .

    Now we can use the same argument as above to get

    P(Ac3,T) ,(3.13)

    provided T is sufficiently large.For A5,T, we haveP(Ac5,T) e/4T

    EE 11

    ()1(D(Y)

    + a + AY r1)

    dW

    T

    e/4T.

    Then we have P(Ac5,T) ,(3.14)if T is sufficiently large.

    Hence, from (3.7), (3.9), (3.10), (3.11), (3.12), (3.13) and (3.14), we have

    P(A) = EexpT0

    u(Yt) dWt 1

    2

    T0|u(Yt)|

    2 dt

    ; A

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    25/40

    DOWN-SIDE RISK MINIMIZATION 25

    = EexpT0

    u(Yt) dWt+ T

    0V2(Yt) dt

    ; A exp[(() () 2)T] P(A1,T A2,T A) exp[(() () 2)T] P(A1,T A2,T A3,T A4,T A5,T) exp[(() () 2)T] (1 5).

    The estimate of P(A) is uniform in . Therefore, we see that

    (k) limT

    1

    Tlog{exp[(() () 2)T] (1 5)}

    = (k ) 2.By continuity of on ((), (0)) and sending to 0, we obtain

    (k) inf

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    26/40

    26 H. HATA, H. NAGAI AND S.-J. SHEU

    Since () is bounded, () r as (Proposition 2.7), we see

    () k , .

    In particular,

    inf

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    27/40

    DOWN-SIDE RISK MINIMIZATION 27

    By (4.13), we have

    (0) =1

    2tr

    dP

    d(0)

    +

    dq

    d(0)b +

    1

    2(a r1)()1(a r1) + r.

    Using the above expression for dPd(0), we can show

    BdP

    d(0) +

    dP

    d(0)B = A()1A.

    Multiplying this by (B)1 on the left and B1 on the right, we have

    (B)1dP

    d

    (0) +dP

    d

    (0)B1 = (B)1A()1AB1.

    Then

    (B)1dP

    d(0)b b

    = 1

    2(AB1b)()1AB1b,

    dq

    d(0)b +

    1

    2(a r1)()1(a r1)

    =1

    2(AB1b (a r1))()1(AB1b (a r1)).

    An expression of (0) as in (2.51) follows.Finally, we show

    inf

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    28/40

    28 H. HATA, H. NAGAI AND S.-J. SHEU

    hence

    inf 0. Moreover, if we take as 0 < < 2pc1(), then we have

    d|Yt|2pet 2pet|Yt|

    2(p1)Yt dWt+ et|Yt|

    2(p1)[p{2c1()|Yt|2 + 2c2() + c3}+ |Yt|

    2] dt

    2pet|Yt|2(p1)Yt d

    Wt + etM dt,where

    M := supy|y|2(p1)[p{2c1()|y|

    2 + 2c2() + c3}+ |y|2].

    Therefore, we obtain

    |Yt|2p |y|2p +

    M

    (1 et) + 2p

    t

    0e(ts)|Ys|

    2(p1)Y

    s dWs.

    From this, by an argument using a stopping time, we obtain (3.16) withM = M /.

    Remark 3.1. The proof of Theorem 2.1 is based on the results in Propo-sitions 2.12.7. It is interesting to verify these results for more general non-Gaussian models. We make the following observation. If we assume:

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    29/40

    DOWN-SIDE RISK MINIMIZATION 29

    (i) ,,, are globally Lipschitz;(ii) 1||

    2 (y) 2||2, 1, 2 > 0;

    (iii) 1||2 (y) 2||

    2, 1, 2 > 0; then there is () such that

    (2.23) has a solution for () (see Theorem 2.6 in [22]). Moreover, undercertain conditions, there is a unique solution (y) with (0) = 0 for =() (see Theorem 3.8 in [22]). Assume is positive, and for Gaussiancases studied here that satisfy the conditions (A1), (A2), (A3), () =(), (y) = (y), which are defined in Proposition 2.3. It is an interestingproblem to find conditions on coefficients that prove other propositions.

    4. Proof of propositions.

    4.1. Finite time horizon problem. In this subsection, we prove Propo-sitions 2.1 and 2.2. We follow closely the arguments of Kuroda and Nagai[25].

    First of all, we attack the finite time horizon problem (2.9). Then thesolution v of the Bellman equation (2.21) can be expressed as quadraticfunction such that

    v(t, y) = 12yP(t)y + q(t)y + h(t),

    provided that equation (2.27) has a solution. Here q and h are solutions of(2.29) and (2.30), respectively. We recall the following result (5.2) in [13],Theorem IV. If < 0, then we see that (2.27) has the unique solution P(t)

    0. See also Remark 1 of Section 2 in [25], but notice that and the solutionP(t) of (2.27) correspond to 2 and

    2P(t) in [25], respectively. Therefore,

    as in the proof of Theorem 2.1 in [25], we obtain Propositions 2.1 and 2.2.

    4.2. Asymptotics as T. In this section we prove Propositions 2.3and 2.4. Here we recall the following theorem (see Theorem 4.1 and Lemma5.2 in [38]).

    Theorem 4.1 [38]. Assume that N > 0 and (K1, ) is stabilizable, thenfor the solution Q(t) = Q(t; T) of

    Q(t) + K1Q(t) + Q(t)K1 Q(t)N1Q(t) + CC= 0,Q(T) = 0.(4.1) limTQ(t; T) = Q, and Q satisfies the algebraic Riccati equation,

    K1Q + QK1QN1Q + CC= 0.(4.2)

    Moreover, if (C, K1) is detectable, then K1 N

    1Q is stable and thenonnegative definite solution of (4.2) is unique.

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    30/40

    30 H. HATA, H. NAGAI AND S.-J. SHEU

    Remark 4.1. The pair (L, M) of the n n matrix L and the n lmatrix M is stabilizable if there exists a ln matrix K such that LMKis stable. The pair (L, F) of the l n matrix L and the n n matrix F iscalled detectable if (F, L) is stabilizable.

    Proof of Proposition 2.3(i) and (ii). Let us set Q(t) = P(t).Then we see that Q satisfies (4.1). Let K1, C be given in (2.28). TakeK= ()1A. Then K1K= B

    ()1A = G is stable. Note

    also that if we set K2 :=

    1(1)

    , then K1 CK2 = G is stable [G

    is given in (A2)]. Therefore, we see that (K1, ) is stabilizable, (C, K1) isdetectable and Theorem 4.1 applies. Then we can follow the arguments of

    Proposition 2.2 in Kuroda and Nagai [25]; we omit the details here.

    Proof of Proposition 2.3(iii). Note that P(t; T) is uniformly boundedwith respect to t and T (see Remark 1 of Section 4 in [25]). Moreover,since K1 + N

    1P(t; T) converges to a stable matrix K1 + N1P

    as T, we can show by (2.29) that q(t; T) is uniformly bounded withrespect to t and T. See Lemma 4.4 in [25]. Therefore we obtain (2.38).

    Proof of Proposition 2.4. Let us assume (A1)(A3). Then we havethe solution P of (2.34) and q of (2.35). Moreover, the pair ((y), ()) of(y), defined by (2.33) and () defined by (2.37), satisfies (2.23) (cf. Section2 in Kuroda and Nagai [25]). Here we note that from (A2), K1 + N

    1P

    is stable (by Theorem 4.1). Moreover, from (A3) we see that the variance ofYt under P [defined in (2.43)] is nondegenerate (see Lemma 5.1 of Kurodaand Nagai [25]). Therefore, we see that Yt given by (2.45) is P-ergodic. Therest of the proof follows closely the arguments of Theorem 3.8 in Kaise andSheu [22] and is omitted here.

    4.3. Differentiability with respect to HARA parameter . In this subsec-tion, we shall prove Proposition 2.5(i). Let us first note that the Riccatidifferential equation (2.1) can be solved by considering a Hamiltonian sys-tem. Indeed, introduce a Hamiltonian matrix H defined by

    H =K1 N1

    C

    C K1 ,(4.3)

    and consider the ordinary differential equationU(t)V(t)

    = H

    U(t)V(t)

    , 0 t T,

    U(0)V(0)

    =

    En0

    .(4.4)

    See Chapter V in [1]. Note that U and V are nn matrix valued functionson 0 t T, and En is the nn unit matrix. Then it is known that U(t) is

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    31/40

    DOWN-SIDE RISK MINIMIZATION 31

    invertible, and W(t) := V(t)U(t)1 is the solution to the Riccati differentialequation

    W(t) = K1W(t) + W(t)K1W(t)N1W(t) + CC,

    W(0) = 0.(4.5)

    Then we see that, by setting P(t) := P(T t; T), we have P(t) = W(t).Lemma 4.1. The solutionP(t) := P(t; T; ) to the Riccati equation (2.27)

    is inC1-class with respect to .

    Proof. The Hamiltonian matrix H defined by (4.3) is smooth with

    respect to and so is the solution (U(t), V(t))

    of (4.4). Moreover, U(t) isinvertible. Therefore, U(t)1 is in C1-class and

    U(t)1

    =U(t)1

    U(t)

    U(t)1.

    Thus we see that W(t) = V(t)U(t)1 is in C1-class with respect to . Hencewe conclude our present lemma.

    Now, let us rewrite (2.27) as

    P(t) + (K1 + N1P(t))P(t) + P(t)(K1 + N

    1P(t))(4.6)

    P(t)N1P(t)CC= 0.

    Then by differentiating (4.6) with respect to , we obtain

    d

    dt

    P

    + (K1 + N

    1P(t))P

    +P

    (K1 + N

    1P(t))(4.7)

    +1

    (1 )2(P(t) + A)()1(P(t) + A) = 0.

    Then we obtain the following lemma.

    Lemma 4.2. Assume (A1) and (A2). Then the solutionP

    (t; T; ) of(4.7) converges to dPd which satisfies

    (K1 + N1P)

    dP

    d+

    dP

    d(K1 + N

    1P)

    (4.8)

    +1

    (1 )2(P + A)()1(P + A) = 0.

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    32/40

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    33/40

    DOWN-SIDE RISK MINIMIZATION 33

    (4.10) ()1(P + A)es(K1+N

    1P) ds.

    On the other hand, we have

    P(+ ) P() = limT

    {P(t; T; + ) P(t; T; )}

    = limT

    +

    P

    (t; T; u) du

    =

    +

    P

    (u) du.

    From (4.10), (P) is continuous with respect to . Therefore, we see that P

    is differentiable with respect to , and dPd() = (P )().

    As for differentiability of q with respect to , we can see this is similarto Lemma 4.2. Indeed, (2.29) is a linear equation and its coefficients areall in C1-class with respect to . Therefore, the solution q(t) of (2.29) is inC

    1-class with respect to , and we have

    d

    dt

    q

    + (K1 + N

    1P(t))q

    +

    (K1 + N1P(t))

    q(t)

    +P

    b +

    1

    (1 )2(P(t) + A)()1(a r1)(4.11)

    +

    1

    P

    ()1(a r1) = 0.

    Thus we have the following lemma, similar to Lemma 4.2.

    Lemma 4.3. Under assumptions (A1) and (A2), as T, q(t; T; ),

    the solution of (4.11) converges to dqd which satisfies

    (K1 + N1P)

    dq

    d+

    ,

    dP

    d, P , q

    = 0,(4.12)

    where

    , dPd

    , P , q := 1(1 )2

    ()1(A + P) + N1 dPdq

    +dP

    db +

    1

    (1 )2(A + P)()1(a r1)

    +

    1

    dP

    d()1(a r1).

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    34/40

    34 H. HATA, H. NAGAI AND S.-J. SHEU

    Differentiability of () is directly seen from (2.37). Indeed, we have

    d

    d=

    1

    2tr

    dP

    d

    + q

    dq

    d+ b

    dq

    d+ r

    +1

    2(1 )2(a r1+ q)()1(a r1+ q)(4.13)

    +

    1 (a r1+ q)()1

    dq

    d.

    The following lemma is a direct consequence of (4.9), (4.12) and (4.13).

    Lemma 4.4. Under assumptions (A1) and (A2),dP

    d,

    dq

    d and

    d

    d are dif-ferentiable with respect to .

    Proof. Differentiability of dPd is seen by looking at (4.9). As fordqd,

    from (4.12) we obtain

    dq

    d= [(K1 + N

    1P)]1

    ,

    dP

    d, P , q

    ,

    and so it turns out to be differentiable. From these facts and ( 4.13), differ-

    entiability of dd follows.

    4.4. Convexity of. In this subsection, we shall show Proposition 2.5(ii).

    Proof of Proposition 2.5(ii). Note that K1 + N1P is stable

    under assumption (A2). In the previous subsection, namely the proof ofProposition 2.5(i), we have shown in Lemma 4.4 that under assumptions(A1) and (A2), P , q and are twice differentiable with respect to and sois . Recall that

    d

    d() =

    1

    2tr(D2(y)) + (y)

    D(y) + V1,

    where := , (y) is given by (2.40) and V1 is defined by (3.5). Moreover,

    setting := 2

    2 , we have

    d2

    d2() =

    1

    2tr(D2(y)) + (y)

    D(y) +

    (y)

    D(y)

    +1

    (1 )3{D(y) + (a + Ay r1)}

    ()1{D(y) + (a + Ay r1)}

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    35/40

    DOWN-SIDE RISK MINIMIZATION 35

    + 1(1 )2

    (D)(y)()1

    {D(y) + (a + Ay r1)}.

    Using

    (y) =1

    (1 )2()1{D(y) + (a + Ay r1)}

    + N1D(y),

    we obtain

    d2

    d2

    () =1

    2

    tr(D2(y)) + (y)D+ (y; ),

    where

    (y; ) := (D)(y)(I()1)D(y)

    +1

    (1 )3{(1 )D(y) + D(y) + (a + Ay r1)}

    ()1{(1 )D(y) + D(y) + (a + Ay r1)}.

    Note that |(y; )| K(1 + |y|2). From (3.16) we can see that

    d2

    d2() = limT

    1

    T

    E

    T0

    (Ys; ) ds

    0.

    Then K satisfies the following equation:

    G

    K+ KG =I.

    Therefore, we have

    KGy,y+ y,KGy= y, y,Gy,Ky= 12y, y.

    Since

    (y) = Gy + f

    [see (2.40)], we can deduce (2.46) after some calculation. Here K= K, c1() =1/4, and c2() = |Kf|

    2.

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    36/40

    36 H. HATA, H. NAGAI AND S.-J. SHEU

    4.6. Asymptotics as . In this subsection we shall consider asymp-totic behavior of dd() as , and obtain Proposition 2.7.

    Proof of Proposition 2.7. We first consider P() which is a solution

    of the algebraic Riccati equation (2.34). We then note that dPd 0 holds, and

    P is bounded because of (4.9) and (2.36). We set P() := limP().Now we rewrite (2.34) as

    (K1 K)P + P(K1 K) + (

    P + NK)N1(P + NK)(4.14)

    KNKCC= 0,

    where

    K:=1

    1 ()1A.(4.15)

    Noting that

    N = I ()1,

    lim

    K= 0, lim

    K1 = G,

    lim

    N1 = I()1 := N(),lim

    (KN K+ CC) = A()1A,

    where G = B

    (

    )1

    A [see (A2)]. We obtainGP() + P()G

    (4.16)+ P()N()P()A()1A = 0.

    Moreover, we rewrite (4.16) as

    (G + N()P())P() + P()(G + N()P()) (P()N()P() + A()1A) = 0.

    We consider

    d

    dt

    et(G+N()

    P())

    P()et(G+ N()

    P())

    and using the above relation, we can show0

    es(G+N()

    P())

    P()

    N()P()es(G+ N()P()) ds(4.17)P().

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    37/40

    DOWN-SIDE RISK MINIMIZATION 37

    Here we use P() 0. Since G is stable,

    (G + (N()P()), (N()P()))is stabilizable which means that (N()P(), G + N()P()) isdetectable. Therefore, noting that (N())2 = N() and that

    0es(G+

    N()P())

    P()N()P()es(G+ N()P()) dsis bounded because of (4.17), we see that G +

    N()

    P() is stable(see [39], Proposition 3.2). Now noting that

    K1 K= G, dd

    (K1 K) = 0,

    NK= ()1A,d

    d(NK) = 0,

    KN K+ CC= A()1A andd

    d(KNK+ CC) = 0.

    Then, by differentiating (4.14) with respect to , we obtain

    (K1 + N1P)

    dP

    d+

    dP

    d(K1 + N

    1P)

    (4.18)

    + 1(1 )2

    (P + N K)()1(P + N K) = 0.

    Set (dPd)() =limdPd . Then, sending to in (4.18), we see that

    (G + N()P())dPd

    ()

    +

    dP

    d

    ()

    (G + N()P()) = 0.Since G +

    N()

    P() is stable, we see that

    dPd

    ()

    = 0.(4.19)

    Set q() =lim q(). As for q(), sending to in (2.35), we have

    (G + N()P())q() + bP() (A + P()

    )()1(a r1) = 0,

  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    38/40

    38 H. HATA, H. NAGAI AND S.-J. SHEU

    and so

    q() = {(G + N()P())}1 [(A + P()

    )()1(a r1) bP()].

    Moreover, setting ( dqd)() = limdqd, we see by (4.12) that

    (G + N()P()) dqd

    ()

    = 0.

    Since G +

    N()

    P() is stable, we have

    dqd() = 0.(4.20)The present proposition is directly seen by using (4.13), (4.19) and (4.20).

    Acknowledgments. The authors would like to thank the referees for help-ful comments and suggestions. The first author is a postdoctoral fellow atInstitute of Mathematics, Academia Sinica, Taiwan. Therefore, he is thank-ful to Academia Sinica for constant support.

    REFERENCES

    [1] Bucy, R. S. and Joseph, P. D. (1987). Filtering for Stochastic Processes with Ap-

    plications to Guidance, 2nd ed. Chelsea Publishing, New York. MR0879420[2] Bielecki, T. R. and Pliska, S. R. (1999). Risk-sensitive dynamic asset manage-ment. Appl. Math. Optim. 39 337360. MR1675114

    [3] Bielecki, T. R. and Pliska, S. R. (2004). Risk-sensitive ICAPM with applica-tion to fixed-income management. IEEE Trans. Automat. Control 49 420432.MR2062254

    [4] Bielecki, T. R., Pliska, S. R. and Sheu, S.-J. (2005). Risk sensitive portfoliomanagement with CoxIngersollRoss interest rates: The HJB equation. SIAMJ. Control Optim. 44 18111843. MR2193508

    [5] Browne, S. (1999). Beating a moving target: Optimal portfolio strategies for out-performing a stochastic benchmark. Finance Stoch. 3 275294. MR1842287

    [6] Browne, S. (1999). The risk and rewards of minimizing shortfall probability. J.Portfolio Management 25 7685.

    [7] Davis, M. and Lleo, S. (2008). Risk-sensitive benchmarked asset management.

    Quant. Finance 8 415426. MR2435642[8] Dembo, A. and Zeitouni, O. (1998). Large Deviations Techniques and Applications,2nd ed. Applications of Mathematics 38. Springer, New York. MR1619036

    [9] Ekeland, I. and Temam, R. (1999). Convex Analysis and Variational Problems,English ed. Classics in Applied Mathematics 28. SIAM, Philadelphia, PA.MR1727362

    [10] Fleming, W. H. (1995). Optimal investment models and risk-sensitive stochasticcontrol. In Mathematical Finance (M. Davis et al., eds.) 7588. Springer,Berlin.

    http://www.ams.org/mathscinet-getitem?mr=0879420http://www.ams.org/mathscinet-getitem?mr=1675114http://www.ams.org/mathscinet-getitem?mr=2062254http://www.ams.org/mathscinet-getitem?mr=2193508http://www.ams.org/mathscinet-getitem?mr=1842287http://www.ams.org/mathscinet-getitem?mr=2435642http://www.ams.org/mathscinet-getitem?mr=1619036http://www.ams.org/mathscinet-getitem?mr=1727362http://www.ams.org/mathscinet-getitem?mr=1727362http://www.ams.org/mathscinet-getitem?mr=1619036http://www.ams.org/mathscinet-getitem?mr=2435642http://www.ams.org/mathscinet-getitem?mr=1842287http://www.ams.org/mathscinet-getitem?mr=2193508http://www.ams.org/mathscinet-getitem?mr=2062254http://www.ams.org/mathscinet-getitem?mr=1675114http://www.ams.org/mathscinet-getitem?mr=0879420
  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    39/40

    DOWN-SIDE RISK MINIMIZATION 39

    [11] Fleming, W. H. and James, M. R. (1995). The risk-sensitive index and the H2 andH norms for nonlinear systems. Math. Control Signals Systems 8 199221.MR1387043

    [12] Fleming, W. H. and McEneaney, W. M. (1995). Risk-sensitive control on aninfinite time horizon. SIAM J. Control Optim. 33 18811915. MR1358100

    [13] Fleming, W. H. and Rishel, R. W. (1975). Deterministic and Stochastic OptimalControl. Springer, Berlin. MR0454768

    [14] Fleming, W. H. and Sheu, S.-J. (1999). Optimal long term growth rate of expectedutility of wealth. Ann. Appl. Probab. 9 871903. MR1722286

    [15] Fleming, W. H. and Sheu, S. J. (2000). Risk-sensitive control and an optimalinvestment model. Math. Finance 10 197213. MR1802598

    [16] Fleming, W. H. and Sheu, S. J. (2002). Risk-sensitive control and an optimalinvestment model. II. Ann. Appl. Probab. 12 730767. MR1910647

    [17] Fleming, W. H. and Soner, H. M. (2006). Controlled Markov Processes and Viscos-ity Solutions, 2nd ed. Stochastic Modelling and Applied Probability 25. Springer,New York. MR2179357

    [18] Hata, H. and Iida, Y. (2006). A risk-sensitive stochastic control approach to anoptimal investment problem with partial information. Finance Stoch. 10 395426. MR2244352

    [19] Hata, H. and Sekine, J. (2005). Solving long term optimal investment problemswith CoxIngersollRoss interest rates. Adv. Math. Econ. 8 231255.

    [20] Hormander, L. (1967). Hypoelliptic second-order differential equations. Acta Math.119 147171. MR0222474

    [21] Kaise, H. and Sheu, S. J. (2004). Risk sensitive optimal investment: Solutions of thedynamical programming equation. In Mathematics of Finance. ContemporaryMathematics 351 217230. Amer. Math. Soc., Providence, RI. MR2076543

    [22] Kaise, H. and Sheu, S.-J. (2006). On the structure of solutions of ergodic typeBellman equation related to risk-sensitive control. Ann. Probab. 34 284320.MR2206349

    [23] Kaise, H. and Sheu, S.-J. (2006). Evaluation of large time expectations for diffusionprocesses. Preprint.

    [24] Korn, R. (1997). Optimal Portfolios. World Scientific, Singapore.[25] Kuroda, K. and Nagai, H. (2002). Risk-sensitive portfolio optimization on infinite

    time horizon. Stoch. Stoch. Rep. 73 309331. MR1932164[26] Merton, R. C. (1971). Optimum consumption and portfolio rules in a continuous-

    time model. J. Econom. Theory 3 373413. MR0456373[27] Nagai, H. (1996). Bellman equations of risk-sensitive control. SIAM J. Control Op-

    tim. 34 74101. MR1372906[28] Nagai, H. (2003). Optimal strategies for risk-sensitive portfolio optimization

    problems for general factor models. SIAM J. Control Optim. 41 17791800.MR1972534

    [29] Nagai, H. and Peng, S. (2002). Risk-sensitive dynamic portfolio optimization withpartial information on infinite time horizon. Ann. Appl. Probab. 12 173195.MR1890061

    [30] Pham, H. (2003). A large deviations approach to optimal long term investment.Finance Stoch. 7 169195. MR1968944

    [31] Pham, H. (2003). A risk-sensitive control dual approach to a large deviations controlproblem. Systems Control Lett. 49 295309. MR2011524

    [32] Sekine, J. (2007). Mathematical Finance. Baihukan, Japan.[33] Sekine, J. (2009). Private communication.

    http://www.ams.org/mathscinet-getitem?mr=1387043http://www.ams.org/mathscinet-getitem?mr=1358100http://www.ams.org/mathscinet-getitem?mr=0454768http://www.ams.org/mathscinet-getitem?mr=1722286http://www.ams.org/mathscinet-getitem?mr=1802598http://www.ams.org/mathscinet-getitem?mr=1910647http://www.ams.org/mathscinet-getitem?mr=2179357http://www.ams.org/mathscinet-getitem?mr=2244352http://www.ams.org/mathscinet-getitem?mr=0222474http://www.ams.org/mathscinet-getitem?mr=2076543http://www.ams.org/mathscinet-getitem?mr=2206349http://www.ams.org/mathscinet-getitem?mr=1932164http://www.ams.org/mathscinet-getitem?mr=0456373http://www.ams.org/mathscinet-getitem?mr=1372906http://www.ams.org/mathscinet-getitem?mr=1972534http://www.ams.org/mathscinet-getitem?mr=1890061http://www.ams.org/mathscinet-getitem?mr=1968944http://www.ams.org/mathscinet-getitem?mr=2011524http://www.ams.org/mathscinet-getitem?mr=2011524http://www.ams.org/mathscinet-getitem?mr=1968944http://www.ams.org/mathscinet-getitem?mr=1890061http://www.ams.org/mathscinet-getitem?mr=1972534http://www.ams.org/mathscinet-getitem?mr=1372906http://www.ams.org/mathscinet-getitem?mr=0456373http://www.ams.org/mathscinet-getitem?mr=1932164http://www.ams.org/mathscinet-getitem?mr=2206349http://www.ams.org/mathscinet-getitem?mr=2076543http://www.ams.org/mathscinet-getitem?mr=0222474http://www.ams.org/mathscinet-getitem?mr=2244352http://www.ams.org/mathscinet-getitem?mr=2179357http://www.ams.org/mathscinet-getitem?mr=1910647http://www.ams.org/mathscinet-getitem?mr=1802598http://www.ams.org/mathscinet-getitem?mr=1722286http://www.ams.org/mathscinet-getitem?mr=0454768http://www.ams.org/mathscinet-getitem?mr=1358100http://www.ams.org/mathscinet-getitem?mr=1387043
  • 8/9/2019 Asymptotics of the Probability Minimizing a Down-side Risk

    40/40

    40 H. HATA, H. NAGAI AND S.-J. SHEU

    [34] Rishel, R. (1999). Optimal portfolio management with partial observations andpower utility function. In Stochastic Analysis, Control, Optimization and Ap-plications. Systems Control Found. Appl. 605619. Birkhauser, Boston, MA.MR1702984

    [35] Stutzer, M. (2000). A portfolio performance index. Financial Analysts Journal 565261.

    [36] Stutzer, M. (2003). Portfolio choice with endogenous utility: A large deviationsapproach. J. Econometrics 116 365386. MR2002529

    [37] Whittle, P. (1990). Risk-Sensitive Optimal Control. Wiley, Chichester. MR1093001[38] Wonham, W. M. (1968). On a matrix Riccati equation of stochastic control. SIAM

    J. Control Optim. 6 681697. MR0239161[39] Wonham, W. M. (1985). Linear Multivariable Control: A Geometric Approach, 3rd

    ed. Applications of Mathematics 10. Springer, New York. MR0770574

    H. HataS.-J. Sheu

    Academia Sinica

    Nankang, Taipei 11529

    Taiwan

    E-mail: [email protected]

    [email protected]

    H. NagaiOsaka University

    Toyonaka

    560-8531, Osaka

    Japan

    E-mail: [email protected]

    http://www.ams.org/mathscinet-getitem?mr=1702984http://www.ams.org/mathscinet-getitem?mr=2002529http://www.ams.org/mathscinet-getitem?mr=1093001http://www.ams.org/mathscinet-getitem?mr=0239161http://www.ams.org/mathscinet-getitem?mr=0770574mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]://www.ams.org/mathscinet-getitem?mr=0770574http://www.ams.org/mathscinet-getitem?mr=0239161http://www.ams.org/mathscinet-getitem?mr=1093001http://www.ams.org/mathscinet-getitem?mr=2002529http://www.ams.org/mathscinet-getitem?mr=1702984