Вы находитесь на странице: 1из 207

Managing Volatility Risk

Innovation of Financial Derivatives, Stochastic Models and


Their Analytical Implementation
Chenxu Li
Submitted in partial fulllment of the
Requirements for the degree
of Doctor of Philosophy
in the Graduate School of Arts and Sciences
COLUMBIA UNIVERSITY
2010
c _ 2010
Chenxu Li
All Rights Reserved
ABSTRACT
Managing Volatility Risk
Innovation of Financial Derivatives, Stochastic
Models and Their Analytical Implementation
Chenxu Li
This dissertation investigates two timely topics in mathematical nance. In partic-
ular, we study the valuation, hedging and implementation of actively traded volatil-
ity derivatives including the recently introduced timer option and the CBOE (the
Chicago Board Options Exchange) option on VIX (the Chicago Board Options Ex-
change volatility index). In the rst part of this dissertation, we investigate the pric-
ing, hedging and implementation of timer options under Hestons (1993) stochastic
volatility model. The valuation problem is formulated as a rst-passage-time problem
through a no-arbitrage argument. By employing stochastic analysis and various ana-
lytical tools, such as partial dierential equation, Laplace and Fourier transforms, we
derive a Black-Scholes-Merton type formula for pricing timer options. This work mo-
tivates some theoretical study of Bessel processes and Feller diusions as well as their
numerical implementation. In the second part, we analyze the valuation of options
on VIX under Gatherals double mean-reverting stochastic volatility model, which is
able to consistently price options on S&P 500 (the Standard and Poors 500 index),
VIX and realized variance (also well known as historical variance calculated by the
variance of the assets daily return). We employ scaling, pathwise Taylor expansion
and conditional Gaussian moments techniques to derive an explicit asymptotic ex-
pansion formula for pricing options on VIX. Our method is generally applicable for
multidimensional diusion models. The convergence of our expansion is justied via
the theory of Malliavin-Watanabe-Yoshida. In numerical examples, we illustrate that
the formula eciently achieves desirable accuracy for relatively short maturity cases.
Contents
I Bessel Process, Hestons Stochastic Volatility Model and
Timer Option 1
1 Introduction to Part I 2
1.1 A Brief Outline of Part I . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Introduction: Feller Diusion, Variance Clock and Timer Option . . . 3
2 Heston Model, Timer Option and a First-Passage-Time Problem 9
2.1 Realized Variance and Timer Option . . . . . . . . . . . . . . . . . . 9
2.2 Hestons Stochastic Volatility Model . . . . . . . . . . . . . . . . . . 11
2.3 A First-Passage-Time Problem . . . . . . . . . . . . . . . . . . . . . . 11
3 Feller Diusion, Bessel Process and Variance Clock 28
3.1 Connect Feller Diusion and Bessel Process by Variance Clock . . . . 29
3.2 A Joint Density on Bessel Process . . . . . . . . . . . . . . . . . . . . 31
3.2.1 The First Expression of the Density . . . . . . . . . . . . . . . 32
3.2.2 The Second Expression of the Density . . . . . . . . . . . . . 38
4 A Black-Scholes-Merton Type Formula for Pricing Timer Option 41
4.1 A Black-Scholes-Merton Type Formula for Pricing Timer Option . . . 41
4.2 Reconcilement with the Black-Scholes-Merton (1973) . . . . . . . . . 47
i
4.3 Comparison with European Options . . . . . . . . . . . . . . . . . . . 49
4.4 Timer Options Based Applications and Strategies . . . . . . . . . . . 51
4.5 Some Generalizations . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
5 Implementation and Numerical Examples 54
5.1 Analytical Implementation via Laplace Transform Inversion . . . . . 55
5.2 ADI Implementation of the PDE with Dimension Reduction . . . . . 60
5.3 Monte Carlo Simulation . . . . . . . . . . . . . . . . . . . . . . . . . 65
5.4 Miscellaneous Features . . . . . . . . . . . . . . . . . . . . . . . . . . 71
6 Dynamic Hedging Strategies 75
6.1 Dynamic Hedging Strategies . . . . . . . . . . . . . . . . . . . . . . . 75
6.2 Computation of Price Sensitivities . . . . . . . . . . . . . . . . . . . . 78
II Ecient Valuation of VIX Options under Gatherals
Double Log-normal Stochastic Volatility Model 82
7 Introduction to Part II 83
7.1 A Brief Outline of Part II . . . . . . . . . . . . . . . . . . . . . . . . 83
7.2 Modeling VIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
7.3 Historical Developments on Modeling Multi-factor Stochastic Volatility 88
7.4 Gatherals Double Mean-Reverting Stochastic Volatility Model . . . . 90
8 Valuation of Options on VIX under Gatherals Double Log-normal
Model 96
8.1 Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
8.2 An Asymptotic Expansion Formula for VIX Option Valuation . . . . 100
8.3 Derivation of the Asymptotic Expansion . . . . . . . . . . . . . . . . 107
8.3.1 Scaling of the Model . . . . . . . . . . . . . . . . . . . . . . . 107
8.3.2 Derivation of the Asymptotic Expansion Formula . . . . . . . 109
9 Implementation and Numerical Examples 132
9.1 Benchmark from Monte Carlo Simulation . . . . . . . . . . . . . . . . 132
9.2 Implementation of our Asymptotic Expansion Formula . . . . . . . . 133
10 On the Validity of the Asymptotic Expansion 140
Glossary 154
Bibliography 165
Appendix 165
A Joint Density of Bessel Process at Exponential Stopping 166
Detailed ADI Scheme 171
Consideration of Jump Combined with Stochastic Volatility 174
The Malliavin-Watanabe-Yoshida Theory: A Primer 179
.1 Basic Setup of the Malliavin Calculus Theory . . . . . . . . . . . . . 179
.2 The Malliavin-Watanabe-Yoshida Theory of Asymptotic Expansion . 184
Implementation Source Code 187
List of Tables
5.1 Model and Option Parameters . . . . . . . . . . . . . . . . . . . . . . 60
5.2 A numerical example on pricing timer call option via ADI scheme . . 64
5.3 Monte Carlo Simulation Results . . . . . . . . . . . . . . . . . . . . . 72
9.1 Input Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
9.2 Implementation Results for the Valuation of Options on VIX . . . . . 136
iv
List of Figures
5.1 Rotation Counting Algorithm for the Bessel Argument . . . . . . . . 58
5.2 The joint density surface . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.3 Timer call surfaces implemented from PDE ADI scheme . . . . . . . 65
5.4 Convergence of the RMS errors of Monte Carlo simulation . . . . . . 73
5.5 Comparison between the prices of timer call options and European call
options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
5.6 Timer call option price increases as variance budget increases . . . . . 74
6.1 Numerical examples of time call option price sensitivities: Delta and
Vega . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
9.1 This set of graphs illustrates the comparison of the VIX option prices
computed from the Monte Carlo simulation and our O(
5
) asymptotic
expansion. The maturities range from one week to two month. . . . . 137
9.2 This set of graphs illustrates the comparison of the Black-Scholes im-
plied volatilities computed from the Monte Carlo simulation and our
O(
5
) asymptotic expansion. The maturities range from one week to
two month. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
9.3 Error and absolute error comparison among dierent approximations 139
v
Part I
Bessel Process, Hestons Stochastic
Volatility Model and Timer Option
1
Chapter 1
Introduction to Part I
1.1 A Brief Outline of Part I
The rst part of this dissertation is motivated by the problems of pricing, hedg-
ing and implementation of timer options proposed in 2007 by Societe Generale &
Investment Banking as an innovative volatility derivative. Under Hestons (1993)
stochastic volatility model, we rigorously formulate the perpetual timer call option
valuation problem as a rst-passage-time problem via a standard no-arbitrage argu-
ment and a stochastic representation of the solution to a boundary value problem.
Motivated by this problem, we apply the time-change technique to nd that the vari-
ance process modeled by Feller diusion, running on a variance clock, is equivalent
in distribution to a Bessel process with constant drift. We derive a joint density
related to Bessel processes via Laplace transform techniques. Applying these results,
we obtain a Black-Scholes-Merton type formula for pricing timer options. We also
propose and compare several methods for implementation, including Laplace-Fourier
2
Introduction to Part I 3
transform inversion, Monte Carlo simulation and the alternating directional implicit
scheme for partial dierential equation with dimension reduction. At the theoretical
level, we propose a method for dynamically hedging timer call options and discuss
the computation of price sensitivities. As an extension, we consider the valuation of
timer options under stochastic volatility with jump models.
1.2 Introduction: Feller Diusion, Stochastic Vari-
ance Clock and Timer Option
The nancial market exhibits hectic and calm periods. Prices exhibit large uctua-
tions when the market is hectic, and price uctuations tend to be moderate when the
market is mild. This uncertain uctuation is dened as volatility, which has become
one of the central features in nancial modeling. A variety of volatility (or vari-
ance) derivatives, such as variance swaps and options on VIX (the Chicargo board of
exchange volatility index), are now actively traded in the nancial security markets.
A European call (put) option is a nancial contract between two parties, the buyer
and the seller of this type of option. It is the option to buy (sell) shares of stock at
a specied time in the future for a specied price. The Black-Scholes-Merton (1973)
model [10, 79] is a popular mathematical description of nancial markets and deriva-
tive investment instruments. This model develops partial dierential equations whose
solution, the Black-Scholes-Merton formula, is widely used in the pricing of European-
style options. However, the unrealistic assumption of constant volatility motivates
that European options are usually quoted via Black-Scholes implied volatility, which
is the volatility extracted from the market, i.e. the volatility implied by the market
price of the option based on the Black-Scholes-Merton option pricing model. More
Introduction to Part I 4
explicitly, given the Black-Scholes-Merton model:
dS
t
= S
t
dt + S
t
dW
t
,
where is the return and is volatility of the stock, the Black-Scholes-Merton formula
for pricing a European call option with maturity T and strike K reads
C() = BSM(S
0
, K, T, , r) := S
0
N(d
1
) e
rT
KN(d
2
),
where r is the interest rate assumed to be constant,
d
1
=
1

T
_
log
_
S
0
K
_
+
_
r +
1
2

2
_
T
_
,
d
2
=
1

T
_
log
_
S
0
K
_
+
_
r
1
2

2
_
T
_
,
(1.1)
and
N(x) =
1

2
_
x

u
2
2
du.
Given a market price C
M
for the option, the Black-Scholes-Merton implied volatility
is the volatility that equates model and market option prices, i.e., it is the value

which solves equation


C(

) = C
M
.
Why and how timer options are developed? As reported in RISK [84],
The price of a vanilla call option is determined by the level of implied
volatility quoted in the market, as well as maturity and strike price. But
the level of implied volatility is often higher than realised volatility, reect-
ing the uncertainty of future market direction. In simple terms, buyers of
Introduction to Part I 5
vanilla calls often overpay for their options. In fact, having analysed all
stocks in the Euro Stoxx 50 index since 2000, SG CIB calculates that 80%
of three-month calls that have matured in-the-money were overpriced.
In order to circumvent this problem and ensure that investors pay for the realized
variance, Societe Generale Corporate and Investment Banking (SG CIB) launched a
new type of option (see report in Sawyer [84], Societe Generale Asset Management
[44] and Hawkins and Krol [59]), called timer option. With a timer call option, the
investor has the right to purchase the underlying asset at a pre-specied strike price
at the rst time when a pre-specied variance budget is consumed. Instead of xing
the maturity and letting the volatility oat, we x the volatility and let the maturity
oat. Thus, a timer Option can be viewed as a call option with random maturity.
The maturity occurs at the rst time the prescribed variance budget is exhausted.
There are several advantages of introducing timer options. According to Societe
Generale, a timer call option is cheaper than a traditional European call option with
the same expected investment horizon, when realized volatility is less than implied
volatility. With timer options, systematic market timing is optimized for the fol-
lowing reason. If the volatility increases, the timer call option terminates earlier.
However, if the volatility decreases, the timer call option simply takes more time to
reach its maturity. Moreover, nancial institutions can use timer options to overcome
the diculty of pricing the call and put options whose implied volatility is dicult
to quote. This situation usually happens in the markets where the implied volatility
data does not exist or is limited. In consideration of applications to portfolio insur-
ance, portfolio managers can use a timer put option on an index (or a well diversied
portfolio) to limit their downside risk. They might be interested in hedging speci-
cally against sudden market drops such as the crashes in 1987 and 2008. From the
Introduction to Part I 6
perspective of the nancial institutions who oer timer options, if there is a market
collapse, the sudden high volatility will cause the timer put options to be exercised
rapidly, thus, protecting and hedging the funds value. By contrast, European put
options do not have this feature. With a timer put option, some uncertainty about
the portfolios outcome is represented by uncertainty about the variable time horizon
(see Bick (1995) [8] for a similar discussion).
The Feller diusion (see [41]), also called square root diusion, is widely used in
mathematical nance due to its favorable properties and analytical tractability. The
earliest application of this process in the literature of nancial modeling can be found
in Cox et al. [25] for the term structure of interest rates. Heston (1993) [61] employed
Feller diusions to model stochastic volatility. As one of the most popular and widely
used stochastic volatility models, the variance process V
t
is assumed to follow the
stochastic dierential equation:
dV
t
= ( V
t
)dt +
v
_
V
t
dW
(1)
t
, (1.2)
where W
(1)
t
is a standard Brownian motion (in later chapters, we revisit this pro-
cess). Geman and Yor [52] advocate using a stochastic variance clock, which runs fast
if the volatility is high and runs slowly if the volatility is low, to model a non-constant
volatility and measure nancial time. Mathematically, the stochastic variance clock
time can be dened as the rst time the total realized variance achieves a certain
level b > 0, i.e.

b
= inf
_
u 0;
_
u
0
V
s
ds = b
_
. (1.3)
The distribution of the variance clock time
b
plays an important role. Geman and
Yor [52] give an explicit formula for this distribution under the Hull and White [62]
Introduction to Part I 7
model for stochastic volatility.
The problems of pricing, hedging and implementation of timer call options under
Hestons [61] stochastic volatility model motivates our research in the following chap-
ters. First of all, we formulate rigorously the timer call option valuation problem as a
rst-passage-time problem, via a standard no-arbitrage argument and the stochastic
representation of the solution to a Dirichlet problem. Motivated by this problem,
we apply the time-change technique to nd that the variance process, which is mod-
eled by Feller diusion, running on a variance clock, is equivalent in distribution to a
Bessel process with constant drift. In other words, we obtain a characterization of the
distribution of (
b
, V

b
). Further, we derive a joint density on Bessel processes and the
integration of its reciprocal via Laplace transform techniques. Applying these results,
we obtain a Black-Scholes-Merton type formula for pricing timer options. We also
investigate and compare several methods for implementation, including Monte Carlo
simulation, the alternating directional implicit scheme for partial dierential equa-
tions with dimension reduction, and the analytical formula implementation via the
Abate-Whitt (1992) algorithm (see [1]) on computing Laplace transform inversion
via Fourier series expansion. In the analytical formula implementation, a rotation
counting algorithm for correctly evaluating modied Bessel functions with complex
argument is applied. We propose a method for dynamically hedging timer call options
and discuss the computation of risk management parameters (price sensitivities). As
an extension, we tentatively consider the valuation of timer option under stochastic
volatility with jump models.
The organization of this part is as follows. In chapter 2, we formulate the perpet-
ual timer call option valuation problem as a rst-passage-time problem. In chapter
3, we investigate the connection between the Feller process and Bessel process with
Introduction to Part I 8
constant drift via variance clock time-change, and derive an explicit joint density on
Bessel processes which is needed for characterizing the distribution of interest. In
chapter 4, a Black-Scholes-Merton type formula for pricing timer options is derived
as an application of the results in previous chapters. In chapter 5, various imple-
mentation techniques and numerical results are presented. In chapter 6, a dynamic
hedging strategy and computation of price sensitivities are both discussed. A ten-
tative consideration of jumps combined with stochastic volatility in the valuation of
timer options is proposed in Appendix 10.
Chapter 2
Heston Model, Timer Option and a
First-Passage-Time Problem
2.1 Realized Variance and Timer Option
First, we recall the denition of realized variance. Let [0, T] (T > 0) be an investment
horizon. Let us dene t = T/n and suppose that the asset price is monitored at
t
i
= it, for i = 0, 1, 2, ..., n. According to the daily sampling convention, t is
usually chosen as 1/252 corresponding to the standard 252 trading days in a year.
Let S
t
denote the price process of the underlying stock (or index). The realized
variance for the period [0, T] is dened as

2
T
:=
1
(n 1)t
n1

i=0
_
log
S
t
i+1
S
t
i
_
2
.
9
Model and Problem 10
Next, we introduce the cumulative realized variance over time period [0, T] as
RV
T
= nt

2
T

n1

i=0
_
log
S
t
i+1
S
t
i
_
2
. (2.1)
Upon purchasing a timer call option, the investor species a variance budget
B =
2
0
T
0
,
where T
0
is an expected investment horizon, and
0
is the forecasted realized volatility
during the investment period. A timer call option pays o max(S
T
K, 0) at the
rst time T when the realized variance exceeds B, i.e. at the time
T := min
_
t
k
,
k

i=1
_
log
S
t
i
S
t
i1
_
2
B
_
. (2.2)
Similarly, a timer put option with strike K and variance budget B has a payo
max(K S
T
, 0). Without loss of generality, for the problem of valuation, we focus
on timer call options in this dissertation.
According to Hawkins and Krol (2008) [59], timer options are sometimes traded under
a nite time-horizon constraint in practice, by slightly modifying the denition for
the perpetual case explained in Sawyer (2008) [84]. This perpetuity can be regarded
as the limiting case of a long-time horizon constraint. Therefore, even for a timer
option with nite horizon, our investigation on the perpetual case may provide helpful
information for the analysis. In addition, our study motivates some new research in
stochastic analysis.
Model and Problem 11
2.2 Hestons Stochastic Volatility Model
Suppose that the asset S
t
and its instantaneous variance V
t
follow Hestons
stochastic volatility model (1993)[61]. In a ltered probability space (, P, (, (
t
),
the joint dynamics of S
t
and V
t
are specied as
dS
t
= S
t
dt +
_
V
t
S
t
dB
(2)
t
,
dV
t
= ( V
t
)dt +
v
_
V
t
dB
(1)
t
,
(2.3)
where (B
(1)
t
, B
(2)
t
) is a two-dimensional Brownian motion with instantaneous corre-
lation , i.e.,
dB
(1)
t
dB
(2)
t
= dt.
Here represents the return of the asset; is the speed of mean-reversion of V
t
; is
the long-term mean-reversion level of V
t
;
v
is a parameter reecting the volatility
of V
t
.
2.3 A First-Passage-Time Problem
We assume that the sampling is done continuously. Through quadratic variation
calculation in the model of (2.3), it is straightforward to nd that
lim
t0
m

i=1
_
log
S
t
i
S
t
i1
_
2
=
_
t
0
V
s
ds, a.s., (2.4)
where t = mt and t
i
= it. Thus, we dene
I
t
:=
_
t
0
V
s
ds
Model and Problem 12
as the continuous-time version of the cumulative realized variance over time period
[0, t]. This continous-time setting motivates the denition of the rst passage time:
:= inf
_
u 0;
_
u
0
V
s
ds = B
_
. (2.5)
Thus, is obviously a continuous time approximation of T as dened in (2.2). In
the continuous time setting, a timer call option is regarded as an option which pays
o max(S

K, 0) at the random maturity time . In the following exposition,


we represent the no-arbitrage price (in the sense which we explain momentarily)
of a timer call option as the so called risk neutral expectation of the discounted
payo. Therefore, the valuation problem becomes a rst-passage-time problem for
the cumulative realized variance process I
t
.
Timer options are traded in the over-the-counter market, where nancial instruments
such as stocks, bonds, commodities or derivatives are directly traded between parties.
The original underlying asset on which timer options are written and the variance
swap constitute a complete market. It follows that timer options can be priced ac-
cording to the no-arbitrage rule as we explain momentarily. In other words, we use
variance swaps as auxiliary hedging instruments. A variance swap is an actively
traded over-the-counter nancial derivative that allows one to speculate on or hedge
risks associated with the magnitude of volatility of some underlying product, such
as a stock index, exchange rate, or interest rate. One leg of the variance swap pays
an amount based on the realized variance of the return of the underlying asset (as
dened in (2.1)). The other leg of the swap pays a xed amount, which is called the
strike, quoted at the deals origination. Thus the net payo to the counterparties
is the dierence between the two legs and is settled in cash at the maturity of the
swap. Mathematically, the payo of a variance swap with maturity T and strike K
var
Model and Problem 13
is given by N
var
(RV
T
K
var
), where constant N
var
is called variance notional which
converts the payo into dollar terms. For the purpose of computation, we reasonably
approximate the payo by the continuous-time version of the realized variance as
dened in (2.4). Therefore, we have that
N
var
(RV
T
K
var
) N
var
__
T
0
V
s
ds K
var
_
. (2.6)
Demeter, et al (1999) [29] initiated the investigation of variance swaps. Broadie and
Jain (2008) [16] thoroughly studied the pricing and hedging of variance swaps under
Hestons (1993) stochastic volatility model.
To clarify our no-arbitrage pricing mechanism, we briey go over the notion of the
market price of volatility risk (also known as volatility risk premium) and Hestons
(1993) [61] original modeling assumption on its particular functional form. Hestons
(1993) [61] stochastic volatility model comes with the assumption that the market
price of volatility risk takes a special form as a linear function of volatility

V
t
.
According to Heston (1993), this judicious choice was motivated by the consumption-
based models proposed in Breeden (1979) [13] and the term structure model in Cox,
et al. (1985) [26]. Though this choice is arbitrary, it becomes a standard for both
academic and industrial research. A thorough comparison of the various specications
of the market price of volatility risk and a survey of their empirical estimation can
be found in Lee (2001) [73].
Under a slightly broader framework, we recapitulate Hestons (1993) original idea
as a necessary part of our current exposition. We follow the the presentation in
Gatheral (2007) [48] (see page 5-7). Let us consider an arbitrary derivative security
with payo of the form T
1
(S, V, I), where T
1
is a functional of (S
t
, V
t
, I
t
). For
Model and Problem 14
example, a European call option with maturity T and strike K has payo T
1
(S, V, I) =
max(S
T
K, 0). Because of the Markov property of (S
t
, V
t
, I
t
), we assume that the
price process of this security C
t
has the form
C
t
= u(t, S
t
, V
t
, I
t
), (2.7)
for some function u(t, s, v, x) : [0, ) R
3
+
R, which is of class C
1,2
. We similarly
consider a volatility-dependent security with payo of the form T
2
(V, I), where T
2
is
a functional of (V
t
, I
t
). For example, a variance swap with maturity T and strike
K
var
has payo T
2
(V, I) = N
var
(I
T
K
var
) as we explained in (2.6). Because of
the Markov property of (V
t
, I
t
), we assume that the price process of this volatility-
dependent security F
t
has the form
F
t
= f(t, V
t
, I
t
), (2.8)
for some function f(t, v, x) : [0, ) R
2
+
R, which is of class C
1,2
.
The Cholesky decomposition on the correlated Brownian motion (B
(1)
t
, B
(2)
t
) allows
us to rewrite Hestons model as
dS
t
= S
t
dt +
_
V
t
S
t
(dZ
(1)
t
+
_
1
2
dZ
(2)
t
),
dV
t
= ( V
t
)dt +
v
_
V
t
dZ
(1)
t
,
(2.9)
where (Z
(1)
t
, Z
(2)
t
) is a standard two-dimensional Brownian motion.
Next, we resort to a standard no-arbitrage argument to recast the notions of a market
price of volatility risk and risk-neutral; and, we return to the same argument momen-
tarily to formulate the timer option valuation problem. First, we construct a self-
Model and Problem 15
nancing portfolio with value process P
t
consisting of a share of C
t
= u(t, S
t
, V
t
, I
t
),

(1)
t
shares of the underlying asset with value S
t
and
(2)
t
shares of the variance
swap with value F
t
= f(t, V
t
, I
t
). We also assume that
(1)
t
and
(2)
t
both satisfy
technical conditions, such as adaptivity to the ltration (
t
and integrability. Thus,
P
t
= C
t

(1)
t
S
t

(2)
t
F
t
. (2.10)
Based on the self-nancing assumption and an a priori assumption that both functions
u and f are suciently smooth, we apply Itos formula and collect dt, dZ
(1)
t
and dZ
(2)
t
terms to obtain that
dP
t
= dC
t

(1)
t
dS
t

(2)
t
dF
t
=
_
_
u
t
+ ( V
t
)
u
v
+ S
t
u
s
+ V
t
u
x
+
1
2

2
v
V
t

2
u
v
2
+
1
2
S
2
t
V
t

2
u
s
2
+
v
S
t
V
t

2
u
sv
_

(1)
t
S
t

(2)
t
_
f
t
+ ( V
t
)
f
v
+ V
t
f
x
+
1
2

2
v
V
t

2
f
v
2
_
_
dt
+
_

_
V
t
S
t
_
u
s

(1)
t
_
+
v
_
V
t
_
u
v

(2)
t
f
v
__
dZ
(1)
t
+
_
1
2
_
V
t
S
t
_
u
s

(1)
t
_
dZ
(2)
t
.
(2.11)
To make this portfolio instantaneously risk-free in the sense that the randomness
induced by Brownian motion Z
(1)
t
, Z
(2)
t
vanishes, we let
u
s

(1)
t
= 0 (2.12)
in order to eliminate the dZ
(2)
t
risk, and let
u
v

(2)
t
f
v
= 0 (2.13)
Model and Problem 16
in order to eliminate the dZ
(1)
t
risk. In order to rule out arbitrage, the expected
return of this portfolio must be equal to the risk free rate r. Otherwise, investors
would always be in favor of a risk-free portfolio with a higher deterministic rate of
return; thus they can nd arbitrage opportunities (see Bjork (1999) [9], p. 93). Thus,
dP
t
=
_
u
t
+ ( V
t
)
u
v
+ V
t
u
x
+
1
2

2
v
V
t

2
u
v
2
+
1
2
S
2
t
V
t

2
u
s
2
+
v
S
t
V
t

2
u
sv
_
dt

(2)
t
_
f
t
+ ( V
t
)
f
v
+ V
t
f
x
+
1
2

2
v
V
t

2
f
v
2
_
dt
=rP
t
dt = r(C
t

(1)
t
S
t

(2)
t
F
t
)dt.
(2.14)
We assume that
u
v
,= 0 and
f
v
,= 0. It follows that
u
t
+ ( v)
u
v
+ v
u
x
+
1
2

2
v
v

2
u
v
2
+
1
2
s
2
v

2
u
s
2
+
v
sv

2
u
sv
=
u
v
f
v
_
f
t
+ ( v)
f
v
+ v
f
x
+
1
2

2
v
v

2
f
v
2
_
+ r
_
u
u
s
s
u
v
f
v
f
_
.
(2.15)
Collecting all u-terms to the left-hand side and all f-terms to the right-hand side, we
get
u
t
+ v
u
x
+
1
2

2
v
v

2
u
v
2
+
1
2
s
2
v

2
u
s
2
+
v
sv

2
u
sv
ru + rs
u
s
u
v
=
f
t
+ v
f
x
+
1
2

2
v
v

2
f
v
2
rf
f
v
.
(2.16)
This equation holds if and only if both sides equal a universal function h of indepen-
dent variables v and t. We follow the exposition in Gatheral [48] to denote
h(t, v) = [( v) (t, v)

v],
where the function (t, v) is dened as the market price of volatility risk.
REMARK 1. Indeed, we may employ a volatility-dependent asset, e.g. variance
Model and Problem 17
swap, to illustrate the notion of the market price of volatility risk. Since the variance
swap has no exposure to the risk induced by Z
(2)
t
, we focus on the volatility risk
exclusively. The innitesimal excess growth satises that
dF
t
rF
t
dt =
_
f
t
+ ( V
t
)
f
v
+ V
t
f
x
+
1
2

2
v
V
t

2
f
v
2
_
dt +
f
v

v
_
V
t
dZ
(1)
t
=
_
V
t
f
v
_
(t, V
t
)dt +
v
dZ
(1)
t
_
.
(2.17)
According to Gatheral (2006) [48], (t, v)dt represents the extra return per unit of
volatility risk
v
dZ
(1)
t
; and so, in analogy with the Capital Asset Pricing Model, is
known as the market price of volatility risk.
According to Heston (1993), could be determined by one volatility dependent asset
and then used to price all other securities. Motivated by the consumption-based
capital asset pricing models (see Due (2001) [32] or Karatzas and Shreve (1998)
[69]) proposed in Breeden (1979) [13] and the term structure model proposed in Cox,
et al. (1985) [26], Hestons (1993) stochastic volatility model is equipped with a
particular functional form of the market price of volatility risk:
(t, V
t
) =
_
V
t
. (2.18)
In other words, the market price of volatility risk (t, V
t
) is assumed to be proportional
to volatility

V
t
. This particular specication allows analytical tractability. This
choice becomes standard when the model is used for pricing derivatives. In the
following exposition, we denote = + and =

+
. Thus
h(t, v) = ( v).
Model and Problem 18
Therefore, the PDE governing the price function of a European call option with payo
maxS
T
K, 0 reads
u
t
+ ( v)
u
v
+ rs
u
s
+ v
u
x
+
1
2

2
v
v

2
u
v
2
+
1
2
s
2
v

2
u
s
2
+
v
sv

2
u
sv
ru = 0.
By the Feynman-Kac theorem (see Karatzas and Shreve (1991) [68]), the price admits
the following representation:
C
t
= u(t, S
t
, V
t
) = E
Q
[e
r(Tt)
max(S
T
K, 0)[(
t
]. (2.19)
Here Q is a probability measure under which
dS
t
= rS
t
dt +
_
V
t
S
t
(dW
(1)
t
+
_
1
2
dW
(2)
t
), S
0
= s,
dV
t
= ( V
t
)dt +
v
_
V
t
dW
(1)
t
, V
0
= v,
(2.20)
where (W
(1)
t
, W
(2)
t
) is a two-dimensional standard Brownian motion on the ltered
probability space (, Q, (, (
t
); r is the instantaneous interest rate assumed to be
constant; and are interpreted as the rate of mean-reversion and long-term reverting
level respectively under probability measure Q. According to Heston (1993), Q is
interpreted as a risk-neutral probability measure. Under this measure all derivative
securities, including timer options, written on (S
t
, V
t
, I
t
) are consistently priced
based on the no-arbitrage principle.
REMARK 2. The change-of-measure from P to Q is specied as
dQ
dP

Gt
= exp
_

_
t
0

1
(s)dZ
(1)
s

_
t
0

2
(s)dZ
(2)
s

1
2
_
t
0
[
1
(s)
2
+
1
(s)
2
]ds
_
,
(2.21)
Model and Problem 19
where

1
(t) =

v
_
V
t
,
2
(t) =
1
_
1
2
_
r

V
t

v
_
V
t
_
.
(2.22)
By Girsanovs theorem,
W
(1)
t
= Z
(1)
t
+
_
t
0

1
(s)ds,
W
(2)
t
= Z
(2)
t
+
_
t
0

2
(s)ds,
(2.23)
is a two-dimensional standard Brownian motion under probability measure Q. A more
general setting of change-of-measure for stochastic volatility models can be found in
Lee (2001) [73].
In this article, since we focus on the no-arbitrage pricing and hedging of timer op-
tions under Hestons (1993) model equipped with the particular assumption on the
functional form of market price of volatility risk as in (2.18), we do not intend to in-
vestigate the statistical measure and the specication of market price of volatility risk.
We also assume that the model is calibrated to some bench-marked derivative securi-
ties such as European options (see Heston (1993) [61]); and, that variance swaps are
priced as in Broadie and Jain (2008) [16]. Therefore, we perform no-arbitrage pricing
for timer options, a redundant security, in a complete market where the risk-neutral
measure Q is consistently xed. An alternative perspective is to regard timer options
as fundamental securities rather than path-dependent options in a complete market.
Karatzas and Li (2009, 2010) [67] tentatively suggest a super-hedging approach to
address the problem within an incomplete market environment. (see Karatzas and
Shreve (1998) [69], Karatzas and Cvitanic (1993) [27], Karatzas and Kou (1996) [66],
as well as Follmer and Schied (2004) [43], etc.) This provides opportunities for some
future research.
We are now in position to incorporate the random time and state the following
Model and Problem 20
proposition that formulates the timer option pricing problem as a rst-passage-time
problem.
PROPOSITION 1. In the sense of no-arbitrage, the timer call option with strike K
and variance budget B can be priced via the risk-neutral expectation of the discounted
payo, i.e.
C
0
= E
Q
[e
r
max(S

K, 0)], (2.24)
where
= inf
_
u 0,
_
u
0
V
s
ds = B
_
.
Proof. Let us assume C
t
= u(t, S
t
, V
t
, I
t
) introduced in (2.7) to be the price process of
a timer call option for any 0 t and some function u(t, s, v, x) : [0, )R
3
+
R,
which is of class C
1,2
; and regard F
t
= f(t, V
t
, I
t
) introduced in (2.8) as the price
process of a variance swap with maturity T
1
for some function f(t, v, x) : [0, )
R
2
+
R, which is of class C
1,2
. Thus, the price of a timer call option at time t
satises that
C
t
= u(t ; S
t
, V
t
, I
t
).
Without loss of generality, we focus on the time interval [0, T
1
]. We form a
self-nancing portfolio with value process P
t
which consists of a share of C
t
=
u(t, S
t
, V
t
, I
t
),
(1)
t
shares of the underlying asset with value S
t
and
(2)
t
shares
of the variance swap with value F
t
= f(t, V
t
, I
t
). We also assume that
(1)
t
and

(2)
t
both satisfy the technical conditions, such as adaptivity to the ltration (
t

and integrability. Thus,


P
t
= C
t

(1)
t
S
t

(2)
t
F
t
. (2.25)
Based on Hestons assumption of the particular form of market price of volatility risk
(see (2.18)), the same no-arbitrage argument on making the portfolio P
t
risk-free (see
Model and Problem 21
(2.25)) yields the PDE governing the timer option pricing function u(t, s, v, x):
u
t
+(v)
u
v
+rs
u
s
+v
u
x
+
1
2

2
v
v

2
u
v
2
+
1
2
s
2
v

2
u
s
2
+
v
sv

2
u
sv
ru = 0, (2.26)
for (t, s, v, x) [0, +)[0, +)(0, +)(0, B], with a boundary value condition:
u(t, s, v, B) = maxs K.
The Feynman-Kac theorem (see Shreve (2004) [85] or a stronger version in Karatzas
and Shreve (1991) [68]) suggests a candidate solution to PDE (2.26) as follows:
u(t , s, v, x) := E
Q
[e
r(t)
max(S

K, 0)[S
t
= s, V
t
= v, I
t
= x], (2.27)
where the Q-dynamics of Hestons model follows
dS
t
= rS
t
dt +
_
V
t
S
t
(dW
(1)
t
+
_
1
2
dW
(2)
t
), S
0
= s;
dV
t
= ( V
t
)dt +
v
_
V
t
dW
(1)
t
, V
0
= v,
(2.28)
where (W
(1)
t
, W
(2)
t
) is a two-dimensional standard Brownian motion on the ltered
probability space (, Q, (, (
t
).
Indeed, because the stochastic dierential equation governing (S
t
, V
t
, I
t
) admits a
unique weak solution in the sense of probability law, the theory of martingale problem
(see Stroock and Varadhan (1969) [87, 88] or section 5.4 of Karatzas and Shreve (1991)
[68]) guarantees that the time-homogenous diusion (S
t
, V
t
, I
t
) enjoys the strong
Markov property. Therefore, we have that
u(t , S
t
, V
t
, I
t
) = E
Q
[e
r(t)
max(S

K, 0)[(
t
]. (2.29)
Model and Problem 22
We notice that e
rt
u(t, S
t
, V
t
, I
t
) is a martingale adapted to the ltration

(
t
, where

(
t
= (
t
. A straightforward application of Itos lemma suggests that
e
rt
u(t , S
t
, V
t
, I
t
)
=u(0, S
0
, V
0
, I
0
) +
_
t
0
e
r
_
V

_
S

u
s
+
v
u
v
_
(, S

, V

, I

)dW
(1)

+
_
t
0
_
1
2
e
r
_
V

u
s
(, S

, V

, I

)dW
(2)

+
_
t
0
e
r
_
u
t
+ ( V

)
u
v
+ rS

u
s
+ V

u
x
+
1
2

2
v
V

2
u
v
2
+
1
2
S
2

2
u
s
2
+
v
S

2
u
sv
ru
_
(, S

, V

, I

)d
(2.30)
In order to make (2.30) a

(
t
-martingale, the Lebesgue integral term must vanish.
Therefore, the PDE (2.26) is satised. It is also obvious that u(t, s, v, B) = maxs
K, 0.
Thus, on t < , the timer call option price process C
t
satises that
dC
t
= rC
t
dt +
_
V
t
_
S
t
u
s
+
v
u
v
_
dW
(1)
t
+
_
1
2
u
s
_
V
t
S
t
dW
(2)
t
. (2.31)
From (2.20), (2.17) and (2.31), we see that e
rt
C
t
, e
rt
S
t
and e
rt
F
t

are all Q-martingales. Thus, Q serves as a risk-neutral probability measure. There-


fore, by the fundamental theorem of asset pricing (see Harrison and Pliska [57, 58]
or section 5.4 of Shreve (2004) [85]), the market consisting of (S
t
, F
t
, C
t
) is free of
arbitrage. With the initial capital C
0
= u(0, S
0
, V
0
, I
0
), the timer call option can be
dynamically replicated via the following strategy (we return to this point in chapter
6):

(1)
t
=
u
s
(t, S
t
, V
t
, I
t
),
(2)
t
=
u
v
_
f
v
(t, S
t
, V
t
, I
t
).
Model and Problem 23
Hence, u(t , S
t
, V
t
, I
t
) reasonably prices the timer call option in the sense
that the whole market is arbitrage free and the timer call option can be replicated
dynamically using a self-nancing portfolio.
Let us denote

x
:= inf
_
u 0;
_
u
0
V
s
ds = B x
_
. (2.32)
By the representation in (2.27) and the time homogeneity property of diusion S
t
, V
t
, I
t
,
we obtain that
u(t , s, v, x) =E
Q
[e
rx
max(S
x+t
K, 0)[S
t
= s, V
t
= v, I
t
= x]
E
Q
[e
rx
max(S
x
K, 0)[S
0
= s, V
0
= v, I
0
= x].
(2.33)
We notice that the right-hand-side in the expression (2.33) is independent of t. Thus,
we have that
u
t
= 0,
which results in a Dirichlet problem for u(s, v, x):
( v)
u
v
+ rs
u
s
+ v
u
x
+
1
2

2
v
v

2
u
v
2
+
1
2
s
2
v

2
u
s
2
+
v
sv

2
u
sv
ru = 0,
u(s, v, B) = maxs K, 0.
(2.34)
Therefore, by letting x = 0 in (2.33), the initial timer call option price is represented
as the risk-neutral expectation of the discounted payo, i.e.
C
0
= E
Q
[e
r
max(S

K, 0)], (2.35)
where
= inf
_
u 0,
_
u
0
V
s
ds = B
_
. (2.36)
Model and Problem 24
Indeed, we have the following result regarding the uniqueness of the price. Similar to
our discussion on timer call options, we denote w(t, s, v, x) the the price function of
a timer put option with payo max(K

, 0) (K

> 0).
PROPOSITION 2. The price of a timer call option with payo max(S

K, 0) can
be uniquely represented by
u(t , S
t
, V
t
, I
t
) = E
Q
[e
r(t)
max(S

K, 0)[(
t
]; (2.37)
the price of a timer put option with payo max(K

, 0) can be uniquely represented


by
w(t , S
t
, V
t
, I
t
) = E
Q
[e
r(t)
max(K

, 0)[(
t
]. (2.38)
We give a sketch of the proof here. we start from the timer put options whose payo
are bounded. By the same no arbitrage argument, we obtain the PDE governing the
timer put option pricing function w(t, s, v, x):
w
t
+(v)
w
v
+rs
w
s
+v
w
x
+
1
2

2
v
v

2
w
v
2
+
1
2
s
2
v

2
w
s
2
+
v
sv

2
w
sv
rw = 0, (2.39)
for (t, s, v, x) [0, +)[0, +)(0, +)(0, B], with a boundary value condition:
w(t, s, v, B) = maxK

s.
Because of the time value, the price of the time put option must be bounded by K

,
i.e.
0 < w(t , s, v, x) K

.
Model and Problem 25
Following the same reasoning as before, we obtain a candidate solution to the PDE
boundary value problem 2.39:
w(t , S
t
, V
t
, I
t
) = E
Q
[e
r(t)
max(K

, 0)[(
t
]. (2.40)
Because of the upper bound of w, we have that
w(t, S
t
, V
t
, I
t
) w(t, S
t
, V
t
, I
t
) = E
Q
[e
r(t)
max(K

, 0)[(
t
].
(2.41)
This uniqueness can be justied using the Theorem 5.7.6 in Karatzas and Shreve
(1988) [68]. Similarly, because of
maxS

K, 0 = maxK S

, 0 + S

K,
the timer call option can be replicated by a combination of a timer put option, the
underlying stock and a contract paying xed value K at . Therefore, the no-arbitrage
price of the timer call option must admits the representation:
u(t , S
t
, V
t
, I
t
) = E
Q
[e
r(t)
max(S

K, 0)[(
t
]. (2.42)
REMARK 3. The argument after the PDE (2.26) for proving (2.24) can be alter-
natively carried out as follows. We recall that the timer options considered in this
dissertation are perpetual in the sense that its maturity depends only on the rst
time when the variance budget is exhausted. By the denition of timer options, given
any arbitrary variance budget B, exhausted realized variance I and starting states of
S and V , the timer option price function u(t, s, v, x) is essentially independent of the
Model and Problem 26
initial time t. In other words, for any t
1
> t
2
> 0 and 0 < x < B, we have that
u(t
1
, s, v, x) = u(t
2
, s, v, x). (2.43)
Therefore, we have that
u
t
= 0,
which simplies the original parabolic PDE (2.26) for pricing timer option to an
elliptic equation. Considering a boundary condition on the plane:
= (
1
,
2
, B),
1
R,
2
R,
we obtain the following Dirichlet problem:
( v)
u
v
+ rs
u
s
+ v
u
x
+
1
2

2
v
v

2
u
v
2
+
1
2
s
2
v

2
u
s
2
+
v
sv

2
u
sv
ru = 0,
u(s, v, B) = maxs K, 0.
(2.44)
For 0 < x < B,
x
dened in (2.32) is the rst time when the three dimensional
diusion process
x
t
, where
x
t
= (S
t
, V
t
, I
t
+x), exits the domain D = R
+
R
+

[0, B], i.e.

x
= inf u 0;
x
u
D
c
= inf
_
u 0;
_
u
0
V
s
ds = B x
_
.
From the relation between the Dirichlet problem and the stochastic dierential equa-
tions (see section 5.7 of Karatzas and Shreve [68]), we obtain a stochastic represen-
tation of the solution to (2.34):
u(t, s, v, x) = u(v, s, x) = E
Q
_
e
rx
max(S
x
K, 0)

, (2.45)
Model and Problem 27
Hence, the initial timer call option price is represented as the risk-neutral expectation
of the discounted payo, i.e.
C
0
= E
Q
[e
r
max(S

K, 0)], (2.46)
where
= inf
_
u 0,
_
u
0
V
s
ds = B
_
. (2.47)
Chapter 3
Feller Diusion, Bessel Process and
Variance Clock
In this chapter, we present a characterization of the joint distribution of variance clock
time (1.3) and variance via a Bessel process with constant drift. We also explicitly
derive a joint density on Bessel processes. These theoretical results are applied in the
problem of timer option valuation. In the following exposition, we make a modeling
assumption that the Feller condition 2
2
v
0 holds. According to Going-Jaeschke
and Yor (1999) [54], zero is an unattainable point for the variance process V
t
under
the Feller condition. This can be seen from the Fellers test (see Karatzas and Shreve
(1991) [68], section 5.5). If the Heston model is calibrated to the timer option price
data using our analytical results, this parameter assumption should be included.
28
Feller Diusion, Bessel Process and Variance Clock 29
3.1 Connect Feller Diusion and Bessel Process by
Variance Clock
Motivated by the problem of pricing timer options, it is natural to investigate the joint
distribution of (V

, ). It turns out that the Feller diusion running on the variance


clock is equivalent in distribution to a Bessel process with constant drift, and that
the variance clock time is equivalent in distribution to an integration functional on
this Bessel process.
THEOREM 1. For any B > 0, under the risk neutral probability measure Q, we
have a distributional identity for the bivariate random variable (V

, ):
(V

, ) =
law
_

v
X
B
,
_
B
0
ds

v
X
s
_
, (3.1)
where is dened in (2.5) and V
t
is dened in (2.20). Here X
t
is a Bessel process
with index =

2
v

1
2
(dimension =
2

2
v
+ 1) and constant drift =

v
, which is
governed by SDE:
dX
t
=
_

2
v
X
t

v
_
dt + d

B
t
, X
0
=
V
0

v
, (3.2)
where

B
t
is a standard one dimensional Brownian motion.
REMARK 4. For any 2, -dimensional Bessel process BES

is a diusion
process 1
t
which serves as the unique strong solution to SDE:
d1
t
=
1
21
t
dt + dJ(t), 1
0
= r 0, (3.3)
where J(t) is a standard Brownian motion. Alternatively, we denote this Bessel
process BES
()
, where = /21 is dened as its index. For any R, we similarly
Feller Diusion, Bessel Process and Variance Clock 30
dene BES

, the -dimensional Bessel process with drift , by a diusion process


1

t
which serves as the unique strong solution to SDE:
d1

t
=
_
1
21

t
+
_
dt + dJ(t), 1

0
= r

0. (3.4)
Also, we denote this Bessel process with drift BES
()

, where = /21 is dened as


its index. For more detailed studies on Bessel process and Bessel process with drift,
readers are referred to Revuz and Yor (1999) [83], Karatzas and Shreve (1991) [68]
as well as Linetsky (2004) [74].
Because of our assumption about the Feller condition 2
2
v
0 for V
t
, the
dimension and index of Bessel process with drift satises that
=

2
v

1
2
0 and =
2

2
v
+ 1 2.
According to Linetsky (2004) [74], zero is unattainable for process X
t
in this case.
Proof. Let

t
= inf
_
u 0,
_
u
0
V
s
ds = t
_
,
For M
t
=
_
t
0

V
s
dW
(1)
s
, we apply Dubins-Dambis-Schwarz theorem of local martin-
gale representation via time changed Brownian motion (see Karatzas and Shreve [68]).
We obtain that
M(
t
) =
_
t
0
_
V
s
dW
(1)
s
= B
t
,
where B
t
is a standard one dimensional Brownian motion. Because f(u) =
_
u
0
V
s
ds
is an increasing C
1
function, it is easy to nd that

t
=
_
t
0
1
V
s
ds.
Feller Diusion, Bessel Process and Variance Clock 31
Thus
V
t
= V
0
+
_
t
0
( V
s
)ds +
v
_
t
0
_
V
s
dW
(1)
s
.
Therefore, we see that
V
t
= V
0
+
_
t
0
( V
s
)
V
s
ds +
v
B
t
.
By letting X
t
=
V
t
v
, we have that
X
t
=
V
0

v
+
_
t
0
_

2
v
X
u

v
_
du +B
t
. (3.5)
Thus,
V

= V

B
=
v
X
B
,
=
B
=
_
B
0
ds
V
s
=
_
B
0
ds

v
X
s
.
(3.6)
Hence, the identity (3.1) is justied by the uniqueness of the solution to SDE (3.2).
3.2 A Joint Density on Bessel Process
The Bessel process with constant drift can be closely related to a standard Bessel
process via change-of-measure. In this section, we present and derive two equivalent
expressions of a joint density on standard Bessel processes which are applied in the
analytical valuation of timer option. Based on the transition density of Bessel pro-
cesses with drift obtained in Linetsky (2004) [74], we employ the technique of Laplace
transform inversion and change of measure to derive the rst expression in Theorem
2. Based on a joint density on Bessel with exponential stopping in Borodin and
Salminen (2001) [12], we present an alternative expression of our density in Theorem
3 via inverse Laplace transform on the time variable.
Feller Diusion, Bessel Process and Variance Clock 32
3.2.1 The First Expression of the Density
THEOREM 2. For Bessel process R
t
with index 0 and any positive real
number B , the joint density
p(x, t)dxdt := P
0
_
R
B
dx,
_
B
0
du
R
u
dt
_
, (3.7)
admits the following analytical representation:
p(x, t) =
2

_

0
cos(t)Re (i[x) d, (3.8)
where
([x) = exp
_

1
2

2
2
B +
2
(R
0
x)
_
p

2
(B; R
0
, x)
p
0
(B; R
0
, x)
, (3.9)
with

2
=

_
+
1
2
_.
Here, p

(t; x, y) is the transition density of a Bessel process with drift and index ,
i.e.
p

(t; x, y) =
1
2
_
+
0
e

1
2
(
2
+
2
)t
_
y
x
_
+
1
2
e
(yx)+

M
i

,
(2ix)M
i

,
(2iy)

_
1
2
+ + i

_
(1 +)

2
d.
(3.10)
And, p
0
(t; x, y) is the transition density of the standard Bessel process with the index
, i.e.
p
0
(t; x, y) =
1
t
_
y
x
_

y exp
_
(x
2
+ y
2
)
2t
_
I

_
xy
t
_
, (3.11)
Feller Diusion, Bessel Process and Variance Clock 33
where I

(z) is the modied Bessel function of the rst kind with index dened by
I

(z) =
+

k=0
(
z
2
)
+k
k!( + k + 1)
.
REMARK 5. (The Conuent Hypergeometric Functions)
In Theorem 2, () is the gamma function and M
,
() is the Whittaker function re-
lated to Kummer conuent hypergeometric function (see Buchholz [18]). The Whit-
taker function can be dened as
M
,
(z) = z
+
1
2
e

z
2
M
_
+
1
2
, 1 + 2; z
_
,
where
M(a, b, ; z) =

n=0
(a)
n
(b)
n
z
n
n!
is the Kummer conuent hypergeometric function and
(a)
n
= a(a + 1) (a + n 1), (a)
0
= 1
is the Pochhammer symbol which is also regarded as rising factorial. When a = b,
1
F
1
(a, b, ; z) is exactly e
z
. As an entire function, it resembles the exponential function
on the complex plane.
To prove Theorem (2), we start with an absolute continuity relation between Bessel
processes with dierent constant drifts.
LEMMA 1. (Absolute Continuity Between Bessel Process with Dierent
Drifts)
We suppose that the stochastic process
t
follows the law of BES
()

1
( 0) on a
Feller Diusion, Bessel Process and Variance Clock 34
ltered probability space (, P

1
, T, T
t
). Under probability measure P

2
dened by
dP

Ft
= exp
_
(
1

2
)(
0

t
) + (
1

2
)
_
t
0
2 + 1
2
s
ds +
1
2
(
2
1

2
2
)t
_
dP

Ft
,

t
follows the law of BES
()

2
.
Proof. Let
t
be a standard Brownian motion on ltered probability space (, P, T, T
t
).
Thus, the unique strong solution of the stochastic integral equation

t
=
0
+
_
t
0
2 + 1
2
s
ds +
t
follows the law of a BES
()
. Let P

1
be a new probability measure dened by
dP

Ft
= exp
_

1
2

2
1
t
_
dP

Ft
.
By Girsanovs theorem,

(1)
t
=
t

1
t
is a standard Brownian motion under probability measure P

1
. Thus, we obtain a
Bessel process
t
with index and drift
1
governed by the stochastic integral
equation:

t
=
0
+
_
t
0
_
2 + 1
2
s
+
1
_
ds +
(1)
t
.
By algebraic computation, it follows that
dP

Ft
= exp
_
(
1

2
)(
0

t
) + (
1

2
)
_
t
0
2 + 1
2
s
ds +
1
2
(
2
1

2
2
)t
_
dP

Ft
,
Feller Diusion, Bessel Process and Variance Clock 35
which is equivalent to
dP

Ft
= exp
_
(
1

2
)
1
t

1
2
(
1

2
)
2
t
_
dP

Ft
.
Therefore,
dP

Ft
= exp
_

1
2

2
2
t
_
dP

Ft
.
Again, by Girsanovs theorem,

(2)
t
=
t

2
t
is a Brownian motion under probability measure P

2
. Thus, it follows that

t
=
0
+
_
t
0
_
2 + 1
2
s
+
2
_
ds +
(2)
t
.
Therefore, under probability measure P

2
, the process
t
follows the law of BES
()

2
.
Next, we derive a Laplace transform of an integral functional of Bessel bridge in order
to characterize the conditional distribution of
_
t
0
du
Ru
given R
t
= x.
LEMMA 2. (A Laplace Transform for an Integral Functional of the Bessel
Bridge)
E

1
R
0
_
exp
_

_
t
0
du
R
u
_

R
t
= x
_
= exp
_

1
2
(
2
1

2
2
)t (
1

2
)(R
0
x)
_
p

2
(t; R
0
, x)
p

1
(t; R
0
, x)
,
(3.12)
where p

i
(t; R
0
, x) is the transition density of the Bessel process with index 0 and
Feller Diusion, Bessel Process and Variance Clock 36
drift
i
, for i = 1, 2. Here
1
and
2
are related by

2
=
1
+

+
1
2
, > 0.
E

1
R
0
denotes the expectation associated with probability measure P

1
R
0
under which R
t

is a Bessel process with constant drift


1
.
Proof. By applying Lemma 1 and conditioning, we deduce that
p

2
(t; R
0
, x) =
d
dy
_
P

2
R
0
(R
t
y)

=
d
dy
_
E

1
R
0
1R
t
y exp
_
(
1

2
)(R
0
R
t
) + (
1

2
)
_
t
0
2 + 1
2R
s
ds +
1
2
(
2
1

2
2
)t
__
=
d
dy
_
_
y
0
E

1
R
0
_
exp
_
(
1

2
)(R
0
z) + (
1

2
)
_
t
0
2 + 1
2R
s
ds +
1
2
(
2
1

2
2
)t
_

R
t
= z
_
P

1
R
0
(R
t
dz)
_
=E

1
R
0
_
exp
_
(
1

2
)(R
0
y) + (
1

2
)
_
t
0
2 + 1
2R
s
ds +
1
2
(
2
1

2
2
)t
_

R
t
= x
_
p

1
(t; R
0
, x).
(3.13)
Let = (
1

2
)
2+1
2
, i.e.

2
=
1
+

+
1
2
, > 0.
We obtain the conditional Laplace transform
E

1
R
0
_
exp
_

_
t
0
du
R
u
_

R
t
= x
_
= exp
_

1
2
(
2
1

2
2
)t (
1

2
)(R
0
x)
_
p

2
(t; R
0
, x)
p

1
(t; R
0
, x)
.
(3.14)
Feller Diusion, Bessel Process and Variance Clock 37
Based on the knowledge of transition density of Bessel process with constant drift
(see Linetsky [74]), we invert the Laplace transform (3.12) to nd the density p(x, t).
We state a useful lemma as follows.
LEMMA 3. (Inverting Moment Generating Function of A Nonnegative
Random Variable)
Suppose Y is a nonnegative random variable with moment generating function (s) =
Eexp(sY ). Its probability density function can be represented by
f(x) =
2

_

0
cos(x)Re (i) d,
while its probability cumulative function is
F(x) =
2

_

0
sin(x)

Re (i) d.
This Lemma and its proof can be found in Abate and Whitt (1992) [1]. We are now
in position to prove Theorem 2.
Proof. We follow the setting and notations in Lemma 2. By letting
1
= 0, t = B
and denoting the right-hand side of Laplace transform (3.12) ([x), we deduce that
([x) = exp
_

1
2

2
2
B +
2
(R
0
x)
_
p

2
(B; R
0
, x)
p
0
(B; R
0
, x)
, (3.15)
where

2
=

+
1
2
, for all > 0.
Feller Diusion, Bessel Process and Variance Clock 38
We obtain the conditional density
P
0
__
B
0
ds
R
s
dt

R
B
= x
_
=
2

_

0
cos(t)Re (i[x) d. (3.16)
The joint density is therefore
P
0
__
B
0
ds
R
s
dt, R
B
dx
_
=P
0
__
B
0
ds
R
s
dt

R
B
= x
_
P
0
(R
B
dx)
=
2

_

0
cos(t)Re (i[x) ddxdt.
(3.17)
Combining all the above steps and the knowledge of the transition density of Bessel
processes with constant drift (see Linetsky [74]), we justify Theorem 2.
3.2.2 The Second Expression of the Density
Based on a joint density on Bessel process with exponential stopping in Borodin and
Salminen (2001) [12], we present the second expression in Theorem 3 via inverse
Laplace transform on the time variable as follows.
THEOREM 3. For Bessel process R
t
with index 0 and any positive real
number B, the joint density
p(x, t)dxdt := P
0
_
R
B
dx,
_
B
0
du
R
u
dt
_
, (3.18)
Feller Diusion, Bessel Process and Variance Clock 39
admits the following analytical representation:
p(x, t) =
2e
B

_

0
cos(By)Re
__

2x
+1
X

0
sinh
_
t
_

2
_ exp
_
(X
0
+ x)

2coth
_
t
_

2
__
I
2
_
_
_
2

2X
0
x
sinh
_
t
_

2
_
_
_
_
_

=+iy
_
dy, for any > 0.
(3.19)
We briey justify this result. First of all, the following result (see Borodin and
Salminen [12]) exhibits a joint distribution on Bessel process and the integration
functional of its reciprocal stopped at an independent exponential time.
LEMMA 4. Suppose that X
t
is a Bessel process with index 0 and T is an
independent exponential time with intensity . We have that
P
0
_
X
T
dx,
_
T
0
du
X
u
dt
_
=

2x
+1
X

0
sinh
_
t
_

2
_ exp
_

(X
0
+ x)

2cosh
_
t
_

2
_
sinh
_
t
_

2
_
_

_
I
2
_
_
_
2

2X
0
x
sinh
_
t
_

2
_
_
_
_
dxdt.
(3.20)
We document the proof of this result in Appendix 10. The exponential stopping is
equivalent to the Laplace transform on time in the following sense.
P
0
_
X
T
dx,
_
T
0
du
X
u
dt
_
=
_
+
0
e
s
P
0
_
X
s
dx,
_
s
0
du
X
u
dt
_
ds (3.21)
Thus, we are in position to invert this Laplace transform to obtain the joint density
at any xed time. We need to employ a damping factor to ensure the integrability of
Feller Diusion, Bessel Process and Variance Clock 40
the transformed function. According to Abate and Whitt (1992) [1], we spell out the
following lemma.
LEMMA 5. Let (s) =
_
+
0
e
sx
f(x)dx denote the single-sided Laplace transform
of function f(x), the Bromwich integral for inverting Laplace transform satises
f(t) =
1
2i
_
+i
i
e
st
(s)ds =
2e
t

_
0
Re(( + iy)) cos(ty)dy,
where R
+
is chosen so as to ensure that (s) has no singularities on or to the
right of it.
Hence, the joint density (3.19) follows directly. Thus, the proof of Theorem 3 is
complete.
Chapter 4
A Black-Scholes-Merton Type
Formula for Pricing Timer Option
As an application of the theoretical results on Feller diusions and Bessel processes in
previous chapters, a Black-Scholes-Merton type formula for pricing timer call option
is presented in this chapter.
4.1 A Black-Scholes-Merton Type Formula for Pric-
ing Timer Option
THEOREM 4. Under Hestons (1993) stochastic volatility model (2.20), the price
of a timer call option (represented as (2.24)) with strike K and variance budget B
admits the following analytical formula:
C
0
= ((S
0
, K, r, , V
0
, , ,
v
, B; d
0
, d
1
, d
2
) = S
0

1
K
2
,
(4.1)
41
A Black-Scholes-Merton Type Formula 42
where

i
=
_

0
_

0

i
_

v
x,
t

v
_
p(x, t)dxdt, for i = 1, 2. (4.2)
Here,

1
(v, ) = N(d
1
(v, )) exp
_
d
0
(v, ) +

2
v
(V
0
v) +

2

2
v


2
2
2
v
B
_
;

2
(v, ) = N(d
2
(v, )) exp
_
r +

2
v
(V
0
v) +

2

2
v


2
2
2
v
B
_
,
(4.3)
N(x) =
1

2
_
x

u
2
2
du,
and
d
0
(v, ) =

v
(v V
0
+ B)
1
2

2
B,
d
1
(v, ) =
1
_
(1
2
)B
_
log
_
S
0
K
_
+ r +
1
2
B(1
2
) + d
0
(v, )
_
,
d
2
(v, ) =
1
_
(1
2
)B
_
log
_
S
0
K
_
+ r
1
2
B(1
2
) + d
0
(v, )
_
,
(d
2
(v, ) = d
1
(v, )
_
(1
2
)B).
(4.4)
Here, p(x, t) is the explicit joint density in Theorem 2 or Theorem 3 with =

2
v

1
2

0.
In order to prove Theorem 4, we begin with a conditional Black-Scholes-Merton type
formula. By conditioning on the variance path V
t
, we obtain the following propo-
sition.
PROPOSITION 3.
C
0
= E
Q
[S
0
e
d
0
(V ,)
N(d
1
(V

, )) Ke
r
N(d
2
(V

, ))],
(4.5)
A Black-Scholes-Merton Type Formula 43
where
N(x) =
1

2
_
x

u
2
2
du,
and
d
0
(v, ) =

v
(v V
0
+ B)
1
2

2
B,
d
1
(v, ) =
1
_
(1
2
)B
_
log
_
S
0
K
_
+ r +
1
2
B(1
2
) + d
0
(v, )
_
,
d
2
(v, ) =
1
_
(1
2
)B
_
log
_
S
0
K
_
+ r
1
2
B(1
2
) + d
0
(v, )
_
.
(4.6)
REMARK 6. When = 0,
v
= 0, = 0, we have only one Brownian motion
W
(2)
t
, which drives the asset process. In this case, the variance V
t
= V
0
is constant
and
dS
t
= rS
t
dt +
_
V
0
S
t
dW
(2)
t
.
For B = V
0
T, it is easy to see that = T. Thus
S

= S
T
= S
0
exp
_
rT
1
2
B +

BZ
_
.
It is obvious that d
0
= 0; d
1
and d
2
agree with the Black-Scholes-Merton [10] case,
i.e.
d
1
=
1

V
0
T
_
log
_
S
0
K
_
+
_
r +
1
2
V
0
_
T
_
,
d
2
=
1

V
0
T
_
log
_
S
0
K
_
+
_
r
1
2
V
0
_
T
_
.
(4.7)
Therefore, the price of the timer call option with variance budget B = V
0
T coincides
with the Black-Scholes-Merton (see Black and Scholes [10] and Merton [79]) price of
a call option with maturity T and strike K. That is
BSM(S
0
, K, T,
_
V
0
, r) = S
0
N(d
1
) Ke
rT
N(d
2
).
A Black-Scholes-Merton Type Formula 44
We present a proof of Proposition 3 as follows.
Proof. (Proof of Proposition 3)
We begin by representing the system (2.20) as
S
t
= S
0
exp
_
rt
1
2
_
t
0
V
s
ds +
_
t
0
_
V
s
dW
(1)
s
+
_
1
2
_
t
0
_
V
s
dW
(2)
s
_
,
V
t
= V
0
+ t
_
t
0
V
s
ds +
v
_
t
0
_
V
s
dW
(1)
s
.
(4.8)
Conditioning on V

and is equivalent to xing the whole path of the variance process


as well as the driving Brownian motion W
(1)
. On the conditioned probability space,
within which the variance path V
t
is xed, we can regard

V
s
as a deterministic
function. Thus, we obtain, after some straightforward algebraic computations,
(S

[ = t, V

= v) =
law
S
0
exp
_
N
_
rt
1
2
B +

v
(v V
0
t + B), (1
2
)B
__
,
(4.9)
where N(,
2
) represents a normal variable with mean and variance
2
. For
simplicity, let us denote
p = r
1
2
B +

v
(V

V
0
+ B), q =
_
(1
2
)B. (4.10)
Thus,
C
0
= E
Q
_
E
Q
_
e
r
maxS

K, 0[V

,
_
= E
_
e
r
maxS
0
expp + qZ K, 0

,
(4.11)
where the previous expectation, and hereafter in this proof, is taken under the con-
ditional probability measure (Q[V

, ). It follows that
A Black-Scholes-Merton Type Formula 45
E
_
e
r
maxS
0
expp + qZ K, 0

=e
r
E[(S
0
expp + qZ K)1S
0
expp + qZ K]
=e
r
S
0
E
_
expp + qZ1
_
Z
1
q
_
log
_
K
S
0
_
p
___
e
r
KE1
_
Z
1
q
_
log
_
K
S
0
_
p
__
,
(4.12)
Thus, Proposition 3 follows the straightforward calculation of the above two terms
based on the standard normal distribution.
Let us recall that, for any B > 0 which represents the variance budget,
= inf
_
u 0,
_
u
0
V
s
ds = B
_
.
Theorem 1 states that, under the risk neutral probability measure Q,
(V

, ) =
law
_

v
X
B
,
_
B
0
ds

v
X
s
_
, (4.13)
where X
t
is a Bessel process with constant drift governed by SDE:
dX
t
=
_

2
v
X
t

v
_
dt + d

B
t
, X
0
=
V
0

v
.
In the following steps, we change the probability measure to identify a standard Bessel
process, which is well studied (see Revuz and Yor (1999) [83]). Then, we apply the
explicit joint density in Theorem 2 or Theorem 3 to obtain the analytical pricing
formula in Theorem 4.
A Black-Scholes-Merton Type Formula 46
PROPOSITION 4. Under the probability measure P
0
where
dQ
dP
0

Ft
= exp
_

v
_
V
0

v
X
t
_
+

v
_
t
0

2
v
X
s
ds
1
2
_

v
_
2
t
_
, (4.14)
we have
(V

, ) =
law
_

v
X
B
,
_
B
0
ds

v
X
s
_
.
Here, X
t
is a standard Bessel process which is governed by SDE:
dX
t
=

2
v
X
t
dt + d

B
t
, X
0
=
V
0

v
, (4.15)
The timer call option price admits the following representation:
C
0
= E
P
0

v
X
B
,
_
B
0
ds

v
X
s
_
, (4.16)
where
(v, ) = S
0

1
(v, ) K
2
(v, ).
(4.17)
Here, functions
1
and
2
are given in Theorem 4.
Proof. Let

B
t
=

B
t

v
t.
Under a new probability measure P
0
, where
dP
0
dQ

Ft
= exp
_

B
t

1
2
_

v
_
2
t
_
,
A Black-Scholes-Merton Type Formula 47

B
t
is a standard Brownian motion. It obvious that
dQ

Ft
= exp
_

v
_
V
0

v
X
t
_
+

v
_
t
0

2
v
X
s
ds
1
2
_

v
_
2
t
_
dP
0

Ft
.
Therefore, under measure P
0
, X
t
is a standard Bessel process satisfying
dX
t
=

2
v
X
t
dt + d

B
t
, X
0
=
V
0

v
.
Combining with Theorem 2, we complete the proof of Theorem 4.
4.2 Reconcilement with the Black-Scholes-Merton
(1973)
An idea similar to timer options can be traced back to Bick (1995) [8], which proposed
a quadratic variation based and model-free portfolio insurance strategy to synthesize
a put-like protection with payo maxK

e
r
S

, 0 for some K

> 0. This strat-


egy avoids the problem of volatility mis-specication in the traditional put-protection
approach. Dupire (2005) [39] applies this similar idea to the business time delta
hedging of volatility derivatives under the assumption that the interest rate is zero.
Working under a general semi-martingale framework, Carr and Lee (2009) [21] in-
vestigate the hedging of options on realized variance. As an example, Carr and Lee
(2009) derive a model-free strategy for replicating a class of claims on asset price
when realized variance reaches a barrier. Using the method proposed in Carr and Lee
(2009), we are able to price and replicate a payo in the form of max(S

Ke
r
, 0).
It deserves to notice that this payo coincides with the Societe Generales timer call
A Black-Scholes-Merton Type Formula 48
options with payo max(S

K, 0) considered in our paper, when the interest rate r


is assumed to be zero and there is no nite maturity horizon.
When r = 0%, we simply have that
S
t
= S
0
exp
__
t
0
_
V
u
dW
s
u

1
2
_
t
0
V
u
du
_
, (4.18)
where
W
s
u
= W
(1)
t
+
_
1
2
W
(2)
t
. (4.19)
Recall that the variance budget is calculated as B =
2
0
T
0
, where [0, T
0
] is the expected
investment horizon and
0
is the forecasted annualized realized volatility. Based
on the denition of in (2.5), we apply the Dubins-Dambis-Schwarz theorem (see
Karatzas and Shreve (1991) [68]) to obtain that
_

0
_
V
u
dW
s
u
= J
s
B
, (4.20)
where J
s
t
is a standard Brownian motion. So, we have that
S

= S
0
exp
_
J
s
B

1
2
B
_
. (4.21)
Therefore, the price of the timer call option with strike K and variance budget B =

2
0
T
0
can be expressed by the Black-Scholes-Merton (1973) formula:
C
0
= E
Q
[maxS

K, 0] = BSM(S
0
, K, T
0
,
0
, 0) = S
0
N(d
1
) KN(d
2
), (4.22)
A Black-Scholes-Merton Type Formula 49
where
d
1
=
1

B
_
log
_
S
0
K
_
+
1
2
B
_
,
d
2
=
1

B
_
log
_
S
0
K
_

1
2
B
_
.
(4.23)
It is obvious that (4.22) is a special case of the formula in Theorem 4. To check this,
we rst recall that the formula in Theorem 4 is equivalent to (4.16), i.e.
C
0
= E
P
0

v
X
B
,
_
B
0
ds

v
X
s
_
. (4.24)
Because of (4.15), we notice that
d
0
_

v
X
B
,
_
B
0
ds

v
X
s
_
=
_

B
B
+

v
B
_

1
2

2
B. (4.25)
Similarly, we express d
1
, d
2
and
exp
_

v
_
V
0

v
X
B
_
+

v
_
B
0

2
v
X
s
ds
1
2
_

v
_
2
B
_
= exp
_

B
B

1
2
_

v
_
2
B
_
(4.26)
in terms of the Brownian motion

B. Straightforward computation on the normal
distributions yields (4.22), which is independent of , for the case of r = 0%.
4.3 Comparison with European Options
According to RISK [84],
High implied volatility means call options are often overpriced. In the
timer option, the investor only pays the real cost of the call and doesnt
suer from high implied volatility, says Stephane Mattatia, head of the
hedge fund engineering team at SG CIB in Paris.
A Black-Scholes-Merton Type Formula 50
Under the case of r = 0%, we provide a justication of this feature. More precisely,
we have the following proposition.
PROPOSITION 5. Assuming r = 0%, the timer call option with strike K and
expected investment horizon T
0
and forecasted realized volatility
0
, i.e. variance
budget B =
2
0
T
0
, is less expensive than the European call option with strike K and
maturity T
0
, when the implied volatility
imp
(K, T
0
) associated to the strike K and
maturity T
0
is higher than the realized volatility
0
, i.e.
C
European
0
C
Timer
0
. (4.27)
Indeed, by (4.22) we have that
C
Timer
0
=E
Q
[maxS

K, 0]
=BSM(S
0
, K, T
0
,
0
, 0)
BSM(S
0
, K, T
0
,
imp
(K, T
0
), 0) = C
European
0
.
(4.28)
For the general case of r > 0%, we illustrate the comparison between timer call options
and European call options with the same expected investment horizon (maturity)
by a numerical example in Chapter 5. We also note that timer options are less
expensive than the corresponding American options, which have the dierent nature
of randomness in maturity.
A Black-Scholes-Merton Type Formula 51
4.4 Timer Options Based Applications and Strate-
gies
The comparison between timer options and European options in Proposition 5 heuris-
tically motivates an option strategy for investors to capture the spread between the
realized and implied volatility risk. For example, if an investor believes that the cur-
rent implied volatility is higher than the subsequent realized volatility over a certain
period, she would take a long position in a timer call option and a short position in
a European option with the same strike and the expected investment horizon. By
setting the variance budget below the implied variance level, she would expect to
receive a net prot. In fact, one reason is that the timer call option is less expensive
than the European counterpart in this strategy. Another reason is that the lower
realized volatility would leverage the asset return, which results in a net prot at the
maturity.
Though the timer option payo (maxK

, 0, for some K

> 0) considered in this


paper is dierent from the put protection (maxK

e
r
S

, 0) considered in Bick
(1995) [8], timer put options may serve as eective tools for portfolio insurance. With
a timer put option written on an index (a well diversied portfolio), the uncertainty
about the indexs outcome is replaced by the variability in time horizon. However,
under the assumption of Hestons stochastic volatility model, the distribution of this
variable time horizon, under the physical probability measure, can be easily adapted
from Theorem 1.
Similar to the comparison in Proposition 5, timer put options are able to oer rela-
tively cheaper cost of portfolio insurance and protection. If the realized variance is
low, the timer put options take a long time to mature. Compared to the regularly
A Black-Scholes-Merton Type Formula 52
rolled European put options for protecting the downside risk of a portfolio, the timer
put options require less frequency of rollings, resulting in a reduction in the cost for
implementing the protection.
4.5 Some Generalizations
We provide several straightforward extensions. Recall that I
t
=
_
t
0
V
s
ds denotes the
exhausted variance over time period [0, t]. We can modify the above formula to obtain
the price during the whole lifetime of the timer call option.
COROLLARY 1. The timer call option price at time t is
C
t
=E
Q
_
e
r(t)
maxS

K, 0

T
t

=C(S
t
, K, r, , V
t
, , , B I
t
; d
0
, d
1
, d
2
).
(4.29)
Also, we obtain a put-call parity for timer options:
COROLLARY 2. (Timer Put-Call Parity) Put-Call parity holds for timer call
and put options, i.e.
C
0
P
0
= S
0
KE
Q
e
r
,
where
E
Q
e
r
=
_
+
0
_
+
0
exp
_

v
_
V
0

v
x
_
+
_

3
v

v
_
t
1
2
_

v
_
2
B
_
p(x, t)dxdt.
(4.30)
This corollary follows because
maxS

K, 0 maxK S

, 0 = S

K.
A Black-Scholes-Merton Type Formula 53
Suppose the index/stock pays dividend according to a known dividend yield. Under
the risk neutral probability measure, the dynamics of the underlying follows that
dS
t
= S
t
[(r d)dt +
_
V
t
(dW
(1)
t
+
_
1
2
dW
(2)
t
)],
dV
t
= ( V
t
)dt +
v
_
V
t
dW
(1)
t
,
(4.31)
where (W
(1)
t
, W
(2)
t
) is a two dimensional standard Brownian motion; r is the instan-
taneous interest rate; and d is the dividend yield.
COROLLARY 3. The price of a timer call option on a stock index paying dividend
at rate d is
C
d
0
= C(S
0
, K, r, , V
0
, , ,
v
, B; d

0
, d

1
, d

2
),
where
d

0
(v, ) =

v
(v V
0
+ B)
1
2

2
B d,
d

1
(v, ) =
1
_
(1
2
)B
_
log
_
S
0
K
_
+ r +
1
2
B(1
2
) + d
0
(v, )
_
,
d

2
(v, ) =
1
_
(1
2
)B
_
log
_
S
0
K
_
+ r
1
2
B(1
2
) + d
0
(v, )
_
.
(4.32)
Chapter 5
Implementation and Numerical
Examples
In this chapter, we propose the numerical implementation of the analytical formula
in Theorem 4, the PDE boundary value problem (5.5), and two benchmarked Monte
Carlo simulation schemes. As shown in the following numerical examples, these dier-
ent methods are roughly competitive; and they produce implementation results which
are in agreement. The analytical formula approach is bias-free. However, the chal-
lenge arises from the correct valuation of the special function as part of the Fourier
transform and from the error control in the Laplace transform inversion procedure.
The implementation of the dimension-reduced PDE (5.5) is fast but the error analysis
is not transparent because of the non-attainable singularity when v = 0. With regard
to the Monte Carlo simulation, which serves as a benchmark to verify the comput-
ing results from other methods, the eciency is enhanced when an Euler scheme on
Bessel process with predictor and corrector is employed. In the end of this chapter,
we illustrate numerically the comparison between timer call options and European
54
Implementation and Numerical Examples 55
call options with the same expected investment horizon (maturity). We also plot a
convex prole of the increase of the timer option price versus the raise of the variance
budget. The optimal choices of implementation strategy, numerical stability and ro-
bustness of the algorithms are open research opportunities for further investigation.
This section is limited to the proposal of each numerical method.
5.1 Analytical Implementation via Laplace Trans-
form Inversion
The implementation of the analytical formula in Theorem 4 consists of several steps.
To begin with, we map the innite integration domain to a nite rectangular domain
[0, 1] [0, 1] via transform
x = log(u), t = log(z).
Then, we implement the two dimensional integration on [0, 1] [0, 1] via trapezoidal
rule. The key here is to eciently evaluate the joint density at each grid point on
[0, 1] [0, 1]. We implement the Bessel joint density according to the expression in
Theorem 3. In this regard, we use Abate and Whitt [1] algorithm about inverting
Laplace transforms via Fourier series expansion. When evaluating the modied Bessel
function, we perform analytical correction of the Bessel function in order to accom-
plish the continuity of the Fourier transform (see Broadie and Kaya [17] for a similar
discussion). We briey discuss the necessity of considering analytic continuation of
the Bessel function and outline the algorithm.
Let A(y) denote the argument of the Bessel function term in the integrand of (3.19),
Implementation and Numerical Examples 56
i.e.
A(y) =
2
_
2( + iy)X
0
x
sinh
_
t
_
+iy
2
_ .
(5.1)
In graph (5.1(a)), we observe the winding of A(y) through the winding picture of
scaled argument
(y) = A(y)
log log [A(y)[
[A(y)[
.
We recall that the modied Bessel function of the rst kind is dened as
I
2
(z) =
+

k=0
(
z
2
)
2(+k)
k!(2 + k + 1)
,
where the power functions are multi-valued. This multi-valued property can be seen
from the denition of complex power functions. Because
z

:= [z[

e
i(arg(z)+2n)
, for any integer n,
there are dierent values for z

when is not an integer. Therefore, I


2
(z) is multi-
valued when 2 is not an integer. When the inverse Laplace (Fourier) transform
in (3.19) is implemented, the winding of z = A(y) must be captured to ensure the
continuity of the transformed function. However, most computation packages au-
tomatically map the complex numbers into the principal branch (, ]. This fact
might cause the discontinuity of the Bessel function when its argument A(y) goes
across the negative real line. Therefore, we keep track of the winding number of the
argument A(y) by a rotation counting algorithm and employ the following analytical
continuation formula (see Abramowitz and Stegun [2], Broadie and Kaya [17])
I

(ze
mi
) = e
mi
I

(z).
Implementation and Numerical Examples 57
We simply calculate the function on the principal branch and multiply it by a factor
e
mi
. Also, we need to take into account the potential numerical overow in the
evaluation procedure. Figure 5.1(b) and Figure 5.1(c) show the eect of rotation
counting on the phase angle of the Bessel argument.
We obtain the joint density in (3.19) by inverting the Laplace transform via the
Abate and Whitt [1] algorithm. The integration with respect to dy is essentially a
Fourier inversion of a damped function. Proper discretization, truncation and choice
of damping parameter is essential. Trapezoidal rule, though primitive, works well
here since the integrand is oscillatory. Errors tend to cancel. We choose step size
h =

2B
to discretize the integration. This step size, a quarter of a period of the
trigonometric function in the integrand, enables us to capture the function oscillation
and the tradeo with computational expenses very well. We choose a signicantly
large number of steps in order to minimize the truncation error. According to Abate
and Whitt [1], we choose a large damping factor to control the discretization error.
In Figure 5.2, we plot the joint density:
P
0
_
e
R
B
du, e

_
B
0
du
Ru
dt
_
= f(x, t)dxdt.
Because the integrand decays very fast when t is large, we truncate the total integra-
tion domain to enhance the implementation eciency.
The implementation is performed on a laptop PC with a Intel(R) Pentium(R) M
1.73GHz processor and 1GB of RAM running Windows XP Professional. We code the
algorithm using MATLAB. Throughout this section, we use an arbitrary parameter
set in Table 5.1 only for the purpose of illustration. In this parameter set, the variance
budget B is calculated from B =
2
0
T
0
, where the forecasted volatility
0
is assumed
Implementation and Numerical Examples 58
6 4 2 0 2 4 6
6
4
2
0
2
4
6
Logarithmically Scaled Bessel Argument
Re(A(y))
I
m
(
A
(
y
)
)
(a) Winding of the Bessel Argument
0 2 4 6 8 10 12
x 10
5
4
3
2
1
0
1
2
3
4
y
a
r
g
(
A
(
y
)
)
(b) Uncorrected Angle
0 2 4 6 8 10 12
x 10
5
300
250
200
150
100
50
0
y
a
r
g
(
A
(
y
)
)
(c) Corrected Angle
Figure 5.1: Rotation Counting Algorithm for the Bessel Argument
Implementation and Numerical Examples 59
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0
0.2
0.4
0.6
0.8
1
50
0
50
100
150
200
250
z(t)axis
u(x)axis
f

a
x
is
Figure 5.2: The joint density of
_
e
R
B
, e

_
B
0
du
Ru
_
to be 23% and the expected investment horizon T
0
is chosen to be 0.5 year. By
implementing the analytical formula, we compute the bias-free timer option price as
C
0
= 7.5848 in 75.6131 CPU seconds. Similarly, we compute the risk-neutral expected
maturity as 0.5356 according to
E
Q
=
1

v
_
+
0
_
+
0
t exp
_

v
_
V
0

v
x
_
+

2

3
v
t
1
2
_

v
_
2
B
_
p(x, t)dxdt.
(5.2)
Implementation and Numerical Examples 60
Model and Option Parameters
Stock Price S
0
100
Option Strike K 100
Variance Budget B 0.0265
Correlation -0.5000
Initial Variance V
0
0.0625
Volatility of the Variance
v
0.1000
Rate of Mean Reverting 2.0000
Long Run Variance 0.0324
Instantaneous Interest Rate r 0.04
Table 5.1: Model and Option Parameters
5.2 ADI Implementation of the PDE with Dimen-
sion Reduction
To begin with, we recall that the original PDE governing the timer option pricing
function u(t, s, v, x) is
u
t
+( v)
u
v
+rs
u
s
+v
u
x
+
1
2

2
v
v

2
u
v
2
+
1
2
s
2
v

2
u
s
2
+
v
sv

2
u
sv
ru = 0, (5.3)
for (t, s, v, x) [0, +) [0, +) (0, +) (0, B]. Given an arbitrary variance
budget, the timer option price u(t, s, v, x) is essentially independent of the initial time
t. In other words, timer options are perpetual. Therefore, we have that
u
t
= 0.
This simplies the original parabolic PDE (2.26) for pricing timer option to an elliptic
equation. Considering a boundary condition on plane:
= (
1
,
2
, B),
1
R,
2
R,
Implementation and Numerical Examples 61
we obtain the following Dirichlet problem:
( v)
u
v
+ rs
u
s
+ v
u
x
+
1
2

2
v
v

2
u
v
2
+
1
2
s
2
v

2
u
s
2
+
v
sv

2
u
sv
ru = 0,
u(s, v, B) = maxs K, 0.
(5.4)
Subsequently, we rewrite the equation (2.34) by dividing v(> 0) on both sides and
regard x as a new time variable. After this dimension reduction procedure, a new
parabolic PDE initial value problem can be formulated as follows.
PROPOSITION 6. The timer call option price is governed by the following two
dimensional parabolic initial value problem
_

_
u
x
+
1
2

2
v

2
u
v
2
+
1
2
s
2

2
u
s
2
+
v
s

2
u
sv
+
_

v
1
_
u
v
+
rs
v
u
s

r
v
u = 0,
u(s, v, B) = max(s K, 0),
(5.5)
where x serves as a temporal variable which corresponds to the stochastic total variance
clock (see (1.3)).
We briey discuss the implementation of the PDE (5.5). As the following algorithm
and numerical result shows, the PDE implementation is fast because we regard the
total variance as a clock through dimension reduction. The variance clock introduces
a small but sensitive scale. The error control depends heavily on the specication of
boundary conditions, computation domain, time steps and spatial discretization.
First, we set up the following boundary conditions of either Dirichlet, Neuman or
Robin type:
Implementation and Numerical Examples 62
u(0, v, x) = 0,
lim
s+
u
s
(s, v, x) = 1,

u
v
(s, 0, x) + rs
u
s
(s, 0, x) ru(s, 0, x) = 0,
lim
v+
u(s, v, x) = max(s K, 0).
(5.6)
The rst two conditions are straightforward. The third boundary condition on v = 0
is obtained from plugging in zero to the original PDE (2.26) for pricing timer option.
This is based on an a priori assumption that u is suciently smooth around v = 0.
The last boundary condition reconciles the fact that large initial volatility causes
immediate exercise of the timer call.
We discretize the domain [0, S] [0, V ] such that there are I +1 nodes in s-direction
and J + 1 nodes in v-direction. i.e.
S = Is, V = Jv.
For all interior points (1 i I, 1 j J), we propose a scheme:
(1 /
1
/
2
)U
n+1
= [1 +/
0
+ (1 )/
1
+ (1 )/
2
]U
n
,
(5.7)
where we categorize the derivatives such that /
0
corresponds to the mixed derivative
term, /
1
corresponds to the spatial derivatives in the s direction and /
2
corresponds
to the spatial derivatives in the v direction. The ru term can be divided into /
1
and
/
2
. Therefore,
Implementation and Numerical Examples 63
/
0
=
1
4

v
sR
sv

sv
,
/
1
=
1
2
s
2
R
s2

ss
+
1
2
rs
v
R
s

1
2
r
v
x,
/
2
=
1
2

2
v
R
v2

vv
+
1
2

v
1
_
R
v

v

1
2
r
v
x,
(5.8)
where
R
s
=
x
s
, R
v
=
x
v
, R
s2
=
x
s
2
, R
v2
=
x
v
2
, R
sv
=
x
sv
.
The dierence operators are dened as

s
U
i,j
= U
i+1,j
U
i1,j
,

ss
U
i,j
= U
i+1,j
2U
i,j
+ U
i1,j
,

v
U
i,j
= U
i,j+1
U
i,j1
,

vv
U
i,j
= U
i,j+1
2U
i,j
+ U
i,j1
,

sv
U
i,j
= U
i+1,j+1
+ U
i1,j1
U
i1,j+1
U
i+1,j1
,
(5.9)
By adding
2
/
1
/
2
U
n+1
on both sides of (5.7) and ignoring higher order term, we
design a variation of the previous scheme as
(1 /
1
/
2
+
2
/
1
/
2
)U
n+1
= [1 +/
0
+ (1 )/
1
+ (1 )/
2
+
2
/
1
/
2
]U
n
.
(5.10)
Factorizing the dierence operator on the left hand side and regrouping the terms,
we obtain that
(1 /
1
)(1 /
2
)U
n+1
= [1 +/
0
+ (1 )/
1
+/
2
]U
n
(1 /
1
)/
2
U
n
.
(5.11)
Implementation and Numerical Examples 64
No.t-Steps N
t
No.V-Steps N
v
No. S-Steps N
s
Computed Price CPU (Seconds)
10 40 80 8.2921 1.4319
20 80 160 7.3756 2.7091
40 160 320 7.4634 18.3646
80 320 640 7.5852 138.8510
160 640 1280 7.5849 879.6288
Table 5.2: A numerical example on pricing timer call option via ADI scheme
We propose an ADI scheme using Douglas-Rachford [31] method as follows:
(1 /
1
)U
n+
1
2
= [1 +/
0
+ (1 )/
1
+/
2
]U
n
,
(1 /
2
)U
n+1
= U
n+
1
2
/
2
U
n
(5.12)
Detailed formulation of this ADI scheme is documented in Appendix 10. We im-
plement this algorithm by choosing S and V suciently large (for example, let
S = 800, V = 5). Table 5.2 exhibits the numerical experiment using the param-
eter set in Table 5.1. As numbers of steps along dierent direction (N
t
, N
s
, N
v
)
increase proportionally, the values converge to a level closed to the bias-free value
obtained from the formula implementation in the previous section. We observe that
the complexity of this ADI scheme is approximately
O(N
t
) (O(N
s
) O(N
v
) +O(N
v
) O(N
s
)) = O(N
t
) O(N
s
) O(N
v
).
Figure 5.3 exhibits the surface of the timer call price. We note that it might not be
optimal to have proportional step sizes and the choice of the proportional factor is a
topic of further research. In this numerical experiment, we focus on the illustration
of the validity of our AID scheme.
Implementation and Numerical Examples 65
0
20
40
60
80
100
120
140
160
180
200
0
0.02
0.04
0.06
0.08
0.1
0
50
100
150
asset price
current variance
t
i
m
e
r

c
a
l
l

p
r
i
c
e
(a) Timer call option price Surface
Figure 5.3: Timer call surfaces implemented from PDE ADI scheme
5.3 Monte Carlo Simulation
In this section, we propose two Monte Carlo simulation schemes and compare their
implementation with the PDE and the analytical formula. Algorithm 1 is a relatively
brute force method. Compared to using the discounted payo e
r
maxS

K, 0
as the estimator directly, Proposition 3 oers a conditional Monte Carlo simulation
estimator, which achieves the variance reduction. To further enhance the eciency, we
employ the discounted asset price e
r
S

as a control variate. (, V

) is approximated
via a time-checking algorithm based on the exact simulation of the variance path
V
t
. We notice that Algorithm 1 also works, when the Feller condition 2
2
v
0
is violated. As we can see in Appendix 10, Algorithm 1 can be adapted to incorporate
the consideration of jump risk. Algorithm 2 is an enhanced implementation based on
Proposition 4. Instead of manipulating the original variance process V
t
, we employ
an Euler scheme on the Bessel process with predictor and corrector, which is applied
Implementation and Numerical Examples 66
to improve accuracy by averaging current and future levels of the drift coecient.
Also, as an alternative to Algorithm 2, an almost-exact simulation scheme based on
the transition law of the underlying Bessel process is proposed in Algorithm 3. We
briey describe each algorithm as follows and exhibit the computing performance of
Algorithm 1 and Algorithm 2.
Algorithm 1. For each replication, we perform the following steps:
1. Simulate the discretized variance process V
t
path exactly, according to its
transition law, along the time grids t
i
= it where i=1,2,3,...(see Remark 7 for
details about sampling the square root process).
2. Evaluate the total variance
_
t
0
V
s
ds by trapezoidal rule, i.e.
_
jt
0
V
s
ds t
_
V
0
+ V (jt)
2
+
j1

k=1
V (kt)
_
, (5.13)
and, check the rst time when the variance budget is exhausted. We record the
rst j (denoted by j
min
) when
t
_
V
0
+ V (jt)
2
+
j1

k=1
V (kt)
_
B. (5.14)
We regard (V (j
min
t), j
min
t) as an approximation of (V

, ) .
3. Given , we sample S

via Euler scheme (see Glasserman (2004) [53]).


4. We employ the discounted asset price e
r
S

as a control variate. The estimator


is spelt out as

= S
0
e
d
0
(V ,)
N(d
1
(V

, )) Ke
r
N(d
2
(V

, )) +

(e
r
S

S
0
), (5.15)
Implementation and Numerical Examples 67
where the optimal coecient

is the opposite number of the slope of the least-


square regression line of the samples of S
0
e
d
0
(V ,)
N(d
1
(V

, ))Ke
r
N(d
2
(V

, ))
against that of e
r
S

. We use the sample version to estimate

in the im-
plementation, i.e. use the ratio of the covariance of the two statistics and the
variance of the control variable.
REMARK 7. By Cox et al. [25], the distribution of V
t
given V
u
where u < t, up to
a scale factor, is a noncentral chi-squared distribution, i.e.
V
t
=

2
v
(1 e
(tu)
)
4

2
d
_
4e
(tu)

2
v
(1 e
(tu)
)
V
u
_
, for t > u,
where
2
d
denotes the noncentral chi-squared random variable with d degrees of free-
dom, non-centrality parameter and d =
4

2
v
. See Broadie and Kaya [17] for detailed
study about the exact simulation of process V
t
.
Algorithm 2 relies on the representation of timer call option price via Bessel processes
in Proposition 4. Here we propose an Euler scheme with Predictor-Corrector on the
Bessel SDE. We apply the Brownian scaling property to derive the following property,
in order to recast the variance budget B as a model parameter.
COROLLARY 4. Let Y
t
, Z
t
be a bivariate diusion process governed by stochas-
tic dierential equation:
dY
t
= B

Y
t
dt +
v

Bd
t
; Y
0
= V
0
,
dZ
t
=
B
Y
t
dt; Z
0
= 0,
(5.16)
where
t
is a standard Brownian motion. Under probability measure P
0
, the fol-
Implementation and Numerical Examples 68
lowing distributional identity holds,
_

v
X
B
,
_
B
0
ds

v
X
s
_

law
(Y
1
, Z
1
).
Thus, the algorithm can be described as follows.
Algorithm 2. For each replication, we perform an Euler iteration with predictor and
corrector (see Jaeckel [63]) in order to compensate the error caused by the unattain-
able zero pole of Bessel processes. Numerical experiments shows that this algorithm
works very well.
1. Predictor:

Y (i + 1) =

Y (i) +
B

Y (i)
t +
v

t(i),

Y (0) = V
0
,
2. Corrector:
Y (i + 1) = Y (i) +
_
B

Y (i + 1)
+
(1 )B

Y (i)
_
t +
v

t(i),
Y (0) = V
0
, where (i)s are standard normal random variables; is an adjusting
coecient which is usually chosen as
1
2
.
3.
Z(i + 1) = Z(i) +
1
2
tB
_
1
Y (i)
+
1
Y (i + 1)
_
, Z(0) = 0.
According to Proposition 4, the estimator is (Y
1
, Z
1
).
As an alternative to Algorithm 2, an almost-exact simulation based on the transition
law of the underlying Bessel process is proposed as follows. We start with the following
lemma about the transition law of Bessel processes (see Delbaen and Shirakawa [28]).
Implementation and Numerical Examples 69
LEMMA 6. (Delbaen and Shirakawa, Law of Squared Bessel Process) For
any > 0, we have, for dimensional Squared Bessel process X
2
t
,
X
2
t
=
law
t
2

_
X
2
0
t
_
,
where
2

_
X
2
0
t
_
means a noncentral chi-squared random variable with degree of free-
dom and non-centrality parameter
X
2
0
t
.
We note that the noncentral chi-square distribution
2

() with degree of freedom


and non-centrality parameter > 0 has the density
f

2(x; , ) =
1
2
e

(+x)
2
_
x

_
2
I

x)1x > 0,
where =

2
1. The Bessel transition density can be expressed in terms of the
noncentral chi-square density as
p
()
(t; x, y) =
_
2y
t
_
f

2
_
y
2
t
; ,
x
2
t
_
.
Now, we briey describe an almost-exact simulation algorithm.
Algorithm 3. (An Alternative Simulation Scheme in Algorithm 2) Let the length of
time grid be t =
B
m
, We simulate exactly the whole path of X
t
, i.e.
X
0
, X
t
, X
2t
, ..., X
B
,
Implementation and Numerical Examples 70
by sampling noncentral chi-squared distribution iteratively according to
X
it
=
law

_
t
2
2

2
v
+1
_
X
2
(i1)t
t
_
. (5.17)
The noncentral chi-squared random variable has degree of freedom d =
2

2
v
+ 1 > 1.
According to Johnson et al. [65],

2
d
() = (Z +

)
2
+
2
d1
.
The chi-squared distribution has CDF
P(
2
y) =
1
2
d
2

_
d
2
_
_
y
0
e

z
2
z
d
2
1
dz,
and the Gamma distribution Gamma(a, ) with shape parameter a and scale param-
eter has PDF
f
a,
(y) =
1
(a)
a
y
a1
e

, y 0.
Therefore, we nd that

2
d
= Gamma(
d
2
, 2),
by letting a =
d
2
, = 2. The iteration equation (5.17) becomes
X
it
=

_
t
_
_
_
_
_
Z
i
+

X
2
(i1)t
t
_
_
2
+
2
d1
_
_
_
, X
0
=
V
0

v
, (5.18)
Implementation and Numerical Examples 71
where d =
2

2
v
+ 1 and

2
d1
=
2
2

2
v
= Gamma
_

2
v
, 2
_
= 2Gamma
_

2
v
, 1
_
,
where the shape parameter of the Gamma variables is

2
v
. To sample Gamma vari-
ables, we use Fishmans algorithm (see Fishman [42]).
Thus, we can sample V

through
v
X
B
=
v
X
mt
. We use trapezoidal rule to ap-
proximate as
1
Xt
=
_
B
0
ds

v
X(s)

1
2
m

i=1
1

v
_
1
Xi1
m
B
+
1
X i
m
B
_
B
m
.
According to Due and Glynn [34], it is asymptotically optimal to increase the num-
ber of time steps proportional to the square root of the number of simulation trials
for the rst order Euler discretization. For Algorithm 1, we suppose the number of
simulation trials is n and number of time steps for going from 0 to T
0
(the speci-
ed investment horizon) is k. Thus we apply the optimality principle in Due and
Glynn [34] in the sense that k = [

n] (t = T
0
/k). Table 5.3 and Figure 5.4 shows
our implementation results. It is obvious that Algorithm 2 signicantly outperforms
Algorithm 1.
5.4 Miscellaneous Features
Finally, we illustrate the comparison between timer call options and European call
options with the same expected investment horizon (maturity) by a numerical ex-
ample. Indeed, we specify an investment horizon, e.g. T
0
= 0.25. Using the model
Implementation and Numerical Examples 72
(a) Simulation with Algorithm 1
No.Trials n No.Steps k Bias
Standard
Error
RMS
Error
Computing
Time (CPU sec.)
10,000 100 0.1191 0.0617 0.1341 0.734
40,000 200 0.0343 0.0312 0.0464 5.718
160,000 400 0.0303 0.0156 0.0341 44.719
640,000 800 0.0250 0.0078 0.0262 354.719
2,560,000 1,600 0.0129 0.0070 0.0147 2863.83
10,240,000 3,200 0.0058 0.0033 0.0067 25596.63
(b) Simulation with Algorithm 2
No.Trials n No.Steps k Bias
Standard
Error
RMS
Error
Computing
Time (CPU sec.)
10,000 100 0.0421 0.0521 0.0670 0.46
40,000 200 0.0149 0.0256 0.0299 1.95
160,000 400 0.0088 0.0129 0.0156 15.38
640,000 800 0.0073 0.0065 0.0098 118.12
2,560,000 1,600 0.0059 0.0032 0.0067 978.53
10,240,000 3,200 0.0049 0.0016 0.0051 9926.36
Table 5.3: We implement Algorithm 1 and Algorithm 2 using the parameters in
Table 5.1. The bias-free timer option value computed from the analytical formula
is C
0
= 7.5848. It turns out that Algorithm 2, employing a predictor-and-corrector
correction with Bessel process simulation, performs much better than brute force
Algorithm 1. We also note that the simulated values of the risk-neutral expectation
of the maturity from Algorithm 1 and Algorithm 2 associated to the lowest RMS
errors obtained in this numerical experiment are 0.5358 and 0.5355, respectively.
parameters in Table 9.1 and varying the value of S
0
, we calculate the expected realized
variance over period [0, T
0
] as

2
0
=
1
T
0
E
Q
__
T
0
0
V
s
ds
_
= +
V
0

T
0
_
1 e
T
0
_
.
We observe, from Figure 5.5, that the timer call option with variance budget B =
2
0
T
0
is less expensive than the European call option with maturity T
0
. This numerical
experiment suggests that, as the implied volatility tends to be mostly higher than the
realized volatility, timer options can be applied to suppress the extra cost of the high
Implementation and Numerical Examples 73
10
1
10
0
10
1
10
2
10
3
10
4
10
5
10
3
10
2
10
1
10
0
Total simulation time (CPU seconds)
R
M
S

e
r
r
o
r


Algorithm #1
Algorithm #2
Figure 5.4: Convergence of the RMS errors of Monte Carlo simulation Algorithm 1
and Algorithm 2
implied volatility of European options.
As we can see in Figure 5.6, the price of a timer call option increases as the variance
budget increases and manifests tiny convexity.
Implementation and Numerical Examples 74
0 50 100 150 200
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Stock/Index price
(
V
a
n
i
l
l
a

C
a
l
l


T
i
m
e
r

C
a
l
l
)
/
(
V
a
n
i
l
l
a

C
a
l
l
)

Comparison of timer & vanilla call prices with the same (expected) investment horizon
Figure 5.5: Comparison between the prices of timer call options and European call
options
0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08
0
2
4
6
8
10
12
14
16
Variance Budget
T
i
m
e
r

C
a
l
l

P
r
i
c
e
Figure 5.6: Timer call option price increases as variance budget increases
Chapter 6
Dynamic Hedging Strategies
In this chapter, we discuss dynamic hedging strategies for timer options at the theoret-
ical level. We also briey illustrate the issue of the computation of price sensitivities
used for hedging and risk-management purposes.
6.1 Dynamic Hedging Strategies
The underlying asset and the riskless money market account constitute an incom-
plete market due to the uncertain volatility risk. Thanks to the market completion
via volatility-dependent assets (e.g. variance swap), we formulate the pricing of timer
option as a rst-passage-time problem via a standard no-arbitrage argument in Chap-
ter 2. In this chapter, we focus on the dynamic hedging (replication) of timer option
based on market completion.
We hedge the timer call option by the original underlying asset and a sequence of
contiguous auxiliary volatility-dependent securities. In the following exposition, we
take variance swap as an example of the auxiliary hedging instruments. Because we
75
Dynamic Hedging Strategies 76
need to hedge the timer call option until its random maturity , we may need to
replace matured variance swaps with new ones during the whole life of the timer
call option. We regard [0, ] as a composition of hedging periods T
i
= [

i1
j=0
T
j

,

i
j=0
T
j
], i = 1, 2, 3, ... (we dene T
0
= 0). On T
i
a variance swap with maturity
T
i
and price process G
i
(t) is employed as an auxiliary hedging instrument. In fact,
in order to hedge a timer option we need not only to rebalance the replicating portfolio
locally within each period T
i
, but we also need to replace the expired variance swap
with a new one at each time T
i
, if T
i
< , until time when the total variance budget
is consumed. The following chart illustrates this hedging mechanism.
C
0

0
= C
0
(
S
t
,
G(1)
t
)
hedge

C
T1

T1
= C
T1
(
S
t
,
G(2)
t
)
hedge

... hedge

= max(S

K, 0)

= C

(
S
t
,
G(n)
t
)
Without loss of generality, we focus on the rst hedging period [0, T
1
]. Let
t

denote the value process of the self-nancing hedging portfolio. Suppose that at time
t the portfolio consists of
s
t
shares of asset with price S
t
and
G
t
shares of variance
swap with price G
t
(note that we drop the subscription 1 of G
1
without introducing
any confusion), and the rest of the money fully invested in the riskless money market
account. Therefore,
d
t
=
S
t
dS
t
+
G
t
dG
t
+ r(
t

S
t
S
t

G
t
G
t
)dt.
It is equivalent to
d(e
rt

t
) = e
rt
_

S
t
(dS
t
rS
t
dt) +
G
t
(dG
t
rG
t
dt)

.
Dynamic Hedging Strategies 77
Let G
t
= ((t, V
t
, I
t
) for some function (. According to Broadie and Jain (2008) [16],
we have that
d(e
rt
G
t
) = e
rt
(
v

v
_
V
t
dW
(1)
t
.
Thus the replicating portfolio satises
d(e
rt

t
) = e
rt
_

G
t
(
v

v
_
V
t
dW
(1)
t
+
S
t
_
V
t
S
t
(dW
(1)
t
+
_
1
2
dW
(2)
t
)
_
.
(6.1)
On the other hand, for the timer option price we deduce that
d(e
rt
C
t
) = e
rt
_
u
v

v
_
V
t
dW
(1)
t
+
u
s
_
V
t
S
t
(dW
(1)
t
+
_
1
2
dW
(2)
t
)
_
.
(6.2)
Finally, we let
d(e
rt
C
t
) = d(e
rt

t
).
Therefore, the dynamic hedging strategy localized within a certain hedging period T
i
reads
_

S
t
=
u
s

G
t
=
u
v
(
v
.
(6.3)
REMARK 8. The hedging procedure can be also done with xed maturity European
options. Employing a European option with maturity T and price process H
t

(H
t
= H(t, S
t
, V
t
, I
t
) for some function H(t, s, v, I)) as the auxiliary security, the
Dynamic Hedging Strategies 78
strategy for dynamically hedging a timer call option reads
_

S
t
=
u
s

u
v

H
s
H
v

H
t
=
u
v
H
v
.
(6.4)
6.2 Computation of Price Sensitivities
From Section 6.1, we see that both timer call Delta (the sensitivity with respect to
S
0
) and Vega (the sensitivity with respect to V
0
) are important for dynamic hedging
of timer options. Price sensitivities on other model parameters might be useful for
risk management purpose. In this section, we discuss the computation of sensitivities
based on various computational methods we discussed previously.
Upon implementing the analytical formula in Theorem 4, we can use the correspond-
ing nite dierence to approximate a sensitivity. For a general parameter (could
be S
0
,V
0
, etc)
C
0


C
0
( +) C
0
()

.
It is straightforward to implement it by choosing small so as to achieve a pre-
specied error tolerance level. We can also perform path-wise simulation (see Broadie
and Glasserman [15]) to compute price sensitivities. We can obtain the sensitivities
almost for free, once the simulation of underlying process is done for valuation. How-
ever, we need to tolerate the bias in this approach. Based on Proposition 4 and
Corollary (5.16), we can apply pathwise approach combined with Euler discretiza-
tion on the Bessel process in order to compute the price sensitivities with respect to
B, , ,
v
, V
0
. By taking the derivatives inside the expectation, we obtain the
Dynamic Hedging Strategies 79
following proposition.
PROPOSITION 7. The pathwise estimator for the price sensitivity with respect to
B, , ,
v
, V
0
admits the following form.

C
0

=
_
S
0
e
d
0
(Y
1
,Z
1
)
N(d
1
(Y
1
, Z
1
))D
0
+ S
0
e
d
0
(Y
1
,Z
1
)
(d
1
(Y
1
, Z
1
))D
1
Ke
rZ
1
(d
2
(Y
1
, Z
1
))D
2
+
Kre
rZ
1
N(d
2
(Y
1
, Z
1
))
_
Z
1

2
v
Y
1

2
v
Z
1

_
_
exp
_

2
v
(V
0
Y
1
) +

2

2
v
Z
1


2
B
2
2
v
_
,
(6.5)
where
D
0
=
d
0
v
(Y
1
, Z
1
)
Y
1

+
d
0

(Y
1
, Z
1
)
Z
1

+
d
0

(Y
1
, Z
1
)

2
v
Y
1

+

2

2
v
Z
1

,
D
1
=
d
1
v
(Y
1
, Z
1
)
Y
1

+
d
1

(Y
1
, Z
1
)
Z
1

+
d
1

(Y
1
, Z
1
),
D
2
=
d
2
v
(Y
1
, Z
1
)
Y
1

+
d
2

(Y
1
, Z
1
)
Z
1

+
d
2

(Y
1
, Z
1
),
(6.6)
and
(x) =
1

2
e

x
2
2
,
and
d
0
v
(v, ) =

v
,
d
0

(v, ) =

v
,
d
1
v
(v, ) =

v
_
(1
2
)B
,
d
1

(v, ) =
r

v

_
(1
2
)B
,
d
2
v
(v, ) =

v
_
(1
2
)B
,
d
2

(v, ) =
r

v

_
(1
2
)B
.
(6.7)
In order to implement Proposition 7, we just need to simulate (
Y
1

,
Z
1

). This can be
obtained directly, once we simulate the trajectories of (Y
t
, Z
t
). We demonstrate the
method through the following example of computing Vega, i.e.
C
0
V
0
.
We dierentiate Y
t
, Z
t
with respect to V
0
. By the dynamics in (5.16), we obtain
Dynamic Hedging Strategies 80
that,
d
_
Y
t
V
0
_
=
B
Y
2
t
_
Y
t
V
0
_
dt;
Y
0
V
0
= 1,
d
_
Z
t
V
0
_
=
B
Y
2
t
_
Y
t
V
0
_
dt;
Z
0
V
0
= 0.
(6.8)
Therefore, by discretization, we design the following Euler scheme to simulate (
Y
1
V
0
,
Z
1
V
0
).
_
Y
V
0
_
(i + 1) =
_
Y
V
0
_
(i)
B
Y
2
(i)
_
Y
V
0
_
(i)t,
_
Z
V
0
_
(i + 1) =
_
Z
V
0
_
(i)
B
Y
2
(i)
_
Y
V
0
_
(i)t.
(6.9)
We take the terminal value from these iterations to evaluate the estimators for the
price sensitivities.
As to the computation of sensitivities via PDE approach, we use nite dierence to
approximate the corresponding derivatives. It is straightforward to obtain the price
sensitivity with respect to S
0
(the so called Delta) and the price sensitivity with
respect to V
0
(the so called Vega) once the price surface 6.1 is obtained.
For the purpose of illustration, we plot the surface of timer call Delta and Vega,
which are both important for hedging, in Figure 6.1. We observe that the Delta of
the timer call option is bounded between zero and one, while the Vega keeps negative
with considerable uctuation.
Dynamic Hedging Strategies 81
0
20
40
60
80
100
120
140
160
180
200
0
0.02
0.04
0.06
0.08
0.1
0
0.2
0.4
0.6
0.8
1
1.2
1.4
asset price
current variance
p
r
ic
e

s
e
n
s
it
iv
it
y

w
r
t

S

(
D
e
lt
a
)
(a) Timer call Delta
C
S0
0
50
100
150
200
0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
90
80
70
60
50
40
30
20
10
0
10
current variance
asset price
V
e
g
a
(b) Timer call Vega
C
V0
Figure 6.1: Numerical examples of time call option price sensitivities: Delta and Vega
Part II
Ecient Valuation of VIX Options
under Gatherals Double
Log-normal Stochastic Volatility
Model
82
Chapter 7
Introduction to Part II
7.1 A Brief Outline of Part II
Consistent modeling and pricing of options on S&P 500 (the Standard and Poors
500 index), VIX (the CBOE volatility index) and realized variance are an important
issues for the nancial derivatives market. Gatherals (2007, 2008) double mean-
reverting stochastic volatility model achieves such a goal to reduce the model risk.
However, the non-ane structure of this model leads to the analytical intractability in
the sense that the characteristic function of the underlying variables might not exist
in closed-form. At the time when the model was proposed, its calibration involved
massive Monte Carlo simulation. In this part, we begin with some analysis of the
model. Then, we develop a generally applicable asymptotic expansion method for
ecient valuation of derivatives under non-ane multidimensional diusion models;
and demonstrate it in the valuation of options on VIX under Gatherals double log-
normal model. Our probabilistic method is a combination of scaling, pathwise Tay-
83
Introduction to Part II 84
lor expansion, inductive computation of correction terms, calculation of conditional
mixed Brownian moments, etc. The non-linear payo function of an option on VIX
is complicated; nevertheless convergence of our expansion is rigorously justied via
the theory of Malliavin-Watanabe-Yoshida. In numerical examples, we demonstrate
that the formula eciently achieves desirable accuracy for relatively short maturity
cases. Following our probabilistic computation approach and theoretical basis, bet-
ter accuracy for longer maturity options can be obtained by adding more correction
terms.
7.2 Modeling VIX
VIX, the Chicago Board Options Exchange (CBOE) Volatility Index (see [23]), is the
premier benchmark for U.S. stock market volatility. It provides investors a direct and
eective way to understand volatility. As an implied volatility index, VIX measures
market expectations of near term (next 30 calendar days) volatility conveyed by stock
index option prices. Since volatility often signies nancial turmoil, VIX is often
referred to as the investor fear gauge.
According to CBOE [23], independent of model specication, an index
2
is calculated
by averaging the weighted prices of out-of-the-money puts and calls on S&P 500 (the
Standard & Poors 500 index), i.e.

2
=
2
T

i
K
i
K
2
i
e
rT
Q(K
i
)
1
T
_
F
K
0
1
_
2
, (7.1)
where the various parameters are dened as follows.
Introduction to Part II 85
T : Time to expiration,
F : Forward index level derived from index option prices,
K
i
: Strike price of i-th out-of-the-money option,
K
i
: Interval between strike prices,
K
0
: First strike below the forward index level F,
r : Risk-free interest rate to expiration,
Q(K
i
) : The midpoint of the bid-ask spread for each option
with strike K
i
.
Conventionally, VIX is calculated as
V IX = 100. (7.2)
The squared VIX satises that
V IX
2
=
2 10
4
T

i
K
i
K
2
i
e
rT
Q(K
i
)
10
4
T
_
F
K
0
1
_
2
. (7.3)
Following Carr and Wu (2006) [22], we introduce the theoretical proxy of VIX and
demonstrate the necessity of employing a model, which is able to consistently price
options on VIX and S&P 500. To begin with, we recall the denition of theoretical
VIX, which is used in the modeling and valuation of derivative securities on VIX.
On the ltered risk neutral probability space (, Q, T, T
t
), we assume the asset
dynamics to be
dS
t
S
t
= rdt +
_
V
t
dW
t
,
where V
t
denotes the stochastic variance process. Let us dene the realized variance
Introduction to Part II 86
over the time interval [t, t + T] to be
RV
t,t+T
:=
1
T
_
t+T
t
V
s
ds.
Further,

V IX
2
t
, the theoretical squared VIX (see Carr and Wu [22]) is dened as

V IX
2
t
= E
Q
[RV
t,t+T
[T
t
] = E
Q
_
1
T
_
t+T
t
V
s
ds

T
t
_
. (7.4)
For now, we exclude the presence of jump in the asset dynamics. Otherwise, jumps
will contribute to the realized variance as well. The theoretical squared VIX (7.4)
can be statically replicated via forward-starting S&P 500 put and call options, i.e.

V IX
2
t
=
2
T
__

Ft
e
rT
K
2
C
Model
(t, t + T, K)dK +
_
Ft
0
e
rT
K
2
P
Model
(t, t + T, K)dK
_
,
(7.5)
where F
t
= S
t
e
r(Tt)
denotes the forward price of S
t
contracted for a later time T > t.
C
Model
(t, t+T, K) and P
Model
(t, t+T, K) denote the model price of forward started
call and put options with maturity T, respectively. This static replication idea has
been successfully applied to the study of variance swaps (see Derman et al. [29]).
Thus, the theoretical squared VIX (7.4) is represented by a strip of model-generating
out-of-the-money S&P 500 option prices over a wide range of strikes.
Suppose that we have a stochastic volatility model which ts the entire S&P 500
Introduction to Part II 87
options smile. In other words, for any strike K,
C
Model
(t, t + T, K) =e
rT
E
Q
t
(S
t+T
K)
+
=C
BS
(
imp
(K, T), S
t
) = C
Market
(t, t + T, K)
P
Model
(t, t + T, K) =e
rT
E
Q
t
(K S
t+T
)
+
=P
BS
(
imp
(K, T), S
t
) = P
Market
(t, t + T, K).
(7.6)
where C
Market
(t, t + T, K) and P
Market
(t, t + T, K) denote the market price of
forward started call and put options with maturity T. Here C
BS
and P
BS
denote the
Black-Scholes call and put option pricing formulae, respectively; and
imp
(K, T)
denotes the implied volatility associated with strike K and maturity T. Therefore,
it follows that

V IX
2
t
=
2
T
__

Ft
e
rT
K
2
C
Market
(t, t + T, K)dK +
_
Ft
0
e
rT
K
2
P
Market
(t, t + T, K)dK
_
.
(7.7)
Hence, we can interpret (dened in (7.3)) as a discretization of its theoretical
counterpart dened in (7.4). i.e.

V IX
2

2
. (7.8)
Therefore, we have that

V IX 100 V IX. (7.9)


An excellent stochastic volatility model, under which the approximate relation (7.8)
holds, allows us to use theoretical VIX (7.4) as a proxy to study the pricing of VIX
options and futures, etc. within a continuous time framework. Therefore, we need
a model which matches S&P 500 options market prices across all strikes and also
Introduction to Part II 88
produces correct VIX option market prices. Under the assumption of absence of
jumps in the asset dynamics, the error resulted from using theoretical VIX is solely
induced by the discretization of the integration in (7.7) on strikes.
Similar to the Black-Scholes-Merton model (1973) [10, 79] for pricing equity options,
Whaleys (1993) [91] model directly regarded VIX as a geometric Brownian motion
with constant volatility. Following the modeling approach in Cox et al. (1985) [26]
and Heston (1993) [61], Grunbichler and Longsta (1996) [55] specied the dynam-
ics of VIX as a mean-reverting square root process. Detemple and Osakwe (2000)
[30] employed a logarithmic mean-reverting process for pricing options on volatility.
Carr and Lee (2007) [20] (also see Carr and Wu (2006) [22]) proposed a model-free
approach by using the associated variance and volatility swap rates as the model in-
puts. Following Eraker et al. (2003, 2004) [40, 64], Lin and Chang (2009) modeled
the S&P 500 index and the S&P 500 stochastic volatility by correlated jump-diusion
processes. Following the approach proposed in Bergomi (2005, 2009) [6, 7], Cont and
Kokholm (2009) studied a modeling framework for the joint dynamics of an index
and a set of forward varaince swap rates written on this index.
7.3 Historical Developments on Modeling Multi-
factor Stochastic Volatility
The Black-Scholes-Merton (1973) model [10, 79] assumes that the underlying volatil-
ity is constant over the life of the derivative, and is unaected by the changes in
the underlying asset price. However, one of the most prominent shortcomings of
this model is that it cannot explain features of the implied volatility surface such
as volatility smile and skew, which indicate that implied volatility does tend to vary
Introduction to Part II 89
with respect to strike price and expiration. Stochastic volatility is a popular approach
to resolve such deciency of the Black-Scholes-Merton (1973) model. In particular,
the early attempts of two-factor stochastic volatility models, such as Hull and White
(1987) [62] and Heston (1993) [61], assume that the volatility of the underlying price is
a stochastic process rather than a constant, which makes it possible to model deriva-
tives more accurately. Two-factor stochastic volatility models can t the volatility
smiles. However, these models are restrictive in the modeling of the relationship be-
tween the S&P 500 volatility level and the slope of the smile. The consistent modeling
of options on VIX and realized variance is confronted with even more challenge.
In the literature of equity/index option valuation, the deciencies of the two-factor
stochastic volatility model have traditionally been addressed by adding jump compo-
nents to the dynamics. See for example Bates (1996) [4], Due, Pan and Singleton
(2000) [36], Broadie, Chernov and Johannes (2007) [14] and Lipton (2002) [75]. We do
not doubt the usefulness of this approach. Instead, we claim that adding additional
factors to the volatility process can alternatively circumvent the model deciencies.
Here, we do not investigate whether multi-factor models or jump processes are more
appropriate for modeling option data.
Early considerations of using multi-factor stochastic volatility models to improve the
goodness of t for S&P 500 returns can be found in Bates (1997) [5] and Gallant et.
al (1999) [47]. Due, Pan and Singleton (2000) [36] propose an ane class

of three-
factor stochastic volatility models. Based on an assumption on the specic correlation
structure, an intermediate stochastic trend component is added to volatility, which
generalizes Hestons (1993) [61] two-factor stochastic volatility model. Also relying on
the ane class, Heston et al. (2009) [24] propose a three-factor stochastic volatility

For the ane class models, see Due and Kan (1996) [35], Due, Filipovic and Schachermayer
(2003) [33].
Introduction to Part II 90
model by adding a second CIR process of variance, which is independent of the one
in Heston (1993) [61]. Due to the special requirement on the correlation structure,
this model is analytically tractable in the sense that the characteristic function of the
underlying admits closed-form formula.
Gatherals double mean-reverting stochastic volatility model (2007, 2008) [50, 49, 51]
generalizes the ane three-factor model in Due, Pan and Singleton (2000) [36] by
allowing more exibility in the correlation structure and the specication of the diu-
sion components. Supported by some empirical study, the variance is more properly
modeled by a double-CEV type mean-reverting process instead of using square root
processes. Thus, it falls into the non-ane class, which is quite computationally
challenging.
7.4 Gatherals Double Mean-Reverting Stochastic
Volatility Model
Under the risk-neutral probability measure, Gatherals double mean-reverting stochas-
tic volatility model (hereafter DMR-SV) is specied as follows:
dS
t
S
t
=rdt +
_
V
t
dW(t), S
0
= s
0
> 0,
dV
t
=(V

t
V
t
)dt +
1
V

t
dZ
1
(t), V
0
= v
0
> 0,
dV

t
=c(z
3
V

t
)dt +
2
V

t
dZ
2
(t), V

0
= v

0
> 0,
(7.10)
where the Brownian motions are correlated as
dZ
1
(t)dZ
2
(t) = dt, dW(t)dZ
1
(t) =
1
dt, dW(t)dZ
2
(t) =
2
dt.
(7.11)
Introduction to Part II 91
This model is presented in Gatheral (2007) [49], its further development in Gatheral
(2008a) [51] and Gatheral (2008b) [50]. In this model, S
t
represents the price
process of a stock or index. The instantaneous variance level V
t
reverts to the moving
intermediate level V

t
at rate k, while V

t
reverts to the long-term level z
3
at the
slower rate c < k. In the dynamics (7.10), r is the instantaneous interest rate, which
is assumed to be a constant;
1
and
2
are the volatility parameter for V
t
and
V

t
, respectively; and are the constant elasticity parameters for V
t
and V

t
,
respectively. By adding such a moving intermediate level, an additional freedom is
given compared to traditional two-factor stochastic volatility models, e.g. Heston
(1993) [61], etc. It provides a new perspective, from nancial economics, for us to
capture more about the dynamics of stochastic volatility. In this dissertation, we
focus on the study of the double mean-reverting volatility process (V
t
, V

t
).
The CEV (constant elasticity of volatility) type parameters are chosen as ,
[1/2, 1]. According to Gatheral [50], the models are classied as:
Double Heston for the case of = = 1/2,
Double Log-normal for the case = = 1,
Double CEV for any other cases.
We note that both V
t
and V

t
are always nite and positive. For the case of double
log-normal ( = = 1), this property of (V
t
, V

t
) can be seen from its explicit solution.
PROPOSITION 8. When = = 1, the linear stochastic dierential equation
Introduction to Part II 92
governing the bivariate diusion (V
t
, V

t
) can be solved explicitly as
V

(t) =exp
_
ct +
2
B
2
(t)
1
2

2
2
t
_

_
V

0
+ cz
3
_
t
0
exp
_
cu
2
B
2
(u) +
1
2

2
2
u
_
du
_
,
V (t) =exp
_
t +
1
B
1
(t)
1
2

2
1
t
_

_
V
0
+
_
t
0
exp
_
u
1
B
1
(u) +
1
2

2
1
u
_
V

(u)du
_
.
(7.12)
For the case = = 1, the probability distribution of (V
t
, V

t
) is not strictly log-
normal, however, according to the local behavior of the dynamics we rationally call
it double log-normal, which is consistent with Gatheral (2008) [50]. We note that
with
2
= 0 and c = 0, the double log-normal model becomes the -SABR model of
Henry-Labordere (2008) [60]. In this case, the dynamics of the variance process V (t)
follows a continuous-time version of the well-known GARCH(1, 1) model. It assumes
that the randomness of the variance process varies with the variance, as opposed to
the square root of the variance in the Heston (1993) [61] model. It is a special case
of the Generalized Autoregressive Conditional Heteroskedasticity (GARCH) model
(see Bollerslev (1986) [11]), which is popular for estimating stochastic volatility. We
note that Gatherals model is compatible with the models on forward variance such
as Dupire (1993) [38], Bergomi (2005) [6] and Buehler (2006) [19]. The dynamics of
Gatherals model (7.10) is implied by properly selecting a variance curve functional
(see Gatheral (2008) [50]).
It makes sense to add at least one more factor to the traditional two-factor stochastic
volatility models, because we know from the principle component analysis (PCA) of
volatility surface time series that there are at least three important modes of uctu-
ation, namely level, term structure and skew. By employing three factors, Gatherals
Introduction to Part II 93
DMR-SV model is able to price options on S&P 500, VIX and realized variance con-
sistently. It generates a correct S&P 500 volatility skew for short expirations with no
need for jumps. Moreover, the model ts the option market with time homogeneous
parameters.
Gatheral (2007, 2008) [50, 49, 51] demonstrates that the DMR-SV model is able to
t consistently to the market of options on VIX, S&P 500 and realized variance very
well. Gatherals [50] step-by-step calibration strategy begins with estimating some
parameters via the analysis of time series data, and then identies others via tting
options on S&P 500 and VIX. In the procedure of tting option values, his method
heavily relies on Monte Carlo simulation, which is very time-consuming when a large
amount of computation is needed. Gatheral (2007, 2008) [50, 49, 51] suggested that
the local log-normal structure (the case of = = 1) works well in terms of tting
the market; nevertheless the optimal parameter set, which is freely calibrated to the
market, indicates that = = 0.94 1. In this paper, based on the tradeo
between the performance and the relative simplicity of the case = = 1, we are
motivated to provide and implement an ecient asymptotic expansion formula for
pricing VIX options under the double log-normal model. We explicitly derive the rst
three expansion terms and prove the validity of our approach rigorously. Following
our probabilistic computation approach and theoretical basis, better accuracy for
longer maturity options can be obtained by adding more correction terms.
Though the double log-normal model works well, a minor limitation one should keep
in mind, as commented in Staunton (2009) [86], is that the underlying variable (V
t
, V

t
)
is conditionally stable.
Introduction to Part II 94
PROPOSITION 9. (V
t
, V

t
) has nite second moments if and only if
2 >
2
1
and 2c >
2
2
. (7.13)
Proof. Indeed, this can be seen from straightforward computation on the moments
through Itos lemma. Let us take V

(t) as an example. We can compute that
EV

(t) = e
ct
V

0
+ z
3
(1 e
ct
). (7.14)
Thus, by applying Itos lemma and solving an ODE, we nd that
EV

(t)
2
=e
(2c
2
2
)t
V
2
0
+
2cz
3
(V

0
z
3
)
c
2
2
(e
ct
e
(2c
2
2
)t
) +
2cz
2
3
2c
2
2
(1 e
(2c
2
2
)t
)

2c
2c
2
2
z
2
3
as t , only if 2c >
2
2
.
(7.15)
Similarly, we nd the stability condition 2 >
2
1
for V (t).
If the stability condition (7.13) is violated, one of the practical consequences of this is
that the Monte Carlo simulation would generate unreasonably large values of V

(t),
which might lead to the divergence of the numerical computation results. In addition,
the growth of the second moment of V
t
as time t increasing is inconsistent with the
historical time series of VIX and the price of options on VIX. Therefore, we advocate
the consideration of the parameters restriction (7.13) when the double log-normal
model is calibrated to the market data.
The rest of this part is organized as follows. In chapter 8, we set up the valuation
problem for VIX option under the double log-normal model. Then, we present an
asymptotic expansion formula for pricing VIX options. By deriving this formula,
we essentially provide a generally applicable asymptotic expansion method for e-
Introduction to Part II 95
cient valuation of derivatives under non-ane multidimensional diusion models. In
chapter 9, we explore the computing performance by conducting a set of numerical
experiments. In chapter 10, the validity of our expansion is justied via the theory
of Malliavin-Watanabe-Yoshida.
Chapter 8
Valuation of Options on VIX under
Gatherals Double Log-normal
Stochastic Volatility Model
There are mainly two approaches to derive asymptotic expansions for derivatives val-
uation. One is the PDE based singular (regular) perturbation method, for example,
Hagan et al. (2002) [56] and Andersen and Brotherton-Ratclie (2005) [3]. Another
one is based on probabilistic techniques. For example, Kunitomo and Takahashi
(2001) [70] and Osajima (2007) [82] employed the computation of the conditional
expectation of Wiener-Ito chaos (see Nualart et al. (1988) [81]) to derive asymptotic
expansions for the valuation of interest rate derivatives. In this section, we derive an
ecient asymptotic expansion formula for pricing options on VIX under Gatherals
model probabilistically. Beyond the valuation of options on VIX under Gatherals
model, our method provides a generally applicable platform for a wide variety of
valuation problems. We begin with the pathwise Taylor expansion of the underlying
96
VIX Option Valuation 97
diusion and write the expansion terms in the form of Lebesgue integration. Sub-
sequently, we inductively compute each correction terms. The computation is based
on the conditional mixed Brownian moments, which is easier to implement compared
with the Wiener-Ito chaos. The convergence of our asymptotic expansion is rigorously
justied via the Theory of Malliavin-Watanabe-Yoshida.
8.1 Basic Setup
In the following sections, we use V IX to denote

V IX for notational convenience,
since we work under a consistent model and ignore the discretization error in approx-
imation (7.8). First, the squared VIX can be represented by a linear combination of
instantaneous variance, intermediate level and long-term level.
PROPOSITION 10. Under Gatherals DMR-SV models,
V IX
2
t
= E
Q
_
1
T
_
t+T
t
V
s
ds

T
t
_
= a
1
V
t
+ a
2
V

t
+ a
3
z
3
, (8.1)
where
a
1
=
1
T

1 e
T

,
a
2
=
1
T


c
_
1 e
cT
c

1 e
T

_
,
a
3
= 1
1
T

1 e
T

.
(8.2)
Based on the fact that the function f(x) = (1 e
x
)/x is decreasing and bounded by
1 as well as the modeling requirement of c < k, we have that a
1
> 0, a
2
> 0, a
3
> 0.
Because of the mean-reverting feature in V
t
and V

t
, the mean-reversion of VIX is
modeled explicitly from (8.1).
VIX Option Valuation 98
Proof. By taking expectations on the bivariate diusion of (V
t
, V

t
), we arrive at an
ODE system
E
t
V
t+T
V
t
=
_
t+T
t
(E
t
V

s
E
t
V
s
)ds,
E
t
V

t+T
V
t
= cz
3
T c
_
t+T
t
E
t
V

s
ds.
(8.3)
It is straightforward to solve it to obtain E
t
V
s
for s > t. Thus, by integration, we nd
the coecients a
1
, a
2
and a
3
as dened in (8.2) for representing squared V IX. This
yields the statement in (8.1).
Following a standard no-arbitrage argument (see the treatment of stochastic volatility
in Gatheral (2006) [48]), the price of a VIX call option with maturity T and strike K
can be represented as the risk-neutral expectation of the discounted payo, i.e.
C
t
= e
r(Tt)
E
Q
_
_
100
_
a
1
V
T
+ a
2
V

T
+ a
3
z
3
K
_
+

T
t
_
. (8.4)
In this expression, we multiply 100 with the theoretical VIX dened in (7.4), according
to the convention and denition of VIX (see (7.3) and (7.2)).
REMARK 9. We start from a physical specication of the double mean-reverting
stochastic volatility model. Empirically, we add two auxiliary securities, within which
volatility risk are embedded, to complete the market. For instance, we may choose
S&P500 options or variance swaps to accomplish this market completion procedure.
Then, we construct a risk-free self-nancing portfolio consisting of
t
shares of V IX
2
t
,
which can be replicated by a stripe of out-of-money options (see (7.7) and (7.3)),
(1)
t
shares of the auxiliary security with value process A
1
(t) and
(2)
t
shares of the
auxiliary security with value process A
2
(t). By taking a long position in the VIX
call option (with value C
V IX
t
) and by shorting all others, the portfolio value at time
VIX Option Valuation 99
t is given by
P(t) = C
V IX
t

t
V IX
2
t

(1)
t
A
1
(t)
(2)
t
A
2
(t).
Therefore, by a no-arbitrage argument based on dP(t) = rP(t)dt and a straightfor-
ward calculation using Itos lemma, we nd a PDE governing the VIX option price
given a judicious choice of the mathematical form of the market price of volatility
risk. By the Feynman-Kac theorem (see Karatzas and Shreve (1991)), the VIX option
price admits the risk-neutral expectation form as in (8.23), while the corresponding
risk-neutral specication of the double mean-reverting model is exhibited as in (7.10).
Meanwhile, a theoretical delta-hedging strategy is suggested as

t
=
C
V IX
t
V IX
2
t
,
(1)
t
=
C
V IX
t
A
1
(t)
,
(2)
t
=
C
V IX
t
A
2
(t)
. (8.5)
By straightforward computation, we nd that
C
V IX
t
V IX
2
t
=
C
V IX
t
V
t
V
t
V IX
2
t
+
C
V IX
t
V

t
V

t
V IX
2
t
,
C
V IX
t
V
t
=
C
V IX
t
A
1
(t)
A
1
(t)
V
t
+
C
V IX
t
A
2
(t)
A
2
(t)
V
t
,
C
V IX
t
V

t
=
C
V IX
t
A
1
(t)
A
1
(t)
V

t
+
C
V IX
t
A
2
(t)
A
2
(t)
V

t
.
(8.6)
Thus, (
t
,
(1)
t
,
(2)
t
) can be solved from (8.6) as

t
=
1
a
1
C
V IX
t
V
t
+
1
a
2
C
V IX
t
V

t
,

(1)
t
=
A
2
(t)
V

t
C
V IX
t
Vt

A
2
(t)
Vt
C
V IX
t
V

t
A
2
(t)
V

t
A
1
(t)
Vt

A
2
(t)
Vt
A
1
(t)
V

t
,

(2)
t
=
A
1
(t)
V

t
C
V IX
t
Vt

A
1
(t)
Vt
C
V IX
t
V

t
A
2
(t)
Vt
A
1
(t)
V

t

A
2
(t)
V

t
A
1
(t)
Vt
.
(8.7)
VIX Option Valuation 100
The dynamic hedging portfolio might be expensive, but it can be constructed by a
certain amount of shares of the two auxiliary securities and a stripe of out-the-money
(OTM) options which replicates V IX
2
. More specically, in the hedging portfolio,
we need to hold

i
(t) =
2 10
4
T
K
i
K
2
i
e
rT
_
1
a
1
C
V IX
t
V
t
+
1
a
2
C
V IX
t
V

t
_
number of shares of an European option with strike K
i
.
8.2 An Asymptotic Expansion Formula for VIX
Option Valuation
Despite the simplicity in (8.1), the payo of European call options on VIX is highly
nonlinear. In addition, the double log-normal model is not analytically tractable in
the sense that the joint characteristic function of (V
t
, V

t
) is not easy to obtain in
closed form. Therefore, we employ an asymptotic expansion technique to nd an
explicit formula for approximating the option price:
C
V IX
0
= e
rT
E
Q
_
_
100
_
a
1
V
T
+ a
2
V

T
+ a
3
z
3
K
_
+
_
. (8.8)
We let =
2

T, the total volatility of the intermediate level, be the quantity based


on which asymptotic expansion is performed. This choice is inspired by the calibration
result in Gatheral (2008) [50]. As of April 2007, Gatheral (2008) [50] nds that

1
= 2.6 and
2
= 0.45 when a double CEV model is calibrated to the VIX option
market;
1
= 7 and
2
= 0.94 when a double log-normal model is calibrated. Both
of these cases suggest that
2
should be a relatively small quantity. In addition to
VIX Option Valuation 101
the requirement that c < k, we may expect that the intermediate level reverts at a
lower speed and is more stable. However, we note that these modeling assumptions
are still subject to further empirical tests if possible. Under certain market condition
where the intermediate level of the volatility is not so volatile (say,
2
< 1), the choice
=
2

T may accelerate the convergence comparing to expanding according to

T.
We also note that this choice of expansion parameter resembles that of the SABR
expansion based on the small vol. of vol. in Hagan (2002) et al. [56]. Even for
the case when is not small enough, we can still conduct an expansion to obtain a
satisfactory approximation once enough correction terms are added. An analog to
support this reasoning is that the Taylor expansion for exponential function e
x
can
be performed, i.e.
e
x
=
N

n=0
1
n!
x
n
+O
_
[x[
N+1
(N + 1)!
_
, as n , for any arbitrary x R. (8.9)
In Theorem 5, we present the key result about an asymptotic expansion representation
of the VIX option price. In order to obtain signicant accuracy of the approxima-
tion for actively traded short maturity options, for example one-month options, we
explicitly expand the price up to the rst four correction terms, each of which is a
combination of polynomials, normal density and cumulative distribution functions.
Higher order terms can be similarly computed by using the method we present in the
next section. In Remark 10, we give an alternative asymptotic expansion formula, for
the rst four correction terms, based on the choice of parameter as =

T, which
exclusively depends on the option maturity. In section 8.3, detailed derivation of the
formula in Theorem 5 is explicitly carried out via scaling, pathwise Taylor expansion
around = 0, computation of conditional mixed Brownian moments, etc.
VIX Option Valuation 102
THEOREM 5. The price of an option on VIX with strike K and maturity T admits
the following asymptotic expansion:
C
V IX
0
= 100 e
r

2
2
_

1
(y) +
2

2
(y) +
3

3
(y) +
4

4
(y) +O(
5
)
_
. (8.10)
Here
y =
K/100 X
0

,
where =
2

T and
X
0
=
_
a
1
V
0
+ a
2
V

0
+ a
3
z
3
, =
_
a
2
1

2
1
V
2
0
+ a
2
2

2
2
V
2
0
+ 2a
1
a
2

2
V
0
V

0
2X
0

2
.
In the expansion (8.10), we have that

1
(y) =(y) y(1 N(y)),

2
(y) =(
0
+
1
)(1 N(y)) +
1
y(y),

3
(y) =
_
1
2

2
+
3
+ (2 +y
2
)
4
_
(y),

4
(y) =
_

5
y
7
+
6
y
5
+
7
y
3
+
8
y
_
(y) + 2
9
(1 N(y)),
(8.11)
VIX Option Valuation 103
where
i
s are either constants or polynomials of y:

0
=
2
1
+
2
2
+ ,

1
=
2
1
+
2
2
+ ,

2
=3
2
2
(y) +
2
1
(y) +
2
0
(y) + 2
0
(y)
2
(y),

3
=
7
+
1
12X
0
_

1
+
2

2
+ 3
3

2
1
+ 3
4

2
2
+

5

1
2
2
2
+

6

2
2
2
2
_
,

4
=
8
+
1
12X
0
_

3
1
+
4

3
2
_
,

5
=

3
1
6
,

6
=
1
48
2
X
2
0
[a
2
1
V
2
0

5
1

5
1
+ a
1
a
2
V

0
V
0

2
1

2
2

2
2
(
1

1
+
2

2
)
2
1
+ a
2
2
V
2
0

5
2

5
2
+ 24
3
X
0
(2
2
1
+
8

4
) + 24
2
X
2
0

1
(2
2
1
+ (
2
1
+
2
2
+ )
1
+ 4(
1

1

2

2
)
2
)],

7
=
1
48
2
X
2
0
[a
2
2
V

0

3
2
(
5cz
3

2
2
2V

0
((
2

2
2
5
2
2
)
2
2
+
4c

2
2
))
3
2
+ a
2
1
V
0

2
1

2
1
(
V

0
(5
1

1
+3
2

2
)

2
2

2V
0

1
((
2

2
2
5
2
1
)
2
1
+
4

2
2
))
2
X
0
(a
1
V
0

4
1

4
1
+ 192
2

2
1

2
1
384
2

1

2

1

a
2
V

4
2

4
2
+24
2

2
1
+192
2

2
2

2
2
24
7
+24
3
+48
2

4
+96
1
(
2
1
+
2
2
+)) +
24
2
X
2
0
(4(
2
1
+
2
2
+)
2
1
+(3
2

4
1
+2(8
2
1
+3
2
2
+)
2
1
+32
1

2

2

1
+
3
2

4
2
+
2
+2(8
2
2
)
2
2
)
1
+4(
1

1

2

2
)
2
) a
1
a
2
(
cV
0
z
3

2
1
(2
1

1
+3
2

2
)
2
1

2
2

V
2
0

2
2
(3
1

1
+5
2

2
) +V

0
V
0
(
1
(3
2
2
(
1

2
2

2
1
)
2
2
+ 6
1

2

1

2

2
2
+
2
1
((
1

2
2

2
2
)
2
2
+
2c

2
2
))
3
1
+
2

2
(
2
2
(
1

2
2

2
1
)
2
2
+6
1

2

1

2

2
2
+3
2
1
((
1

2
2

2
2
)
2
2
+
2c

2
2
))
2
1
+6
1

2
2

1
+
2
2

3
2
))],

8
=
1
48
(120
3

6
1
+
3(5a
2
1
V
2
0

1

5
1
48
2

3
X
0
+24
2

2
X
2
0
(5
2
2
+2
1
))
4
1

2
X
2
0

2
X
2
0
[3(2X
0
(a
1
V
0

2
1

4
1
+
16
2

2
1
+ 48
2
2
+ 16 + 8
2

1
)
2
+ 8X
2
0
(15
2

4
2
6( 2
1
)
2
2
+
(8
2
1
+4
1
))
2
+a
1
V
0

2
1
(
4a
1

1
(V
0
(
2
1
+2)2V

0
)
1

2
2
+a
2
(
1

1
+
2

2
)(V

0
((
1

2
2
3
2
2
)
2
2
+
2c

2
2
)
2cz
3

2
2
)))
2
1
] +
1

2
X
2
0
[6
2
(32X
0
(
2
+2X
0
)
1

2
+a
1
a
2

2
(
2
2
V
2
0

2
+V
0
(

2
1

2
+

1
((
1

2
2

2
2
)
2
2
+
2c

2
2
)
1
+
2
2

2
)V

0

2cV
0
z
3

2
2
))
1
] + 120
3

6
2
+
3a
1
V
0

4
1

4
1
X
0
+
3a
2
V

4
2

4
2
X
0
+
VIX Option Valuation 104
3(
5a
2
2
V
2
0

2

5
2

2
X
2
0
+24
2
(2
1
)
48
2

X
0
)
4
2
+8
3

72
2

2
1
X
0

8a
1
V

0

2
1

2
13
(
2
+2+
2
)X
0

2
2

8ca
2
z
3

2
23
(
2
+2+
2
)X
0
+
4a
1
V

0

2
23
(
2
+2+
2
)X
0

6a
1
V
0

4
1

2
1
X
0

2
2
+
12a
1
V

0

2
1

2
1
X
0

2
2

12a
1
V
0

2
1

2
1
X
0

2
2
+
9a
2
1
V

0
V
0

3
1

2
1

2
X
2
0

4
2
+
9a
2
1
V

0
V
0

3
1

2
1

2
X
2
0

4
2

6a
2
V

0

2
2

2
2
X
0
+
12ca
2
z
3

2
2
X
0

12ca
2
V

2
2
X
0
+
9ca
2
2
V

0
z
3

2
2

2
X
2
0

2
+
9ca
2
2
V

0
z
3

2
2

2
X
2
0

9a
1
a
2
V
2
0

2
2

2
X
2
0

9a
1
a
2
V
2
0

2
2

2
X
2
0

2
X
2
0
[3(8X
2
0
(8
2
2
+4
1
)
2
+2X
0
(8
1

2
+16 +(16
2

2
a
2
V

0

4
2
)
2
2
)
2
+
a
2
V

0
(4a
2

2
(V

0
(
2
2
+2c)2cz
3
)
2
a
1
(2V

0
V
0
(
2
1
+2))(
1

1
+
2

2
)))
2
2
]48
2

48
2

1
X
0

48
2

3
X
0

144
2

4
X
0
+
3a
1
a
2
V
2
0

1

13

2
+2+
2
X
2
0

2
2
+
3a
2
1
V

0
V
0

3
1

13

2
+2+
2
X
2
0

4
2

6ca
1
a
2
V

0
z
3

13

2
+2+
2
X
2
0

4
2

6
2
a
2
1
V
2
0

1

13

2
+2+
2
X
2
0

4
2
+
6ca
1
a
2
V
2
0

1

13

2
+2+
2
X
2
0

4
2
+
6
2
a
2
1
V

0
V
0

13

2
+2+
2
X
2
0

4
2
+
3ca
2
2
V

0
z
3

23

2
+2+
2
X
2
0

3a
1
a
2
V
2
0

23

2
+2+
2
X
2
0

6c
2
a
2
2
z
2
3

23

2
+2+
2
X
2
0

3
2
+
3ca
1
a
2
V
0
z
3

2
1

23

2
+2+
2
X
2
0

3
2

3a
2
1
V

0
V
0

2
1

23

2
+2+
2
X
2
0

3
2
+
6c
2
a
2
2
V

0
z
3

23

2
+2+
2
X
2
0

3
2
+
6ca
1
a
2
V
0
z
3

23

2
+2+
2
X
2
0

3
2
+
6
2
a
2
1
V
2
0

23

2
+2+
2
X
2
0

3
2

6ca
1
a
2
V
2
0

23

2
+2+
2
X
2
0

3
2

6
2
a
2
1
V

0
V
0

23

2
+2+
2
X
2
0

3
2
+
3a
1
a
2
V

0
V
0

3
1

2
X
2
0

2
2

9a
1
a
2
V
2
0

1

2
X
2
0

2
2
+
6a
1
a
2
V

0
V
0

2
X
2
0

2
2

6ca
1
a
2
V
0
z
3

2
1

2
X
2
0

3
2
+
6a
2
1
V

0
V
0

2
1

2
X
2
0

3
2
+
3a
2
1
V
2
0

5
1

2
X
2
0

4
2

6ca
1
a
2
V
0
z
3

3
1

2
X
2
0

4
2
+
12a
2
1
V
2
0

3
1

2
X
2
0

4
2

21a
2
1
V

0
V
0

3
1

2
X
2
0

4
2
+
6ca
1
a
2
V

0
V
0

3
1

2
X
2
0

4
2
+
12ca
1
a
2
V

0
z
3

2
X
2
0

4
2

12ca
1
a
2
V
0
z
3

2
X
2
0

4
2
+
12
2
a
2
1
V
2
0

1

2
X
2
0

4
2

12ca
1
a
2
V
2
0

1

2
X
2
0

4
2
+
12
2
a
2
1
V
2
0

1

2
X
2
0

4
2

24
2
a
2
1
V

0
V
0

2
X
2
0

4
2
+
12ca
1
a
2
V

0
V
0

2
X
2
0

4
2
+
3a
2
2
V
2
0

2

2
X
2
0
+
4a
1
V

0

2
X
0

2
+
9a
1
a
2
V
2
0

1

2
X
2
0

2
2
+
9a
1
a
2
V
2
0

1

2
X
2
0

2
2
+
9ca
1
a
2
V
0
z
3

2
1

2
X
2
0

3
2
+
9ca
1
a
2
V
0
z
3

2
1

2
X
2
0

3
2

9a
2
1
V

0
V
0

2
1

2
X
2
0

3
2

9a
2
1
V

0
V
0

2
1

2
X
2
0

3
2
+
3a
1
a
2
V

0
V
0

2
1

2
X
2
0

21ca
2
2
V

0
z
3

2
X
2
0

2
+
12ca
2
2
V
2
0

2

2
X
2
0

2
+
3a
1
a
2
V
2
0

2

2
X
2
0

2
+
6a
1
a
2
V

0
V
0

2
X
2
0

6a
1
a
2
V
2
0

1

2
X
2
0

2
2
+
12c
2
a
2
2
z
2
3

2
X
2
0

3
2

9ca
1
a
2
V
0
z
3

2
1

2
X
2
0

3
2
+
3a
2
1
V

0
V
0

2
1

2
X
2
0

3
2
+
6ca
1
a
2
V

0
V
0

2
1

2
X
2
0

3
2

24c
2
a
2
2
V

0
z
3

2
X
2
0

3
2
+
12ca
1
a
2
V

0
z
3

2
X
2
0

3
2

12ca
1
a
2
V
0
z
3

2
X
2
0

3
2
+
12c
2
a
2
2
V
2
0

2

2
X
2
0

3
2

12ca
1
a
2
V
2
0

2

2
X
2
0

3
2
+
12ca
1
a
2
V

0
V
0

2
X
2
0

3
2

6a
1
a
2
V

0
V
0

3
1

2
2

2

3
1

2

2
X
2
0

48
2

X
0
),

9
=
1
96X
0
[3a
1
V
0

4
1

4
1

6a
1
V
0

2
1

4
1

2
2
+
3a
1
V
0

4
1

4
2

8a
1
V

2
13

2
1
(
2
+2+
2
)
2
2
+
8a
1
V

0

2
13

2
1

4
2
+
12a
1
V

0

2
1

2
1

2
2

12a
1
V
0

2
1

2
1

2
2

12a
1
V

0

2
1

4
2
+
12a
1
V
0

2
1

4
2

4a
1
V

0

3
2

4a
1
V

3
2
+
4a
1
V

0

2
+3a
2
V

0

4
2

4
2
+
(3a
1
V
0

4
1
72
2

2
)
4
1
+(3a
2
V

0

4
2
72
2

2
)
4
2
24
2

2
72
2

2
1
+
4a
1
V

0

2
23

2
+2+
2

8ca
2
z
3

2
23

2
+2+
2

4a
1
V

0

2
23

2
2
+
8ca
2
z
3

2
23

2
2
6a
2
V

0

2
2

2
2
12ca
2
V

0

2
2
+ 12ca
2
z
3

2
2
6(8
1

2
+ 8(2
2
2
+
)
2
+a
2

2
2
(V

0
((
1

2
2

2
2
)
2
2
+
2c

2
2
)
2cz
3

2
2
))
2
2
+3a
2
V

0
48
2

1
48
2

3
144
2

4
+
192
2

2

1

2
6
2
1
(a
1
V
0

2
1

4
1
+
a
1
V
0

4
1

2
2

2a
1
V

0

2
1

2
2
+
2a
1
V
0

2
1

2
2
+8
2
+16
2

2
1
+
24
2

2
2
+8
2

1
)+
12ca
2
V

2
2

12ca
2
z
3

2
2

12
2
a
1
V

0

4
2

12ca
1
V

4
2
+
12c
2
a
2
V

0

4
2
+
12
2
a
1
V
0

4
2
+
12ca
1
z
3

4
2

12c
2
a
2
z
3

4
2
].
VIX Option Valuation 105
N(y) and (y) are standard normal CDF and PDF respectively, i.e.,
N(y) =
_
y

2
e

x
2
2
dx, (y) =
1

2
e

y
2
2
.
The various coecients are dened as
=
a
1

2
1
V
0
4X
0
, =
a
2

2
2
V

0
4X
0
, =

2X
0
, =
a
1

1
V
0
2
_
F(0)
, =
a
2

2
V

0
2
_
F(0)
,
=
1
4
_
F(0)
2
2
[2a
1
(V

0
V
0
) a
1

2
1
V
0
+ 2a
2
c(z
3
V

0
) a
2

2
2
V

0
],
(8.12)
and

0
(y) =
1
y
2
+ ,
1
(y) = (2
1

1
2
2

2
)y,
2
(y) =
0
,
(8.13)
where

1
=
+

2
+
2
+ 2
,
2
=
+

2
+
2
+ 2
,
2
1
=
(1
2
)
2

2
2
(
2
+
2
+ 2)
,

2
2
=
(1
2
)
2

2
2
(
2
+
2
+ 2)
,
13
=
+
_

2
+
2
+ 2
,
23
=
+
_

2
+
2
+ 2
,
(8.14)
as well as

1
= (6a
1

1
V
0
3a
1
V
0

3
1
)
1

2
2
,
2
=
_
6a
1

2
V

0
+ a
2
(6c
2
V

0
3
3
2
V

0
)

2
2
,

3
= a
1

3
1
V
0
,
4
= a
2

3
2
V

0
,
5
= 6a
1

1
V

0
,
6
= 6a
2

2
cz
3
6a
1

2
V

0
,

7
=

0
X
0
,
8
=

1
X
0
.
(8.15)
REMARK 10. If choosing =

T as the expansion parameter, we keep most of


the expressions in Theorem 5. For example, we make the following modications of
VIX Option Valuation 106
our O(
4
)-expansion for =
2

T . First, the expansion is expressed as


C
V IX
0
= 100 e
rT
_

1
(y) +
2

2
(y) +
3

3
(y) +O(
4
)
_
. (8.16)
The modications in the coecients are
=
_
a
2
1

2
1
V
2
0
+ a
2
2

2
2
V
2
0
+ 2a
1
a
2

2
V
0
V

0
2X(0)
, (8.17)
and

3
=
7
+
1
12X
0
_

1
+
2

2
+ 3
3

2
1
+ 3
4

2
2
+

5

1
2
+

6

2
2
_
, (8.18)
and
=
1
4
_
F(0)
[2a
1
(V

0
V
0
) a
1

2
1
V
0
+ 2a
2
c(z
3
V

0
) a
2

2
2
V

0
], (8.19)
and

2
1
=
(1
2
)
2

2
+
2
+ 2
,
2
2
=
(1
2
)
2

2
+
2
+ 2
, (8.20)
as well as

1
=6a
1

1
V
0
3a
1
V
0

3
1
,

2
=6a
1

2
V

0
+ a
2
(6c
2
V

0
3
3
2
V

0
).
(8.21)
Due to the similarity, in the subsequent sections, we derive and implement the asymp-
totic expansion formula in Theorem 5 only.
VIX Option Valuation 107
8.3 Derivation of the Asymptotic Expansion
In this section, we start with scaling the model and then perform a pathwise Taylor
expansion around = 0. Further, we express the expansion of the payo using
generalized Wiener functionals. Finally, we provide a clear road map about explicit
computation of each correction term. We begin with scaling the model and then
expand it into a pathwise Taylor expansion form. The explicit computation follows
from conditional Gaussian mixed moments.
8.3.1 Scaling of the Model
We begin with scaling the model to bring forth the ner local behavior of the diusion
process. We let
V

(t) = V

2
t
, V

(t) = V

2
t
, (8.22)
for any > 0. In this dissertation, we choose =
2

T.
REMARK 11. A good analog to make sense of this scaling procedure is as follows.
Let us recall the construction of Brownian motion W
t
(see Karatzas and Shreve
[68]). For a simple random walk M
n
, we have
1
n
M
[n
2
t]
W
t
.
It is intuitive that we obtain a Brownian motion via looking at longer horizon and
scaling the magnitude by
1
n
. Now, we do the reverse of this construction procedure.
Starting from Brownian motion W
t
, we look at a short horizon
t
n
2
and amplify the
magnitude of each moving step by multiplying n times, in this way we recognize much
VIX Option Valuation 108
ner local behavior of the Brownian motion. Therefore, a random walk is obtained,
i.e.
nW t
n
2
M
t
.
Here
1
n
plays the same role as the scaling parameter does for our valuation problem.
It is natural to expect better analytical tractability for the scaled diusion (8.22)
because we magnify the local behavior of the original diusion (V
t
, V

t
).
Thus, the VIX option value can be represented as follows.
C
V IX
0
=e
rT
E
Q
_
_
_
a
1
V
T
+ a
2
V

T
+ a
3
z
3
K
_
+
_
=e
r

2
2
E
Q
_
_
_

a
1
V

_
1

2
2
_
+ a
2
V

_
1

2
2
_
+ a
3
z
3
K
_
+
_
_
.
(8.23)
We derive the dynamics of (V

(t), V

(t)) by the Brownian scaling property. We also


notice that the correlation between Brownian motions is invariant under scaling.
PROPOSITION 11. Let
B
i
(t) =
1

Z
i
(
2
t). (8.24)
Then,
dB
1
(t)dB
2
(t) = dt.
i.e. the correlation between Brownian motions is invariant under scaling.
Proof. By computing the quadratic variation, we nd that
dB
1
(t)dB
2
(t) =dB
1
, B
2
)(t) = d
1

Z
i
(
2
),
1

Z
i
(
2
))
t
=
_
1

_
2
d
_

2

0
dZ
1
(s),
_

2

0
dZ
2
(s))
t
= dt.
(8.25)
VIX Option Valuation 109
Alternatively, we arrive at the conclusion from the denition of quadratic variation.
B
1
, B
2
)
t
=lim

i
(B
1
(t
i+1
) B
1
(t
i
))(B
2
(t
i+1
) B
2
(t
i
))
=
_
1

_
2
lim

i
(Z
1
(
2
t
i+1
) Z
1
(
2
t
i
))(Z
2
(
2
t
i+1
) Z
2
(
2
t
i
)) = t
(8.26)
Through integral variable substitution, we arrive at the following proposition.
PROPOSITION 12. The scaled diusion (V

(t), V

(t)) is governed by the fol-


lowing dynamics.
dV

(t) =
2
(V

(t) V

(t))dt +
1
V

(t)dB
1
(t), V

(0) = V
0
,
dV

(t) =
2
c(z
3
V

(t))dt +
2
V

(t)dB
2
(t), V

(0) = V

0
,
(8.27)
where B
1
(t) and B
2
(t) are two standard Brownian motions with instantaneous
correlation .
8.3.2 Derivation of the Asymptotic Expansion Formula
The proof of Theorem 5 is carried out in several steps as follows. We begin with
setting up the framework of the asymptotic expansion. Then, a clear road map for
computing explicit expansion terms via probabilistic approach follows.
Framework of the Asymptotic Expansion
We rst nd the Taylor expansion of the bivariate scaled diusion (V

(t), V

(t))
around = 0. In order to facilitate the computation, we write the expansion coe-
cients as polynomials of the underlying Brownian motion and Lebesgue integrals with
respect to time.
VIX Option Valuation 110
PROPOSITION 13. The bivariate scaled diusion (V

(t), V

(t)) admits the fol-


lowing Taylor expansion around = 0. For any n N, we have
V

(t) =
N

n=0
1
n!

n
V

(t)

=0

n
+O(
N+1
),
V

(t) =
N

n=0
1
n!

n
V

(t)

=0

n
+O(
N+1
),
(8.28)
where the derivatives of (V

(t), V

(t)) w.r.t satisfy that


V

(t)

=0
=V
0
,
V

(t)

=0
=
1
V
0
B
1
(t),

2
V

(t)

=0
=2(V

0
V
0
)t +
2
1
V
0
(B
2
1
(t) t),

3
V

(t)

=0
=6V

0
_
t
0
[
2
B
2
(u)
1
B
1
(u)]du + t[6
1
(V

0
V
0
) 3V
0

3
1
]B
1
(t) + V
0

3
1
B
1
(t)
3
,

4
V

(t)

=0
=12V

0
_
t
0
[
1
B
1
(u)
2
B
2
(u)]
2
du + 24
1
V

0
B
1
(t)
_
t
0
[
2
B
2
(u)
1
B
1
(u)]du
+ t[12
2
1
(V

0
V
0
) 6V
0

4
1
]B
1
(t)
2
+ V
0

4
1
B
1
(t)
4
+ t
2
[12
2
(V
0
V

0
)
+ 12
2
1
(V
0
V

0
) + 3V
0

4
1
+ 12c(z
3
V

0
) + 6V

0
(
2
1

2
2
)],
(8.29)
VIX Option Valuation 111
as well as
V

(t)

=0
=V

0
,
V

(t)

=0
=
2
V

0
B
2
(t),

2
V

(t)

=0
=2c(z
3
V

0
)t +
2
2
V

0
(B
2
2
(t) t)

3
V

(t)

=0
=6cz
3

2
_
t
0
B
2
(u)du + t[6c
2
(z
3
V

0
) 3V

3
2
]B
2
(t) + V

0

3
2
B
2
(t)
3
,

4
V

(t)

=0
=24cz
3

2
2
B
2
(t)
_
t
0
B
2
(u)du + 12cz
3

2
2
_
t
0
B
2
(u)
2
du + V

4
2
B
2
(t)
4
6t
2
2
B
2
(t)
2
[2c(V

0
z
3
) + V

0

2
2
] + 3t
2
_
2c +
2
2
_
[2c(V

0
z
3
) + V

0

2
2
].
(8.30)
Proof. Without loss of generality, we perform the Taylor expansion for V

(t). We
start with
V

t
= V

0
+
_
t
0

2
(V

(u) V

(u))du +
_
t
0

1
V

(u)dB
(1)
u
, V

0
= V
0
. (8.31)
and perform a Taylor expansion on around = 0. It is obvious that V

(t)

=0
= V
0
.
By dierentiating (8.31) on both sides with respect to , we nd that
V

(t)

=0
=
_
t
0
2(V

(u) V

(u))du +
_
t
0

_
V

(u)


V

(u)

_
du
+
_
t
0
_

1
V

(u) +
1
V

(u)

_
dB
1
(u)

=0
=
1
V
0
B
1
(t).
(8.32)
Further dierentiation yields that

2
V

(t)

=0
= 2(V

0
V
0
)t +
2
1
V
0
(B
2
1
(t) t)
VIX Option Valuation 112
and

3
V

(t)

=0
=(6
1
V
0
t 3
3
1
V
0
t)B
1
(t) + 6
2
V

0
tB
2
(t) +
3
1
V
0
B
3
1
(t)
+ 6
1
V

0
_
t
0
udB
1
(u) 6
2
V

0
_
t
0
udB
2
(u).
(8.33)
By Itos Lemma, we obtain the expression in Proposition 13 by rewriting the stochas-
tic integrals (Wiener-Ito chao terms) in (8.33) as Lebesgue integrals. Similarly, we
derive the higher order terms.
REMARK 12. Since the system (8.27) can be solved explicitly as
V

(t) =exp
_

2
ct +
2
B
2
(t)
1
2

2
2
t
_

_
V

0
+
2
cz
3
_
t
0
exp
_

2
cu
2
B
2
(u) +
1
2

2
2
u
_
du
_
;
V

(t) =exp
_

2
t +
1
B
1
(t)
1
2

2
1
t
_

_
V
0
+
2

_
t
0
exp
_

2
u
1
B
1
(u) +
1
2

2
1
u
_
V

(u)du
_
,
(8.34)
the Taylor expansion around = 0 can be obtained via direct dierentiation of the
above expression.
Next, let us denote
F() = a
1
V

_
1

2
2
_
+ a
2
V

_
1

2
2
_
+ a
3
z
3
. (8.35)
VIX Option Valuation 113
By Taylor expansion, the underlying random variable in (8.23) reads
X

=
_
F() =
_
F(0) +
F

(0)
2
_
F(0)
+
1
2
_

(0)
2
4F(0)
3
2
+
F

(0)
2
_
F(0)
_

2
+
1
6
_
3F

(0)
3
8F(0)
5
2

3F

(0)F

(0)
4F(0)
3
2
+
F

(0)
2
_
F(0)
_

3
+
1
24
_
F
(4)
(0)
2
_
F(0)

3F

(0)
2
4F(0)
3/2

15F

(0)
4
16F(0)
7/2

F
(3)
(0)F

(0)
F(0)
3/2
+
9F

(0)
2
F

(0)
4F(0)
5/2
_

4
+O(
5
),
(8.36)
where
F(0) = a
1
V
0
+ a
2
V

0
+ a
3
z
3
,
and for n N,
F
(n)
(0) =
_
a
1

n
V

n
_
1

2
2
_
+ a
2

n
V

n
_
1

2
2
__

=0
. (8.37)
Employing a deterministic quantity to be determined for computational purpose,
we rewrite that
X

=
_
F() = X
0
+ (X
1
+
2
X
2
+
3
X
3
+
4
X
4
+O(
5
)),
VIX Option Valuation 114
where
X
0
=
_
F(0),
X
1
=
1

(0)
2
_
F(0)
,
X
2
=
1
2
_

(0)
2
4F(0)
3
2
+
F

(0)
2
_
F(0)
_
,
X
3
=
1
6
_
3F

(0)
3
8F(0)
5
2

3F

(0)F

(0)
4F(0)
3
2
+
F

(0)
2
_
F(0)
_
,
X
4
=
1
24
_
F
(4)
(0)
2
_
F(0)

3F

(0)
2
4F(0)
3/2

15F

(0)
4
16F(0)
7/2

F
(3)
(0)F

(0)
F(0)
3/2
+
9F

(0)
2
F

(0)
4F(0)
5/2
_
.
(8.38)
We emphasize following inductive algebraic relations, which are important for simpli-
fying the calculation of each correction term based on the ones obtained in previous
steps.
X
1
=
1

(0)
2X
0
, X
2
=
F

(0)
4X
0

X
2
1
2X
0
, X
3
=
F

(0)
12X
0

X
1
X
2
X
0
,
X
4
=
F
(4)
(0)
48X
0


2
X
2
2
2X
0


2
X
1
X
3
X
0
.
(8.39)
We select such that X
1
is a standard normal variable, i.e. X
1
N(0, 1). Indeed,
we have
X
1
= B
_
1

2
2
_
+ B
2
_
1

2
2
_
,
where
=
a
1

1
V
0
2
_
F(0)
, =
a
2

2
V

0
2
_
F(0)
.
It is easy to nd that
V arX
1
=
a
2
1

2
1
V
2
0
+ a
2
2

2
2
V
2
0
+ 2a
1
a
2

2
V
0
V

0
4
2
F(0)
2
2
.
VIX Option Valuation 115
Thus, is selected according to
=
1

a
2
1

2
1
V
2
0
+ a
2
2

2
2
V
2
0
+ 2a
1
a
2

2
V
0
V

0
4F(0)
.
We rewrite the strike as K = 100 (X
0
+ y). Meanwhile, we dene a translated
underlying variable
Y

=
X

X
0

= X
1
+ X
2
+
2
X
3
+
3
X
4
+O(
4
). (8.40)
REMARK 13. The reason why we dene the translated variable Y

is as follows.
We note that Y

X
1
N(0, 1), as 0 pathwise. The Malliavin non-degeneracy
of X
1
allows us to obtain the uniform non-degeneracy of Y

, which veries the validity


of our asymptotic expansion. (See chapter 10 for detailed discussion.)
Let us denote f(x) = x
+
. Thus, we have that
C
V IX
0
= 100 e
r

2
2
E
Q
f(Y

y).
In an appropriate weak sense,

x
f(x y) = 1
(y,+)
(x),

2
x
2
f(x y) =
y
(x),

3
x
3
f(x y) =

y
(x),
where
y
denotes the Dirac function centered at y. By Taylor expansion, we nd that
f(Y

y) =
N

n=0
1
n!

(n)
x
n
f(Y

y)

=0

n
+ O(
N+1
).
We denote
n
(y) =
1
n!

(n)
x
n
f(Y

y)

=0
and recall that
VIX Option Valuation 116
Y

= X
1
+ X
2
+
2
X
3
+
3
X
4
+ O(
4
),
where
X
1
= Y
0
, X
2
=
Y

=0
, X
3
=
1
2

2
Y

=0
, X
4
=
1
6

3
Y

=0
.
Thus, we nd that

0
(y) = (X
1
y)
+
,

1
(y) = 1
(y,+)
(X
1
)X
2
,

2
(y) =
1
2
_

y
(X
1
)X
2
2
+ 1
(y,+)
(X
1
)(2X
3
)

3
(y) =
y
(X
1
)X
2
X
3
+
1
6

y
(X
1
)X
3
2
+ 1
(y,+)
(X
1
)X
4
.
(8.41)
Next, we calculate the correction terms E
Q
[
0
(y)], E
Q
[
1
(y)], E
Q
[
2
(y)] and E
Q
[
3
(y)]
explicitly.
Preliminary Results on Brownian Moments
Our computation relies on the explicit knowledge of moments of the underlying Brow-
nian motion. In this section, we collect several auxiliary results which are useful for
the computation of each correction term.
PROPOSITION 14. For the two-dimensional Brownian motion B
1
(t), B
2
(t) and
VIX Option Valuation 117
any 0 < u t, we have the following conditional normal distributions.
_
_
_
_
_
_
B
1
(u)
B
2
(t)
_
_
_

B
1
(t) + B
2
(t) = y
_
_
_
N
_
_
_
_
_
_
u
t

1
y

2
y
_
_
_
,
_
_
_
u
u
2
t

1
( + ) u u
1
( + )
u u
1
( + ) t t
2
( + )
_
_
_
_
_
_
,
(8.42)
and
_
_
_
_
_
_
B
1
(t)
B
2
(u)
_
_
_

B
1
(t) + B
2
(t) = y
_
_
_
N
_
_
_
_
_
_

1
y
u
t

2
y
_
_
_
,
_
_
_
t t
1
( + ) u u
1
( + )
u u
1
( + ) u
u
2
t

1
( + )
_
_
_
_
_
_
,
(8.43)
and
_
_
_
_
_
_
B
2
(u)
B
2
(t)
_
_
_

B
1
(t) + B
2
(t) = y
_
_
_
N
_
_
_
_
_
_
u
t

2
y

2
y
_
_
_
,
_
_
_
u
u
2
t

2
( + ) u u
2
( + )
u u
2
( + ) t t
2
( + )
_
_
_
_
_
_
,
(8.44)
and
_
_
_
_
_
_
B
1
(u)
B
1
(t)
_
_
_

B
1
(t) + B
2
(t) = y
_
_
_
N
_
_
_
_
_
_
u
t

1
y

1
y
_
_
_
,
_
_
_
u
u
2
t

1
( + ) u u
1
( + )
u u
1
( + ) t t
1
( + )
_
_
_
_
_
_
,
(8.45)
VIX Option Valuation 118
where the various coecients are dened in Theorem 5.
Without loss of generality, we verify the distributional property (8.42) for the case
u = t =
1

2
2
, which is the key for deriving the rst three correction terms. Let us
denote
Z
1
=
_
_
_
B
1
_
1

2
2
_
B
2
_
1

2
2
_
_
_
_
, Z
2
= B
1
_
1

2
2
_
+ B
2
_
1

2
2
_
.
We note that (Z
1
, Z
2
)
T
is a three-dimensional normal variable N(, ), where
= (
1
,
2
)
T
= ((0, 0)
T
, 0)
T
and
=
_
_
_

11

12

21

22
_
_
_
=
1

2
2
_
_
_
_
_
_
_
_
_
_
1
1
_
_
_
_
_
_
+
+
_
_
_
_
+ +
_

2
+
2
+ 2
_
_
_
_
_
_
_
.
Thus, we have the following lemma, which appears as a special case of Proposition
14.
LEMMA 7.
(Z
1
[Z
2
= y) N((y), ),
where
=
_
_
_

1
(y)

2
(y)
_
_
_
=
1
+
12

1
22
(y
2
) =
y

2
+
2
+ 2
_
_
_
+
+
_
_
_
(8.46)
VIX Option Valuation 119
and
= (
ij
)
22
=
_
_
_

2
1

1

2

2
2
_
_
_
=
11

12

1
22

21
=
1

2
2
1
2

2
+
2
+ 2
_
_
_


2
_
_
_
,
(8.47)
with = 1.
Based on Proposition 14 and Lemma 7, we are able to compute explicitly some Gaus-
sian moments, which are important to the calculation of the correction terms. For
example, we consider the case of u = t = 1/
2
2
. The conditional moment generating
function of (B
1
(t), B
2
(t)) given X
1
= B
1
(t) + B
2
(t) = y is
M(
1
,
2
) := exp
_

1
(y)
1
+
2
(y)
2
+
1
2

2
1

11
+
1

12
+
1
2

2
2

22
_
,
1
,
2
R.
Thus, the conditional moment satises
M
ij
:= E[B
1
(t)
i
B
2
(t)
j
[B
1
(t) + B
2
(t) = y] =

i+j

2
M(
1
,
2
)

1
=
2
=0
.
Using this idea, we explicitly compute the following conditional Gaussian moments,
which are useful for the derivation of each correction term.
COROLLARY 5. For the two-dimensional Brownian motion B
1
(t), B
2
(t), the
following identities on conditional moments hold.
VIX Option Valuation 120
E(B
1
(t) [B
1
(t) + B
2
(t) = x) =
1
x,
E(B
2
1
(t) [B
1
(t) + B
2
(t) = x) =
2
1
x
2
+
2
1
,
E(B
3
1
(t) [B
1
(t) + B
2
(t) = x) =
3
1
x
3
+ 3
2
1

1
x,
E(B
4
1
(t) [B
1
(t) + B
2
(t) = x) =
4
1
x
4
+ 6
2
1

2
1
x
2
+ 3
4
1
,
E(B
5
1
(t) [B
1
(t) + B
2
(t) = x) =
5
1
x
5
+ 10
2
1

3
1
x
3
+ 15
1

4
1
x,
E(B
2
(t) [B
1
(t) + B
2
(t) = x) =
2
x,
E(B
2
2
(t) [B
1
(t) + B
2
(t) = x) =
2
2
x
2
+
2
2
,
E(B
3
2
(t) [B
1
(t) + B
2
(t) = x) =
3
2
x
3
+ 3
2
2

2
x,
E(B
4
2
(t) [B
1
(t) + B
2
(t) = x) =
4
2
x
4
+ 6
2
2

2
2
x
2
+ 3
4
2
,
E(B
5
2
(t) [B
1
(t) + B
2
(t) = x) =
5
2
x
5
+ 10
2
2

3
2
x
3
+ 15
2

4
2
x,
(8.48)
and
E(B
1
(u)[B
1
(t) + B
2
(t) = x) =
u
t
x
_

2
+
2
+ 2

13
,
E(B
2
1
(u)[B
1
(t) + B
2
(t) = x) =
2
13
[
u(t u)
t
+ (
u
t
)
2
x
2

2
+
2
+ 2
] + (1
2
13
)u,
E(B
2
(u)[B
1
(t) + B
2
(t) = x) =
u
t
x
_

2
+
2
+ 2

23
,
E(B
2
2
(u)[B
1
(t) + B
2
(t) = x) =
2
23
[
u(t u)
t
+ (
u
t
)
2
x
2

2
+
2
+ 2
] + (1
2
23
)u,
(8.49)
VIX Option Valuation 121
and
E(B
1
(t)
2
B
2
(t)[B
1
(t) + B
2
(t) = x) =
2
1

2
x
3
2
1

1
x +
2
1

2
x,
E(B
1
(t)B
2
(t)
2
[B
1
(t) + B
2
(t) = x) =
1

2
2
x
3
2
1

2
x +
2
2

1
x,
E(B
1
(t)
3
B
2
(t)
2
[B
1
(t) + B
2
(t) = x) =6
1

2
1

2
x
3
+ (
2
2
+ x
2

2
2
)
3
1
x
3
+ 6
2
1

2
2

1
x
6
3
1

2
x + 3
2
1

1
x(
2
2
+ x
2

2
2
),
E(B
1
(t)
2
B
2
(t)
3
[B
1
(t) + B
2
(t) = x) =6
1

2
2
x
3
+ (
2
1
+ x
2

2
1
)
3
2
x
3
+ 6
2
1

2
2

2
x
6
1

3
2

1
x + 3
2
2

2
x(
2
1
+ x
2

2
1
),
(8.50)
and
E(B
1
(u)B
2
(u)[B
1
(t) + B
2
(t) = x) =u
( + )
1
u
2
t
+
x
2

2
u
2
t
2
,
E(B
1
(t)B
2
(u)[B
1
(t) + B
2
(t) = x) =u u( + )
1
+
u
1

2
x
2
t
,
E(B
1
(t)B
1
(u)[B
1
(t) + B
2
(t) = x) =
u
2
13
t
x
2

2
+
2
+ 2
+ u(1
2
13
),
E(B
2
(t)B
2
(u)[B
1
(t) + B
2
(t) = x) =
u
2
23
t
x
2

2
+
2
+ 2
+ u(1
2
23
),
(8.51)
VIX Option Valuation 122
as well as
E(B
1
(t)
2
B
1
(u)[B
1
(t) + B
2
(t) = x) =2x
1
(u u( + )
1
)
+
ux
1
(x
2

2
1
t( + )
1
+ t)
t
,
E(B
1
(t)
2
B
2
(u)[B
1
(t) + B
2
(t) = x) =2x
1
(u u( + )
2
)
+
ux
2
(x
2

2
1
t( + )
1
+ t)
t
,
E(B
1
(u)B
2
(t)
2
[B
1
(t) + B
2
(t) = x) =2x
2
(u u( + )
1
)
+
ux
1
(x
2

2
2
t( + )
2
+ t)
t
,
E(B
2
(u)B
2
(t)
2
[B
1
(t) + B
2
(t) = x) =2x
2
(u u( + )
2
)
+
ux
2
(x
2

2
2
t( + )
2
+ t)
t
,
(8.52)
where the various coecients are dened in Theorem 5.
Subsequently, we calculate each correction term explicitly. We exhibit the framework
and techniques employed in the computation as follows.
Calculation of the Leading Order Term: E
Q
[
0
(y)]
It is easy to nd that
E
Q
[
0
(y)] =E
Q
(X
1
y)
+
=
_
R
(x y)
+
(x)dx = yN(y) + (y) y. (8.53)
Calculation of the Second Correction Term: E
Q
[
1
(y)]
To begin with, we observe that
E
Q
[
1
(y)] =E
Q
[1
(y,+)
(X
1
)X
2
] =
_
R
E
Q
[1
(y,+)
(x)X
2
[X
1
= x](x)dx
=
_

y
E
Q
[X
2
[X
1
= x](x)dx.
(8.54)
VIX Option Valuation 123
Thus, we focus on the calculation of conditional expectation E
Q
[X
2
[X
1
= x] as follows.
We recall that
X
1
= B
1
_
1

2
2
_
+ B
2
_
1

2
2
_
.
By algebraic computation, we nd that
X
2
=

2
X
2
1
2X
0
+
F

(0)
4X
0
=
_
B
1
_
1

2
2
__
2
+
_
B
2
_
1

2
2
__
2
+ + X
2
1
,
where , , , , , are dened in Theorem 5. Hence, it follows from the computation
of moments based on Lemma 7 that
E
Q
[X
2
[X
1
= x] = (
2
1
+
2
1
) + (
2
2
+
2
2
) + + x
2
=
0
+
1
x
2
,
where

0
=
2
1
+
2
2
+
and

1
=
2
1
+
2
2
+ .
Finally, we compute explicitly that
E
Q

1
(y) =
_

y
(
0
+
1
x
2
)(x)dx = (
0
+
1
)(1 N(y)) +
1
y(y).
Calculation of the Third Correction Term: E
Q
[
2
(y)]
By conditioning, we have that
VIX Option Valuation 124
E
Q

2
(y) =
1
2
_
R
E
_

y
(X
1
)X
2
2
+ 1
(y,+)
(X
1
)(2X
3
)[X
1
= x

(x)dx
=
1
2
E(X
2
2
[X
1
= y)(y) +
_

y
E(X
3
[X
1
= x)(x)dx.
(8.55)
Denote the two-dimensional normal variable (B
1
, B
2
) N(, ). Thus, it is easy to
see that
E(X
2
2
[X
1
= y) = E(B
2
1
+ B
2
2
+ + y
2
)
2
.
By Lemma 7, we decompose the correlated normal variables as:
B
1
=
1
W
1
+
1
,
B
2
=
2
(W
1
+
_
1
2
W
2
) +
2
=
2
W
1
+
2
,
(8.56)
where W
1
N(0, 1). Using the fundamental fact
EW
i
= 0, EW
2
i
= 1, EW
3
i
= 0, EW
4
i
= 3, for i=1, 2,
we nd that

2
:= E(X
2
2
[X
1
= y) = 3
2
2
(y) +
2
1
(y) +
2
0
(y) + 2
0
(y)
2
(y),
(8.57)
where

0
(y) = (
2
1
+
2
2
+ )y
2
+ ,
1
(y) = (2
1

1
2
2

2
)y,
2
(y) =
2
1
+
2
2
.
(8.58)
Now, we compute the conditional expectation E(X
3
[X
1
= x). It is straightforward to
nd that
E(X
3
[X
1
= x) =
7
x +
8
x
3
+
1
12X
0
E(F

(0)[X
1
= x)
VIX Option Valuation 125
where
F

(0) =
1
B
1
_
1

2
2
_
+
2
B
2
_
1

2
2
_
+
3
B
3
1
_
1

2
2
_
+
4
B
3
2
_
1

2
2
_
+
5
_ 1

2
2
0
udB
1
(u)+
6
_ 1

2
2
0
udB
2
(u),
with the coecients dened in the Theorem 5. By Corollary 5, we have that
E
_
B
1
_
1

2
2
_

X
1
= x
_
=
1
x,
E
_
B
2
_
1

2
2
_

X
1
= x
_
=
2
x,
E
_
B
3
1
_
1

2
2
_

X
1
= x
_
=
3
1
+ 3
1

2
1
=
3
1
x
3
+ 3
2
1

1
x,
E
_
B
3
2
_
1

2
2
_

X
1
= x
_
=
3
2
+ 3
2

2
2
=
3
2
x
3
+ 3
2
2

2
x,
E
_
_ 1

2
2
0
udB
1
(u)

X
1
= x
_
=

13
2
2
2
x
_

2
+
2
+ 2
=

1
2
2
2
x,
E
_
_ 1

2
2
0
udB
2
(u)

X
1
= x
_
=

23
2
2
2
x
_

2
+
2
+ 2
=

2
2
2
2
x,
(8.59)
where

1
=
+

2
+
2
+ 2
,
2
=
+

2
+
2
+ 2
,
and

13
=
+
_

2
+
2
+ 2
,
23
=
+
_

2
+
2
+ 2
.
REMARK 14. (A Brownian-Bridge-Based Calculation) The above identities can
be alternatively obtained from the Cholesky decomposition of correlated Brownian
motions and the properties of Brownian bridge. We let
B
3
(w) =
B
1
(w) + B
2
(w)
_

2
+
2
+ 2
,
VIX Option Valuation 126
which forms a standard Brownian motion B
3
(t) satisfying
Corr(dB
1
, dB
3
) =
13
dt, Corr(dB
2
, dB
3
) =
23
dt.
Thus,
E
_
_ 1

2
2
0
udB
i
(u)

X
1
= x
_
= E
_
_
w
0
udB
i
(u)

B
3
(w) =
x
_

2
+
2
+ 2
_
, (8.60)
where w =
1

2
2
. To compute this expectation, we rst observe that
_
w
0
udB
i
(u) = wB
i
(w)
_ w
0
B
i
(u)du. (8.61)
It is easy to obtain that, for i = 1, 2,
B
i
(t) =
i3
B
3
(t) +
_
1
2
i3
B

i
(t), (8.62)
where B

i
(t) is a Brownian motion independent of B
3
(t). So, equation (8.60) can
be further deduced from interchanging the order of conditional expectation and the
Lebesgue integration on time, i.e.
E
_
_ 1

2
2
0
udB
i
(u)

X
1
= x
_
=E
_
wB
i
(w)

B
3
(w) =
x
_

2
+
2
+ 2
_
E
_
_ w
0
B
i
(u)du

B
3
(w) =
x
_

2
+
2
+ 2
_
=wE
_
B
i
(w)

B
3
(w) =
x
_

2
+
2
+ 2
_

_ w
0
E
_
B
i
(u)

B
3
(w) =
x
_

2
+
2
+ 2
_
du.
(8.63)
VIX Option Valuation 127
Based on the property of Brownian bridge, we observe that
E
_
B
3
(u)

B
3
(w) =
x
_

2
+
2
+ 2
_
=
u
w
x
_

2
+
2
+ 2
. (8.64)
This, we complete the computation of (8.60).
Finally, it follows that
E(X
3
[X
1
= x) =
3
x +
4
x
3
,
where

3
=
7
+
1
12X
0
_

1
+
2

2
+ 3
3

2
1
+ 3
4

2
2
+

5

1
2
2
2
+

6

2
2
2
2
_
,

4
=
8
+
1
12X
0
_

3
1
+
4

3
2
_
.
(8.65)
Hence, by explicit integration we nd that
_
+
y
E(X
3
[X
1
= x)(x)dx =
_
+
y
(
3
x +
4
x
3
)(x)dx = (y)(
3
+ (2 +y
2
)
4
).
Calculation of the Fourth Correction Term: E
Q
[
3
(y)]
We briey outline the framework and techniques for computing the fourth order
correction term in this section. First, by conditioning, we have that
E
3
(y) =
_
+

E(
3
(y)[X
1
= x)(x)dx, (8.66)
where
E(
3
(y)[X
1
= x) =E(
y
(X
1
)X
2
X
3
[X
1
= x)
+
1
6
E(

y
(X
1
)X
3
2
[X
1
= x) +E(1
(y,+)
(X
1
)X
4
[X
1
= x).
(8.67)
VIX Option Valuation 128
Therefore, we nd that
E
3
(y) = A(y) + B(y) + C(y),
where
A(y) = E(X
2
X
3
[X
1
= y)(y),
B(y) =
1
6

y
E(X
3
2
[X
1
= y)(y),
C(y) =
_
+
y
E(X
4
[X
1
= x)(x)dx.
(8.68)
Here, we have used the following integration by parts formula for Dirac Delta function,
i.e. for any function g and n N,
_
+

g(x)
(n)
y
(x)dx =
_
+

g
x
(x)
(n1)
y
(x)dx.
Next, we compute A(y), B(y) and C(y), respectively.
We begin with the following inductive algebraic relations, which allow us to make
use of the previous computation results to derive new ones. These observations are
helpful for reducing the computational load.
X
2
=
F

(0)
4X
0

X
2
1
2X
0
, X
3
=
F

(0)
12X
0

X
1
X
2
X
0
, X
4
=
F
(4)
(0)
48X
0


2
X
2
2
2X
0


2
X
1
X
3
X
0
.
(8.69)
For term A(y), we have that
A(y) =
_
1
12X
0
_
1
4X
0
E(F

(0)F

(0)[X
1
= y)
y
2
2X
0
E(F

(0)[X
1
= y)
_

y
X
0
E(X
2
2
[X
1
= y)
_
(y),
(8.70)
where
VIX Option Valuation 129
E(X
2
2
[X
1
= y) = 3
2
2
(y) +
2
1
(y) +
2
0
(y) + 2
0
(y)
2
(y),
and
E(F

(0)[X
1
= y) = 12X
0
[(
3

7
)y + (
4

8
)y
3
],
and E(F

(0)F

(0)[X
1
= y) is a new quantity to compute. Based on (8.37), F

(0)F

(0)
can be expanded explicitly as a combination of polynomials and Lebesgue integrals,
with respect to time, of the underlying Brownian motions. Thus, we accomplish the
explicit computation of conditional moments by using the identities in Corollary 5.
Without loss of generality, we demonstrate the computation on one of such terms.
For example, we need to compute
E
_
B
1
(t)
2
_
t
0
B
2
(u)du

B
1
(t) + B
2
(t) = x
_
.
Indeed, this conditional expectation is equal to
_
t
0
E(B
1
(t)
2
B
2
(u)[B
1
(t) + B
2
(t) = x)du
=
_
t
0
_
2x
1
(u u( + )
2
) +
ux
2
(x
2

2
1
t( + )
1
+ t)
t
_
du
=
1
2
t
2
1

2
y
3
+
_
t
2

1
+
1
2
t
2

3
2
t
2

3
2
t
2

2
_
y.
(8.71)
VIX Option Valuation 130
For term B(y), we observe that
E
Q
(X
3
2
[X
1
= y)
=E(B
2
1
+ B
2
2
+ + y
2
)
3
=E((
1
W
1
+
1
)
2
+ (
2
W
1
+
2
)
2
+ + y
2
)
3
=E(
2
(y)W
2
1
+
1
(y)W
1
+
0
(y))
3
=15
2
(y)
3
+ 9
0
(y)
2
(y)
2
+ 3(
0
(y)
2

2
(y) +
0
(y)
1
(y)
2
) +
0
(y)
3
.
(8.72)
For term C(y), we observe that
E(X
4
[X
1
= x) =
1
48X
0
E(F
(4)
(0)[X
1
= x)

2
2X
0
E(X
2
2
[X
1
= x)

2
x
X
0
E(X
3
[X
1
= x),
where it is known from the previous computation that
E(X
2
2
[X
1
= x) = 3
2
2
(x) +
2
1
(x) +
2
0
(x) + 2
0
(x)
2
(x),
and that
E(X
3
[X
1
= x) =
3
x +
4
x
3
.
For any constants c
i
, i = 1, ..., 5, we have that
_
+
y
(c
0
+ c
1
x + c
2
x
2
+ c
3
x
3
+ c
4
x
4
)(x)dx
=(c
0
+ c
2
+ 3c
4
)(1 N(y)) +(y)[(c
1
+ 2c
3
) + (c
2
+ 3c
4
)y + c
3
y
2
+ c
4
y
3
].
(8.73)
This fact renders an explicit calculation of term C(y).
Finally, the price of VIX option C
V IX
0
(see (8.23)) admits the following asymptotic
VIX Option Valuation 131
expansion:
C
V IX
0
= 100 e
r

2
2
_

1
(y) +
2

2
(y) +
3

3
(y) +
4

4
(y) +O(
5
)
_
, (8.74)
where

1
(y) =(y) y(1 N(y)),

2
(y) =(
0
+
1
)(1 N(y)) +
1
y(y),

3
(y) =
1
2

2
(y) + (y)(
3
+ (2 +y
2
)
4
),

4
(y) =
_

5
y
7
+
6
y
5
+
7
y
3
+
8
y
_
(y) + 2
9
(1 N(y)).
(8.75)
Chapter 9
Implementation and Numerical
Examples
In this chapter, we demonstrate the eciency of our asymptotic expansion formula
in Theorem 5 with some numerical experiments. First, we employ a bias-corrected
Monte Carlo simulation scheme as a benchmark, to which the implementation of the
formula is compared. We recall that
C
V IX
0
= 100 e
rT
E
_
_
a
1
V
T
+ a
2
V

T
+ a
3
z
3

K
100
_
+
.
9.1 Benchmark from Monte Carlo Simulation: Eu-
ler Scheme with Partial Truncation
Due to the positivity of the diusion processes (V
t
, V

t
), we adopt a biased-corrected
Euler discretization scheme of partial truncation (see Lord et al. (2008)[76]). By the
132
Implementation and Numerical Examples 133
Cholesky decomposition of Brownian motion, we rewrite the dynamics of (V
t
, V

t
) as
follows
dV
t
=(V

t
V
t
)dt +
1
V
t
d
1
(t),
dV

t
=c(z
3
V

t
)dt +
2
V

t
d[d
1
(t) +
_
1
2
d
2
(t)],
(9.1)
where (
1
(t),
2
(t)) is a standard two-dimensional Brownian motion. Thus the
partial truncation scheme can be designed as
V
i+1
=V
i
+ (V

i
V
i
)t +
1
(V
i
0)

tZ
(1)
i
,
V

i+1
=V

i
+ c(z
3
V

i
)t +
2
(V

i
0)[

tZ
(1)
i
+
_
1
2

tZ
(2)
i
],
(9.2)
where Z
(1)
i
, Z
(2)
i
is an independent two-dimensional standard normal sequences. In
the implementation, we choose a reasonable length of the time step and number of
simulation trials to minimize the mean square error.
9.2 Implementation of our Asymptotic Expansion
Formula
To demonstrate the numerical performance of our asymptotic expansion formula, we
use model parameters similar to those estimated in Gatheral (2008) [50, 51], which
were found by calibrating the model to the market VIX option prices data in April
2007. We adjust the value of parameter
2
slightly so that the stability condition (7.13)
is satised. We assume a risk free rate of 4.00%. Table 9.1 gives this parameter set.
Accordingly, the initial value for VIX is calculated as VIX
0
= 17.47. We conduct
numerical experiments to compute the prices of options on VIX for dierent strikes
and maturities. Because of the large trading volume and the high liquidity of options
Implementation and Numerical Examples 134
on VIX with strikes around the initial value of the underlying VIX, we select the
range of strikes used for our numerical illustration to be from 14 to 23. For each case,
we compare the computing performance of the formulae employing the expansion
up to indicated order of convergence, including O(
5
), O(
4
), O(
3
) and O(
2
). We
regard the Monte Carlo simulation results as benchmark. In Table 9.2, all numerical
results are exhibited. It takes about 60 milliseconds to compute one value from our
asymptotic expansion formula while the simulation takes much longer time, on average
about 230 CPU seconds for each by sampling 10
3
time steps with 10
6
simulation trials,
in order to achieve satisfactory level of standard error (in the magnitude of 10
5
in
our examples shown in Table 9.2). We can observe a signicant saving in computing
time using our asymptotic expansion formula as compared to Monte Carlo simulation.
INPUT PARAMETERS Values
Risk Free Rate r 0.04
Time Horizon of VIX T 0.082
Correlation 0.57
Initial Instantaneous Variance V
0
0.0137
Initial Intermediate Level V

0
0.0208
Long-Term Intermediate Level z
3
0.078
Rate of Mean Reversion 5.5
Rate of Mean Reversion c 0.1
Volatility of the Instantaneous Variance
1
2.6
Volatility of the Intermediate Level
2
0.44
Table 9.1: Input Parameters
Also, we plot the value matching between asymptotic expansion valuation and
Monte Carlo simulation. We observe that the satisfactory tting of the VIX option
prices is obtained for actively traded short maturity (for example, up to one-month)
options as shown in Figure 9.1. Motivated by the geometric Brownian motion model
for VIX in Whaley (1993) [91], in the numerical comparison between our asymptotic
expansion formula and Monte Carlo simulation, we also convert the VIX option prices
Implementation and Numerical Examples 135
computed from both of the two approaches into the Black-Scholes implied volatility.
From Figure 9.2, we observe the tting of the Black-Scholes implied volatility for the
relatively short maturities, one-month at least, and the deviation magnied at the
out-of-money side. We also plot and illustrate the computing errors from applying
the formulae with various convergence orders, including O(
5
), O(
4
), O(
3
) and O(
2
)
in Figure 9.3(a). For the sake of completeness, we plot the absolute errors in Fig-
ure 9.3(b). We observe the signicant improvement on the numerical performance
by adding more correction terms in our asymptotic expansion. All implementations
algorithms are programmed in C++ and executed on a laptop PC with a Intel(R)
Pentium(R) M 1.73GHz processor and 1GB of RAM running Windows XP Profes-
sional.
I
m
p
l
e
m
e
n
t
a
t
i
o
n
a
n
d
N
u
m
e
r
i
c
a
l
E
x
a
m
p
l
e
s
1
3
6
Strike K/100 14% 15% 16% 17% 18% 19% 20% 21% 22% 23%
One-Week Options (T = 0.020)
Simulation 3.61737 2.61029 1.62319 0.791609 0.307392 0.102895 0.0288509 0.008203 0.0019101 0.000525892
O(
5
) 3.61195 2.61458 1.62181 0.794438 0.309904 0.10202 0.0314812 0.0105287 0.00246737 0.000268122
O(
4
) 3.61526 2.6117 1.61779 0.794843 0.31096 0.10765 0.0353047 0.00842071 0.00106723 6.38707e-005
O(
3
) 3.60992 2.60225 1.62238 0.819213 0.334626 0.110925 0.0257443 0.00345634 0.000241747 8.45948e-006
O(
2
) 3.46876 2.47755 1.53341 0.749812 0.259619 0.0575766 0.00757776 0.000561627 2.26518e-005 4.74539e-007
Two-Week Options (T = 0.040)
Simulation 3.74353 2.73528 1.77447 0.999683 0.514822 0.253688 0.115983 0.0546813 0.0241671 0.0112798
O(
5
) 3.76485 2.744 1.76633 1.001 0.518915 0.253306 0.117863 0.0602953 0.0371945 0.0199837
O(
4
) 3.75286 2.72414 1.75957 1.00332 0.522148 0.266348 0.143391 0.0765393 0.0335712 0.0105687
O(
3
) 3.7263 2.72042 1.80068 1.07601 0.593829 0.304875 0.13746 0.0496842 0.0134282 0.00261447
O(
2
) 3.47802 2.5217 1.64916 0.936648 0.444189 0.169694 0.0506926 0.0115692 0.0019821 0.000251593
Three-Week Options (T = 0.060)
Simulation 3.85696 2.84889 1.90744 1.15636 0.66977 0.38257 0.207609 0.116959 0.0639251 0.0356879
O(
5
) 3.9048 2.85061 1.88643 1.15137 0.671838 0.380767 0.206683 0.114592 0.0798014 0.0649857
O(
4
) 3.85972 2.81643 1.87967 1.15701 0.678537 0.401012 0.254474 0.171235 0.108433 0.0573259
O(
3
) 3.83055 2.84557 1.97562 1.29278 0.813076 0.493557 0.279588 0.139707 0.0586066 0.0200014
O(
2
) 3.50327 2.58384 1.75956 1.08295 0.589673 0.278553 0.112243 0.0380465 0.0107281 0.00249429
One-Month Options (T = 0.083)
Simulation 3.97402 2.9668 2.04005 1.30086 0.81126 0.506535 0.304207 0.189602 0.116331 0.072158
O(
5
) 4.03703 2.95017 1.9965 1.28147 0.804713 0.498159 0.296003 0.170324 0.114329 0.104945
O(
4
) 3.9533 2.90465 1.99223 1.2926 0.817018 0.527392 0.367472 0.278368 0.211932 0.146608
O(
3
) 3.94944 2.9942 2.16762 1.51541 1.03838 0.698638 0.451386 0.269705 0.143754 0.066617
O(
2
) 3.54476 2.66137 1.87558 1.22434 0.730706 0.393925 0.189795 0.0809836 0.0303704 0.00994781
One-and-One-Half-Month Options (T = 0.125)
Simulation 4.15701 3.15166 2.24055 1.50635 1.00931 0.685393 0.451759 0.307855 0.20924 0.142487
O(
5
) 4.2109 3.07856 2.13401 1.43862 0.966496 0.646782 0.414967 0.243632 0.139806 0.112256
O(
4
) 4.07047 3.02339 2.1401 1.46437 0.993537 0.695583 0.527361 0.441224 0.38937 0.33528
O(
3
) 4.17172 3.26713 2.49596 1.87892 1.4063 1.04625 0.763316 0.534019 0.350053 0.211046
O(
2
) 3.63616 2.8024 2.06262 1.43938 0.945713 0.581203 0.332128 0.175556 0.0854423 0.03814
Two-Month Options (T = 0.167)
Simulation 4.30802 3.30456 2.40238 1.66554 1.1602 0.823556 0.569775 0.406407 0.289565 0.207371
O(
5
) 4.31628 3.14835 2.20539 1.52009 1.0522 0.727549 0.47945 0.276282 0.126356 0.0563953
O(
4
) 4.13725 3.09444 2.22862 1.56638 1.09979 0.800743 0.633207 0.556767 0.52741 0.50376
O(
3
) 4.39851 3.53538 2.80233 2.20809 1.73945 1.3684 1.06471 0.806773 0.585569 0.401381
O(
2
) 3.73395 2.93583 2.22609 1.62023 1.12688 0.745763 0.467793 0.277145 0.154597 0.0809722
Table 9.2: The table above shows the prices of options on VIX for dierent strikes and maturities, computed from
dierent methods: Monte Carlo simulation and the asymptotic expansion formulae. We compare the computing per-
formance of the formulae computation employing the expansion up to each indicated order of convergence, including
O(
5
), O(
4
), O(
3
) and O(
2
).
Implementation and Numerical Examples 137
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0
0.5
1
1.5
2
2.5
3
3.5
4
Strike/100
V
I
X

O
p
t
i
o
n

P
r
i
c
e
Comparison of the Valuation for Oneweek VIX Options from Two Approaches for Each Strike


Monte Carlo Simulation
Asymptotic Expansion
(a) One-week
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0
0.5
1
1.5
2
2.5
3
3.5
4
Strike/100
V
I
X

O
p
t
i
o
n

P
r
i
c
e
Comparison of the Valuation for Twoweek VIX Options from Two Approaches for Each Strike


Monte Carlo Simulation
Asymptotic Expansion
(b) Two-week
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0
0.5
1
1.5
2
2.5
3
3.5
4
Strike/100
V
I
X

O
p
t
i
o
n

P
r
i
c
e
Comparison of the Valuation for Threeweek VIX Options from Two Approaches for Each Strike


Monte Carlo Simulation
Asymptotic Expansion
(c) Three-week
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0
0.5
1
1.5
2
2.5
3
3.5
4
Strike/100
V
I
X

O
p
t
i
o
n

P
r
i
c
e
Comparison of the Valuation for Onemonth VIX Options from Two Approaches for Each Strike


Monte Carlo Simulation
Asymptotic Expansion
(d) One-month
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
Strike/100
V
I
X

O
p
t
i
o
n

P
r
i
c
e
Comparison of the Valuation for Oneandahalfmonth VIX Options from Two Approaches for Each Strike


Monte Carlo Simulation
Asymptotic Expansion
(e) One-and-a-half-month
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
Strike/100
V
I
X

O
p
t
i
o
n

P
r
i
c
e
Comparison of the Valuation for Twomonth VIX Options from Two Approaches for Each Strike


Monte Carlo Simulation
Asymptotic Expansion
(f) Two-month
Figure 9.1: This set of graphs illustrates the comparison of the VIX option prices
computed from the Monte Carlo simulation and our O(
5
) asymptotic expansion.
The maturities range from one week to two month.
Implementation and Numerical Examples 138
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0.5
0.6
0.7
0.8
0.9
1
1.1
1.2
1.3
Strike/100
I
m
p
l
i
e
d

V
o
l
a
t
i
l
i
t
y
Comparison of the BlackScholes Implied Volatility for Oneweek VIX Options


Monte Carlo Simulation
Asymptotic Expansion
(a) One-week
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0.5
0.6
0.7
0.8
0.9
1
1.1
1.2
Strike/100
I
m
p
l
i
e
d

V
o
l
a
t
i
l
i
t
y
Comparison of the BlackScholes Implied Volatility for Twoweek VIX Options


Monte Carlo Simulation
Asymptotic Expansion
(b) Two-week
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0.5
0.6
0.7
0.8
0.9
1
1.1
1.2
Strike/100
I
m
p
l
i
e
d

V
o
l
a
t
i
l
i
t
y
Comparison of the BlackScholes Implied Volatility for Threeweek VIX Options


Monte Carlo Simulation
Asymptotic Expansion
(c) Three-week
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0.5
0.55
0.6
0.65
0.7
0.75
0.8
0.85
0.9
0.95
Strike/100
I
m
p
l
i
e
d

V
o
l
a
t
i
l
i
t
y
Comparison of the BlackScholes Implied Volatility for Onemonth VIX Options


Monte Carlo Simulation
Asymptotic Expansion
(d) One-month
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0.45
0.5
0.55
0.6
0.65
0.7
0.75
0.8
0.85
0.9
Strike/100
I
m
p
l
i
e
d

V
o
l
a
t
i
l
i
t
y
Comparison of the BlackScholes Implied Volatility for Oneandahalfmonth VIX Options


Monte Carlo Simulation
Asymptotic Expansion
(e) One-and-a-half-month
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0.35
0.4
0.45
0.5
0.55
0.6
0.65
0.7
0.75
0.8
0.85
Strike/100
I
m
p
l
i
e
d

V
o
l
a
t
i
l
i
t
y
Comparison of the BlackScholes Implied Volatility for Twomonth VIX Options


Monte Carlo Simulation
Asymptotic Expansion
(f) Two-month
Figure 9.2: This set of graphs illustrates the comparison of the Black-Scholes implied
volatilities computed from the Monte Carlo simulation and our O(
5
) asymptotic
expansion. The maturities range from one week to two month.
Implementation and Numerical Examples 139
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0.3
0.2
0.1
0
0.1
0.2
0.3
0.4
0.5
Strike/100
E
r
r
o
r

i
n

V
I
X

o
p
t
i
o
n

p
r
i
c
e
s
Error Comparison among Different Expansions for Onemonth Option Values


Up to the 4th Correction
Up to the 3rd Correction
Up to the 2nd Correction
Up to the 1st Correction
(a) Error
0.15 0.16 0.17 0.18 0.19 0.2 0.21 0.22 0.23
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
Strike/100
A
b
s
o
l
u
t
e

E
r
r
o
r

i
n

V
I
X

o
p
t
i
o
n

p
r
i
c
e
s
Absolute Error Comparison among Different Expansions for Onemonth Option Values


Up to the 4th Correction
Up to the 3rd Correction
Up to the 2nd Correction
Up to the 1st Correction
(b) Absolute Error
Figure 9.3: This graph illustrates the comparison of errors and absolute errors, respec-
tively, resulting from employing the asymptotic expansion formulae up to dierent
convergence orders, including O(
5
), O(
4
), O(
3
) and O(
2
). For instance, we com-
pute the prices of options on VIX with maturity one month. The error is interpreted
by the dierence between the formulae value and Monte Carlo simulation value. The
absolute error is the absolute value of the error.
Chapter 10
On the Validity of the Asymptotic
Expansion
In this chapter, we justify the validity of our asymptotic expansion in Theorem 5.
The following theorem characterizes the magnitude of the asymptotic error explicitly.
THEOREM 6. Let us denote C
V IX
0
(k) the price of VIX option with strike k. There
exists R > 0, such that, for any N N, we have

C
V IX
0
(100 (X
0
+ y)) 100 e
r

2
2
N

k=1

k
(y)

R
N+1
,
where the various quantities are dened in Theorem 5.
We employ the Malliavin-Watanabe-Yoshida theory on asymptotic expansion for gen-
eralized Wiener functional to justify Theorem 6. For the readers convenience, we
document a brief introduction to the theory of Malliavin calculus and the Malliavin-
Watanabe-Yoshida theory on asymptotic expansion, where the Watanabe theory
(1987) [90] and its further renement by Yoshida [93, 92, 94] are briey surveyed.
140
On the Validity of the Asymptotic Expansion 141
First of all, we establish the following proposition which leads to Theorem 6.
PROPOSITION 15. For any arbitrary y R and f(x) = max(x, 0), we have that
[E
Q
f(Y

y) E
Q
[
0
(y) +
1
(y) +
2

2
(y) +
3

3
(y)][ R
4
, (10.1)
for some constant R > 0, where
i
(y), i = 1, 2, 3, 4, are dened in (8.41).
The proof of Proposition 15 is carried out in several steps as follows. We sketch the
proof and omit some tedious routine details. In the proof, the notations related to
the Malliavin calculus are explained in Appendix 10.
First of all, by the Cholesky decomposition, we identify a two-dimensional Wiener
process W
1
(t), W
2
(t) such that
B
1
(t) = W
1
(t),
B
2
(t) = W
1
(t) +
_
1
2
W
2
(t).
(10.2)
In the following exposition, our justication is carried out on the two-dimensional
Wiener space associated to W
1
(t), W
2
(t).
Because the SDE system is linear, by Theorem 2.2.2 of Nualart (2006), the bivari-
ate random variable (V

(t), V

(t)) is in D

. Based on Theorem 7.1 in Malliavin


and Thalmaier (2004) [78] and Theorem 3.3 in Watanabe (1987), we nd that the
coecients for the asymptotic expansion of (V

(t), V

(t)) in Proposition 13 are in


D

; the asymptotic expansion (8.28) lies in D

. Let us regard X

as a function
G(v, v

) =

a
1
v + a
2
v

+ a
3
z
3
acting on the positive diusion (V

(t), V

(t)). Em-
ploying the chain rule and Proposition 1.5.1 in Nualart (2006) [80], we obtain that
X

. Noticing the expression of the coecients in the expansion of X

, we claim
On the Validity of the Asymptotic Expansion 142
that X
i
D

, for i = 0, 1, 2, .... Following an argument using elementary Taylor ex-


pansion as in Chapter. 7 of Malliavin and Thalmaier (2004) [78], we obtain that, for
any n N,
_
_
_
_
X

k=0
1
k!

k
X

=0

k
_
_
_
_
D
s
p
= O(
n+1
), for any s > 0, p N. (10.3)
i.e.
_
_
_
_
_
X

_
X
0
+
n

k=1

k
X
k
__
_
_
_
_
D
s
p
= O(
n+1
), for any s > 0, p N. (10.4)
Without loss of generality, we sketch the proof of (10.4) for the case of n = 1:
|X

(X
0
+ X
1
)|
D
s
p
= O(
2
). (10.5)
Indeed, by the integral form of Taylor expansion and integration variable substitution,
we deduce that
X

(X
0
+ X
1
) =X

X
0

=0

=
_

0
_
u
0

2
X

=s
dsdu
=
2
_
1
0
_
w
0
2F

(r)F(r) F

(r)
2
4F(r)
3
2
drdw.
(10.6)
Because
|X

(X
0
+ X
1
)|
D
s
p

2
_
1
0
_
w
0
_
_
_
_
2F

(r)F(r) F

(r)
2
4F(r)
3
2
_
_
_
_
D
s
p
drdw, (10.7)
On the Validity of the Asymptotic Expansion 143
(10.5) follows from the fact that
_
_
_
_
2F

(r)F(r) F

(r)
2
4F(r)
3
2
_
_
_
_
D
s
p
< +, (10.8)
uniformly for 0 r, 1. Indeed, (10.8) can be routinely proved via some explicit
computation based on (8.34) and (8.35). Without loss of generality, we focus on the
L
p
-norm. Because of the triangle inequality and the fact a
1
, a
2
, a
3
> 0, we obtain
that
_
_
_
_
2F

(r)F(r) F

(r)
2
4F(r)
3
2
_
_
_
_
L
p

1
(

a
3
z
3
)
3
|2F

(r)F(r) F

(r)
2
|
L
p

1
(

a
3
z
3
)
3
(2|F

(r)F(r)|
L
p +|F

(r)
2
|
L
p).
(10.9)
We further express F, F

and F

in terms of the explicit solution of V and V

in
(8.34). The application of the triangle inequality and the Holder inequality as well as
the explicit computation of moments of the geometric Brownian motion components
in (8.34) yields (10.8) uniformly for 0 r, 1. We omit the tedious details, as a
very similar argument is given momentarily in the subsequent verication procedure.
It is straightforward to nd that the case of n = 4 of (10.4) implies the asymptotic
expansion of D

random variable Y

in D

up to the third order, i.e.


|Y

(X
1
+ X
2
+
2
X
3
+
3
X
4
)|
D
s
p
= O(
4
), for any s > 0, p N.
Next, we only need to verify that the underlying variable Y

is uniformly non-
degenerate in the sense of Malliavin. We follow the approach proposed in Yoshida
(1992) [93] to verify a truncated version of the uniform non-degenerate condition on
On the Validity of the Asymptotic Expansion 144
the Malliavin covariance of Y

. Denote the Malliavin covariance matrix
() := DY

, DY

)
L
2
([0,T];R
2
)
=
2

k=1
D
k
Y

, D
k
Y

)
L
2
([0,T])
=
2

k=1
_
t
0
(D
k
s
Y

)
2
ds.
(10.10)
By the denition in (8.40) and the chain rule of Malliavin dierentiation,
D
i
Y

=
a
1
D
i
V

(t) + a
2
D
i
V

(t)
2
_
F()
. (10.11)
The limiting distribution of Y

satises that
Y

X
1
N(0, 1), as 0, a.e. .
We thus dene the limiting Malliavin covariance as
(0) := DY
0
, DY
0
)
H
=
2

k=1
_
t
0
(D
k
s
X
1
)
2
ds. (10.12)
It is obvious that
D
1
s
X
1
=
a
1

1
V
0
+ a
2

2
V

2
_
F(0)
1
[0,t]
(s),
D
2
s
X
1
=
a
2

2
V

0
_
1
2
2
_
F(0)
1
[0,t]
(s).
(10.13)
It follows from a direct computation that (0) > 0.
Let us dene

c
= c
_
t
0
[D
s
Y

D
s
Y
0
[
2
ds = c
_
t
0
[(D
1
s
Y

D
1
s
Y
0
)
2
+(D
2
s
Y

D
2
s
Y
0
)
2
]ds, (10.14)
where c > 0. In the following proposition, we justify a truncated version of the
Malliavin uniform non-degeneracy condition (69) as proposed in Yoshida (1992) [93].
On the Validity of the Asymptotic Expansion 145
LEMMA 8. The Malliavin covariance () dened in (10.10) is uniformly non-
degenerated under truncation, i.e. there exists c
0
> 0 such that for any c > c
0
and
any p > 1,
sup
[0,1]
E[1

c
1(det(()))
p
] < +. (10.15)
Proof. By the triangle and Cauchy-Schwarz inequality,
[D
s
Y

(D
s
Y

)
T
D
s
Y
0
(D
s
Y
0
)
T
[ [D
s
Y

D
s
Y
0
[
2
+ 2[D
s
Y
0
[[D
s
Y

D
s
Y
0
[.
Noticing that

c
1 is equivalent to
_
t
0
[D
s
Y

D
s
Y
0
[
2
ds
1
c
,
we thus have
[() (0)[
_
t
0
[D
s
Y

D
s
Y
0
[
2
ds +
_
t
0
2[D
s
Y
0
[[D
s
Y

D
s
Y
0
[ds

_
t
0
[D
s
Y

D
s
Y
0
[
2
ds + 2
__
t
0
[D
s
Y
0
[
2
_
1
2
__
t
0
[D
s
Y

D
s
Y
0
[
2
ds
_
1
2

1
c
+ 2
_
(0)
c
.
(10.16)
Hence, there exists c
0
such that, for any c > c
0
> 0,
[()[ (0) [() (0)[ > (0)
_
_
1
c
0
+ 2

(0)
c
0
_
_
.
In order to apply the theory of Yoshida [93], we need to justify that the truncation
On the Validity of the Asymptotic Expansion 146
in Lemma 8 is negligible in probability by verifying condition (70).
LEMMA 9. Following the denition of

c
in (10.14), we have
P
_
[

c
[ >
1
2
_
= O(
n
), (10.17)
for any n = 1, 2, 3, ...
Proof. We prove that, for any n N there exist a constant c
n
such that
P
_
[

c
[ >
1
2
_
< c
n

2n
. (10.18)
Noticing the fact that
_
[

c
[ >
1
2
_

_
c
_
t
0
(D
1
s
Y

D
1
s
Y
0
)
2
ds >
1
4
_

_
c
_
t
0
(D
2
s
Y

D
2
s
Y
0
)
2
ds >
1
4
_
.
we have,
P
_
[

c
[ >
1
2
_
P
__
t
0
(D
1
s
Y

D
1
s
Y
0
)
2
ds >
1
4c
_
+P
__
t
0
(D
2
s
Y

D
2
s
Y
0
)
2
ds >
1
4c
_
.
(10.19)
It is sucient to prove that,
P
__
t
0
(D
i
s
Y

D
i
s
Y
0
)
2
ds >
1
4c
_
= O(
2n
), (10.20)
for i = 1, 2 and any n N. Without loss of generality, we provide the proof for the
case of i = 1.
On the Validity of the Asymptotic Expansion 147
By the Chebyshev-Markov inequality, we have
P
__
t
0
(D
1
s
Y

D
1
s
Y
0
)
2
ds >
1
4c
_
(4c)
n
E
__
t
0
(D
1
s
Y

D
1
s
Y
0
)
2
ds
_
n
=(4c)
n
E
__
t
0
[d
1
(s) + d
2
(s)]
2
ds
_
n
,
(10.21)
where
d
1
(s) :=
a
2
2
_
D
1
s
V

(t)

_
F()


2
V

0

_
F(0)
_
, d
2
(s) :=
a
1
2
_
D
1
s
V

(t)

_
F()


1
V
0
_
F(0)
_
. (10.22)
By the Holder inequality and the convexity property of power functions, we deduce
that
E
__
t
0
[d
1
(s) + d
2
(s)]
2
ds
_
n
E
__
t
0
[d
1
(s) + d
2
(s)]
2n
ds
_
t
n
n

2
2n1
t
n
n

_
t
0
[E(d
1
(s))
2n
+E(d
2
(s))
2n
]ds
(10.23)
where
1
n
+
1
n

= 1.
Without loss of generality, we justify that
_
t
0
E(d
1
(s))
2n
ds = O(
2n
). (10.24)
By the Malliavin dierentiation chain rule and the fact D
i
s
W
j
(t) =
ij
1s t, a
direct computation based on the explicit solution in (8.34) yields that
D
1
s
V

(t) =
2
1
[0,t]
(s)V

(t)
3
cz
3

2
exp
_

2
ct +
2
B
2
(t)
1
2

2
2
t
_

_
t
0
exp
_

2
cu
2
B
2
(u) +
1
2

2
2
u
_
1
[0,u](s)
du.
(10.25)
On the Validity of the Asymptotic Expansion 148
Thus,
E
_
t
0
(d
1
(s))
2n
ds = E
_
t
0
[I
1
(s) + I
2
(s)]
2n
ds, (10.26)
where
I
1
(s) :=
2

_
V

(t)
_
F()

V

0
_
F(0)
_
(10.27)
and
I
2
(s)
:=

2

2
cz
3
exp
_

2
ct +
2
B
2
(t)
1
2

2
2
t
__
t
0
exp
_

2
cu
2
B
2
(u) +
1
2

2
2
u
_
1
[0,u](s)
du
_
F()
.
(10.28)
Following a similar inequality estimate as in (10.23), it suces to show that
E
_
t
0
(I
k
(s))
2n
ds = O(
2n
), for k = 1, 2. (10.29)
Indeed, based on the fact of a
1
> 0, a
2
> 0, a
3
> 0, we deduce that
E
_
t
0
(I
1
(s))
2n
ds =t E
_
V

(t) V

0
_
F()
+
_
1
_
F()

1
_
F(0)
_
V

0
_
2n
C
1
E
_
V

(t) V

0
_
F()
_
2n
+ C
2
E
_
1
_
F()

1
_
F(0)
_
2n

C
1
F(0)
n
E(V

(t) V

0
)
2n
+ C
2
E
_
F() F(0)
(
_
F() +
_
F(0))
_
F()F(0)
_
2n

C
1
F(0)
n
E(V

(t) V

0
)
2n
+ C
2
E
_
F() F(0)
2F(0)
_
F(0)
_
2n

C
1
E(V

(t) V

0
)
2n
+

C
2
E(V

(t) V
0
)
2n
.
(10.30)
On the Validity of the Asymptotic Expansion 149
Thus, it is sucient to show that
E(V

(t) V

0
)
2n
= O(
2n
) (10.31)
and
E(V

(t) V
0
)
2n
= O(
2n
). (10.32)
Without loss of generality, we briey justify (10.31) here. Indeed, we have that
V

(t) V

0
=
_
exp
_

2
ct +
2
B
2
(t)
1
2

2
2
t
_
1
_
V

0
+
2
cz
3
exp
_

2
ct +
2
B
2
(t)
1
2

2
2
t
__
t
0
exp
_

2
cu
2
B
2
(u) +
1
2

2
2
u
_
du.
(10.33)
It is straightforward to obtain that
lim
0
1

2n
E
_
exp
_

2
ct +
2
B
2
(t)
1
2

2
2
t
_
1
_
2n
=lim
0
1

2n
E
2n

k=0
_
2n
k
_
exp
_
k
2
B
2
(t)
2
kct
1
2

2
k
2
2
t
_
(1)
2nk
=lim
0
1

2n
2n

k=0
_
2n
k
_
exp
__
1
2

2
2
k(k 1) kc
_

2
t
_
(1)
2nk
=
2n
2
(2n)!t
n
2
n
n!
(10.34)
and
E
_

2
cz
3
exp
_

2
ct +
2
B
2
(t)
1
2

2
2
t
__
t
0
exp
_

2
cu
2
B
2
(u) +
1
2

2
2
u
_
du
_
2n
=O(
4
).
(10.35)
Hence (10.31) is proved and (10.32) follows quite similarly.
On the Validity of the Asymptotic Expansion 150
Similarly, we nd that
E
_
t
0
(I
2
(s))
2n
ds
C
3
(t)
4n
E
_
exp
_

2
ct +
2
B
2
(t)
1
2

2
2
t
__
t
0
exp
_

2
cu
2
B
2
(u) +
1
2

2
2
u
_
du
_
=O(
4n
).
(10.36)
Therefore, (10.18) is veried, which is equivalent to (10.17).
Hence, for the tempered distribution T
y
o

(R) dened as
T
y
(x) = f(x y) = (x y)
+
,
we apply the Malliavin-Watanabe-Yoshida theory surveyed in Section .2 to conclude
the validity of the asymptotic expansion in Proposition 15. Therefore, Theorem 6 is
proved accordingly.
Glossary
arbitrage the practice of taking advantage of a price dif-
ferential between two or more markets: strik-
ing a combination of matching deals that capi-
talize upon the imbalance, the prot being the
dierence between the market prices, i
CBOE Chicago Board Options Exchange, located
at 400 South LaSalle Street in Chicago, the
largest U.S. options exchange with annual
trading volume that hovered around one bil-
lion contracts at the end of 2007, i
diversied portfolio a risk management technique, related to hedg-
ing, that mixes a wide variety of investments
within a portfolio, 5
151
Glossary 152
European option a nancial contract between two parties, the
buyer and the seller of this type of option. It
is the option to buy (sell) shares of stock at
a specied time in the future for a specied
price, 3
hedge a position established in one market in an at-
tempt to oset exposure to price uctuations
in some opposite position in another market
with the goal of minimizing ones exposure to
unwanted risk, 156
implied volatility the volatility implied by the market price of
the option based on an option pricing model
(i.e. the volatility that, when used in a partic-
ular pricing model, yields a theoretical value
for the option equal to the current market
price of that option), 3
out-of-the-money For a call, when an options strike price is
higher than the market price of the underlying
asset; For a put, when the strike price is below
the market price of the underlying asset, 74
Glossary 153
over-the-counter A decentralized market of securities not listed
on an exchange where market participants
trade over the telephone, facsimile or elec-
tronic network instead of a physical trading
oor, 12
portfolio insurance a method of hedging a portfolio of stocks
against the market risk by short selling stock
index futures, 5
price sensitivities the quantities representing the sensitivities of
derivatives such as options to a change in
underlying parameters on which the value of
an instrument or portfolio of nancial instru-
ments is dependent, 2
realized variance the variance of the return of a nancial instru-
ment over a specied period, 5
realized volatility the volatility of a nancial instrument over a
specied period, 5
S&P 500 a free-oat capitalization-weighted index pub-
lished since 1957 of the prices of 500 large-cap
common stocks actively traded in the United
States, i
Glossary 154
Societe Generale one of the main European nancial services
companies and also maintains extensive activ-
ities in others parts of the world, 2
timer option an Exotic option, that allows buyers to specify
the level of volatility used to price the instru-
ment, 2
variance swap an over-the-counter nancial derivative that
allows one to speculate on or hedge risks asso-
ciated with the magnitude of movement, i.e.
volatility, of some underlying product, like an
exchange rate, interest rate, or stock index, 3
VIX the ticker symbol for the Chicago Board Op-
tions Exchange Volatility Index, a popular
measure of the implied volatility of S&P 500
index options, i
volatility most frequently refers to the standard devia-
tion of the continuously compounded returns
of a nancial instrument within a specic time
horizon, i
Bibliography
[1] J. Abate and W. Whitt. The Fourier-series method for inverting transforms of
probability distributions. Queueing Systems Theory and Applications, 10(1-2):5
87, 1992.
[2] M. Abramowitz and I. A. Stegun, editors. Handbook of Mathematical Functions
with Formulas, Graphs, and Mathematical Tables. A Wiley-Interscience Publi-
cation. John Wiley and Sons Inc., New York, 1984. Reprint of the 1972 edition,
Selected Government Publications.
[3] L. B. Andersen and R. Brotherton-Ratclie. Extended libor market models with
stochastic volatility. Journal of Computational Finance, 9(1), 2005.
[4] D. S. Bates. Jumps and stochastic volatility: Exchange rate processes implicit
in deutsche mark options. Review of Financial Studies, 9(1):69107, 1996.
[5] D. S. Bates. Post-87 crash fears in S&P 500 futures options. Jan. 1997.
[6] L. Bergomi. Smile dynamics II. Risk, October 2005.
[7] L. Bergomi. Smile dynamics III. Risk, March 2009.
[8] A. Bick. Quadratic-variation-based dynamic strategies. Management Science,
41(4), 1995.
155
Bibliography 156
[9] T. Bjork. Arbitrage Theory in Continuous Time. Oxford University Press, 1999.
[10] F. Black and M. S. Scholes. The pricing of options and corporate liabilities.
Journal of Political Economy, 81(3):63754, May-June 1973.
[11] T. Bollerslev. Generalized autoregressive conditional heteroskedasticity. Journal
of Econometrics, 31(3):307327, April 1986.
[12] A. N. Borodin and P. Salminen. Handbook of Brownian MotionFacts and
Formulae. Probability and its Applications. Birkhauser Verlag, Basel, second
edition, 2002.
[13] D. T. Breeden. An intertemporal asset pricing model with stochastic consump-
tion and investment opportunities. Journal of Financial Economics, 7(3):265
296, September 1979.
[14] M. Broadie, M. Chernov, and M. Johannes. Model specication and risk premia:
Evidence from futures options. Journal of Finance, 62(3):14531490, 06 2007.
[15] M. Broadie and P. Glasserman. Estimating security price derivatives using sim-
ulation. Management Science, 42(2):269285, 1996.
[16] M. Broadie and A. Jain. Pricing and hedging volatility derivatives. The Journal
of Derivatives, 15(3):724, spring 2008.
[17] M. Broadie and

O. Kaya. Exact simulation of stochastic volatility and other
ane jump diusion processes. Operations Research, 54(2):217231, 2006.
[18] H. Buchholz. The Conuent Hypergeometric Function with Special Emphasis on
its Applications. Translated from the German by H. Lichtblau and K. Wetzel.
Springer Tracts in Natural Philosophy, Vol. 15. Springer-Verlag New York Inc.,
New York, 1969.
Bibliography 157
[19] H. Buehler. Consistent variance curve models. Finance and Stochastics,
10(2):178203, April 2006.
[20] P. Carr and R. Lee. Realized volatility and variance: Options via swaps. RISK,
pages 7683, May 2007.
[21] P. Carr and R. Lee. Hedging variance options on continuous semimartingales.
Finance and Stochastics, 14(2):179207, April 2010.
[22] P. P. Carr and L. Wu. A tale of two indices. Journal of Derivatives, Spring 2006.
[23] CBOE. The CBOE volatility index - VIX. Chicago Board Options Exchange,
2009.
[24] P. Christoersen, S. L. Heston, and K. Jacobs. The shape and term structure
of the index option smirk: Why multifactor stochastic volatility models work so
well. SSRN eLibrary, 2009.
[25] J. C. Cox, J. Ingersoll, Jonathan E, and S. A. Ross. A theory of the term
structure of interest rates. Econometrica, 53(2):385407, March 1985.
[26] J. C. Cox, J. Ingersoll, Jonathan E, and S. A. Ross. A theory of the term
structure of interest rates. Econometrica, 53(2):385407, March 1985.
[27] J. Cvitanic and I. Karatzas. Hedging contingent claims with constrained port-
folios. 3(3):652681, 1993.
[28] F. Delbaen and H. Shirakawa. A note on option pricing for the constant elasticity
of variance model. Financial Engineering and the Japanese Markets, 9(2):85
99(15), 2002.
Bibliography 158
[29] K. Demeter, E. Derman, M. Kamal, and J. Zou. More than you ever wanted to
know about volatility swaps. Quantitative Strategies Research Notes, Goldman
Sachs, 1999.
[30] J. Detemple and C. Osakwe. The valuation of volatility options. European
Finance Review, 4(1), 2000.
[31] J. Douglas, Jr. and H. H. Rachford, Jr. On the numerical solution of heat con-
duction problems in two and three space variables. Transactions of the American
Mathematical Society, 82:421439, 1956.
[32] D. Due. Dynamic Asset Pricing Theory, 3rd edition. Princeton University
Press, Princeton, NJ, 2001.
[33] D. Due, D. Filipovic, and W. Schachermayer. Ane processes and applications
in nance. 13(3):9841053, 2003.
[34] D. Due and P. Glynn. Ecient Monte Carlo simulation of security prices. The
Annals of Applied Probability, 5(4):897905, 1995.
[35] D. Due and R. Kan. A yield-factor model of interest rates. Mathematical
Finance, 6(4):379406, 1996.
[36] D. Due, J. Pan, and K. Singleton. Transform analysis and asset pricing for
ane jump-diusions. Econometrica, 68:13431376, 2000.
[37] D. Due, J. Pan, and K. Singleton. Transform analysis and asset pricing for
ane jump-diusions. Econometrica, 68(6):13431376, 2000.
[38] B. Dupire. Model art. RISK, 6(9):118124, September 1993.
Bibliography 159
[39] B. Dupire. Exploring volatility derivatives: New advances in modelling. Global
Derivatives, Paris, May 2005.
[40] B. Eraker. Do stock prices and volatility jump? reconciling evidence from spot
and option prices. Journal of Finance, 59:13671403, 2004.
[41] W. Feller. Two singular diusion problems. The Annals of Mathematics, 54:173
182, 1951.
[42] G. S. Fishman. Monte Carlo: Concepts, Algorithms, and Applications. Springer
Series in Operations Research. Springer-Verlag, New York, 1996.
[43] H. Follmer and A. Schied. Stochastic Finance: An Introduction in Discrete Time.
Walter de Gruyter & Co., Berlin, 2004.
[44] E. d. Fontenay. Hedge fund replication and structured products. Societe Generale
Asset Management, 2007.
[45] E. Fourni, J.-M. Lasry, P.-L. Lions, J. Lebuchoux, and N. Touzi. Applications of
Malliavin calculus to Monte Carlo methods in nance. Finance and Stochastics,
3(4):391412, 1999.
[46] P. K. Friz. An Introduction to Malliavin Calculus. lecture notes, 2005.
[47] A. R. Gallant, C.-T. Hsu, and G. Tauchen. Using daily range data to calibrate
volatility diusions and extract the forward integrated variance. The Review of
Economics and Statistics, 81(4):617631, November 1999.
[48] J. Gatheral. The Volatility Surface, a Practitioners Guide. John Wiley and
Sons, Hoboken, NJ, 2006.
Bibliography 160
[49] J. Gatheral. Developments in volatility derivatives pricing. Discus-
sion Paper at Global Derivatives, Paris, May 2007. Available online at:
http://www.math.nyu.edu/fellows_fin_math/gatheral/VolDerivatives2007.pdf.
[50] J. Gatheral. Consistent modeling of SPX and VIX options.
Discussion Paper at The Fifth World Congress of the Bache-
lier Congress Society, London, July 2008. Avaliable online at:
http://www.math.nyu.edu/fellows_fin_math/gatheral/Bachelier2008.pdf.
[51] J. Gatheral. Further developments in volatility derivatives
pricing. Discussion Paper at Global Derivatives Trading &
Risk Management, Paris, May 2008. Available online at:
http://www.math.nyu.edu/fellows_fin_math/gatheral/FurtherVolDerivatives2008.pdf
[52] H. Geman and M. Yor. Bessel processes, Asian options and perpetuities. Math-
ematical Finance, 3:349375, 1993.
[53] P. Glasserman. Monte Carlo methods in nancial engineering, volume 53 of
Applications of Mathematics (New York). Springer-Verlag, New York, 2004.
Stochastic Modelling and Applied Probability.
[54] A. Going-Jaeschke and M. Yor. A survey and some generalizations of Bessel
processes. Bernoulli, 9(2):313349, 2003.
[55] A. Grunbichler and F. A. Longsta. Valuing futures and options on volatility.
Journal of Banking and Finance, 20(6):9851001, July 1996.
[56] P. D. Hagan, A.S.Lesniewski, and D.E.Woodward. Managing smile risk. Wilmott
Magazine Separtember, pages 84108, 2002.
Bibliography 161
[57] J. M. Harrison and S. R. Pliska. Martingales and stochastic integrals in the
theory of continuous trading. 11(3):215260, 1981.
[58] J. M. Harrison and S. R. Pliska. A stochastic calculus model of continuous
trading: complete markets. 15(3):313316, 1983.
[59] D. Hawkins and S. Krol. Product overview: Timer options. Lehman
Brothers Equity Derivative Strategy, January 2008. Available online at
http://www.scribd.com/doc/19601860/Lehman-Brothers-Product-Overview-Timer-Option
[60] P. Henry-Labordere. Analysis, Geometry, and Modeling in Finance: Advanced
Methods in Option Pricing. Chapman and Hall/CRC, 2008.
[61] S. L. Heston. A closed-form solution for options with stochastic volatility with ap-
plications to bond and currency options. Review of Financial Studies, 6(2):327
43, 1993.
[62] J. C. Hull and A. D. White. The pricing of options on assets with stochastic
volatilities. Journal of Finance, 42(2):281300, June 1987.
[63] P. Jaeckel. Monte Carlo Methods in Finance. John Wiley and Sons Inc., New
York, 2002.
[64] M. S. Johannes, B. Eraker, and N. Polson. The impact of jumps in volatility and
returns. Journal of Finance, 53:12691300, 2003.
[65] N. L. Johnson, S. Kotz, and N. Balakrishnan. Continuous Univariate Distribu-
tions. Vol. 2. Wiley Series in Probability and Mathematical Statistics: Applied
Probability and Statistics. John Wiley and Sons Inc., New York, second edition,
1995. A Wiley-Interscience Publication.
Bibliography 162
[66] I. Karatzas and S. G. Kou. On the pricing of contingent claims under constraints.
6(2):321369, 1996.
[67] I. Karatzas and C. Li. Personal communication and notes. 2009, 2010.
[68] I. Karatzas and S. E. Shreve. Brownian Motion and Stochastic Calculus, vol-
ume 113 of Graduate Texts in Mathematics. Springer-Verlag, New York, second
edition, 1991.
[69] I. Karatzas and S. E. Shreve. Methods of Mathematical Finance. Springer-Verlag,
New York, 1998.
[70] N. Kunitomo and A. Takahashi. The asymptotic expansion approach to the
valuation of interest rate contingent claims. Mathematical Finance, 11(1):117
151, 2001.
[71] N. Kunitomo and A. Takahashi. On validity of the asymptotic expansion
approach in contingent claim analysis. The Annals of Applied Probability,
13(3):914952, 2003.
[72] S. Kusuoka and D. Stroock. Applications of the Malliavin calculus. II. Journal
of the Faculty of Science, the University of Tokyo, Section IA, Mathematics,
32:176, 1985.
[73] R. W. Lee. Implied and local volatilities under stochastic volatility. International
Journal of Theoretical and Applied Finance, 4(1):4589, 2001.
[74] V. Linetsky. The spectral representation of Bessel processes with constant drift:
applications in queueing and nance. Journal of Applied Probability, 41(2):327
344, 2004.
Bibliography 163
[75] A. Lipton. The vol smile problem. Risk Magazine, 15:6165, 2002.
[76] R. Lord, R. Koekkoek, and D. van Dijk. A comparison of biased simulation
schemes for stochastic volatility models. 2008.
[77] P. Malliavin. Stochastic Analysis. Grundlehren der Mathematischen Wis-
senschaften. 313. Berlin: Springer. xi, 342 p., 1997.
[78] P. Malliavin and A. Thalmaier. Stochastic Calculus of Variations in Mathemat-
ical Finance. Springer Finance. Berlin: Springer, 2006.
[79] R. C. Merton. Theory of rational option pricing. Bell Journal of Economics,
4(1):141183, Spring 1973.
[80] D. Nualart. The Malliavin Calculus and Related Topics. 2nd ed. Probability and
Its Applications. Berlin: Springer, 2006.
[81] D. Nualart, A. S. Ustunel, and M. Zakai. On the moments of a multiple wiener-
ito integral and the space induced by the polynomials of the integral. Stochastics,
25(4):233340, 1988.
[82] Y. Osajima. The asymptotic expansion formula of implied volatility for dynamic
SABR model and FX hybrid model. SSRN eLibrary, 2007.
[83] D. Revuz and M. Yor. Continuous Martingales and Brownian Motion, volume
293. Springer-Verlag, Berlin, third edition, 1999.
[84] N. Sawyer. SG CIB launches timer options. Risk, 20(7), July 2007.
[85] S. E. Shreve. Stochastic Calculus for Finance. II. Springer Finance. Springer-
Verlag, New York, 2004.
Bibliography 164
[86] M. Staunton. Exploring for VIX. Wilmott Magazine, pages 6667, November
2009.
[87] D. W. Stroock and S. R. S. Varadhan. Diusion processes with continuous
coecients. I. 22:345400, 1969.
[88] D. W. Stroock and S. R. S. Varadhan. Diusion processes with continuous
coecients. II. 22:479530, 1969.
[89] M. Uchida and N. Yoshida. Asymptotic expansion for small diusions applied
to option pricing. Statistical Inference for Stochastic Processes, 7(3):189223,
October 2004.
[90] S. Watanabe. Analysis of Wiener functionals (Malliavin calculus) and its appli-
cations to heat kernels. Annals of Probability, 15:139, 1987.
[91] R. E. Whaley. Derivatives on market volatility: Hedging tools long overdue.
Journal of Derivatives, 1:7184, 1993.
[92] N. Yoshida. Asymptotic expansions for statistics related to small diusions.
Journal of Japan Statistical Society, 22:139159, 1992.
[93] N. Yoshida. Asymptotic expansions of maximum likelihood estimators for small
diusions via the theory of Malliavin-Watanabe . Probability Theory and Related
Fields, 92(3):275311, September 1992.
[94] N. Yoshida. Asymptotic expansion of Bayes estimators for small diusions. Prob-
ability Theory and Related Fields, 95(4):429450, December 1993.
Appendix
165
A Joint Density of Bessel Process
at Exponential Stopping
In this appendix, we give detailed derivation of the joint density in equation 3.20. We
begin with a useful result on a Laplace transform involving Bessel process stopped at
an exponential time.
LEMMA 10.
E
P
0
_
exp
_

_
T
0
du
X
u
_

X
T
= x
_
P
0
(X
T
dx)
=

( +
1
2
+

2
)

2(2 + 1)

_
x
X
0
_
+
1
2
M

2
,
(2(X
0
x)

2) W

2
,
(2(X
0
x)

2)dx,
(37)
where M and W are the Whittaker functions dened as follows:
166
On A Bessel Joint Density 167
M(a, b, x) = 1 +
+

k=1
a(a + 1) (a + k 1)x
k
b(b + 1) (b + k 1)k!
,
U(a, b, x) =

sin(b)
_
M(a, b, x)
(1 +a b)(b)
x
1b
M(1 +a b, 2 b, x)
(a)(2 b)
_
,
M
n,m
(x) = x
m+
1
2
e

x
2
M(mn +
1
2
, 2m+ 1, x),
W
n,m
(x) = x
m+
1
2
e

x
2
U(mn +
1
2
, 2m+ 1, x).
(38)
Proof. Let us assume that X
t
is a Bessel process with drift under the probability
measure P

and S is an exponential random variable with parameter . Thus


P

(X
S
y) =
_
+
0
P

(X
t
y[S = t)P(S t) =
_
+
0
e
t
P

(X
t
y)dt
=
_
+
0
e
t
E
P
0
_
1X
t
y exp
_
(X
0
X
t
)
_
t
0
2 + 1
2X
u
du
1
2

2
t
__
dt
=
_
+
0
e
t
_
_
y
0
E
P
0
_
exp
_
(X
0
X
t
)
_
t
0
2 + 1
2X
u
du
1
2

2
t
_

X
t
= z
_
P
0
(X
t
dz)
_
dt
=
_
+
0
e

_
+

2
2
_
t
__
y
0
e
(X
0
z)
E
P
0
_
exp
_

_
+
1
2
__
t
0
1
X
u
du
_
; X
t
dz
__
dt
=

+

2
2
_
y
0
e
(X
0
z)
E
P
0
_
exp
_

_
+
1
2
__
T
0
1
X
u
du
_
; X
T
dz
_
,
(39)
where T is an exponential random variable with parameter +

2
2
, which is indepen-
dent of the underlying Bessel process with drift. By dierentiating both sides of the
On A Bessel Joint Density 168
above equation, we obtain that
P

(X
S
dy) =

+

2
2
e
(X
0
y)
E
P
0
_
exp
_

_
+
1
2
__
T
0
1
X
u
du
_
; X
T
dy
_
.
Now let us identify
= ( +
1
2
), +

2
2
= .
(40)
It follows that =

+
1
2
and =
2
2
(2+1)
2
. Therefore
E
P
0
_
exp
_

_
T
0
1
X
u
du
_
; X
T
dy
_
=P

(X
S
dy)
+

2
2

e
(X
0
y)
=( +

2
2
)e
(X
0
y)
_
+
0
e
t
p

(t; X
0
, y)dt.
(41)
Thus, by Lemma 1 (Resolvent Kernel) in Linetsky (2004) [74], we identify s with
as well as
(s) = () =

2
.
Thus, the result in Lemma 10 follows immediately.
Next, it deserves to notice the following explicit Laplace transform inversion.
LEMMA 11. (A Closed-form Inversion of a Laplace transform involving
Whittaker functions) For >
1
2
and 0 x z the following explicit Laplace
transform inversion holds
On A Bessel Joint Density 169
L
1

_
1
2
+ +
_
M
,
(x
2
) W
,
(z
2
)
_
(y)
=
(2 + 1)xz
2 sinh
_
y
2
_ exp
_

(x
2
+ z
2
) cosh
_
y
2
_
sinh
_
y
2
_
_
I
2
_
xz
sinh
_
y
2
_
_
,
(42)
where the Hyperbolic functions are dened as
sinh(x) =
1
2
(e
x
e
x
), cosh(x) =
1
2
(e
x
+ e
x
).
(43)
Here
I
2
(x) =
+

k=0
(
x
2
)
2(+k)
k!(2 + k + 1)
is a modied Bessel function of the rst kind with index 2
Finally, the joint density 3.20 can be obtained by inverting the Laplace transform in
Lemma 10.
Proof.
P
0
_
X
T
dx,
_
T
0
du
X
u
dt
_
=L
1

_
E
P
0
_
exp
_

_
T
0
1
X
u
du
_
; X
T
dx
__
=L
1

_
( +
1
2
+

2
)

2(2 + 1)

_
x
X
0
_
+
1
2
M

2
,
(2(X
0
x)

2) W

2
,
(2(X
0
x)

2)
_
.
(44)
On A Bessel Joint Density 170
By using the scaling property of Laplace transform:
Lf(at)(s) =
1
[a[
F
_
s
a
_
,
where Lf(t)(s) = F(s). By letting a =

2, we nd the joint density expression


in equation 3.20.
Detailed ADI Scheme
In this appendix, we document the detailed formulation of the ADI scheme in Sec-
tion 5.2. In the implementation of (5.12), for each step n, we use a matrix U
n
=
(U
n
i,j
)
(I+1)(J+1)
to store the approximated values. In the rst iteration of the ADI
scheme (5.12), for each xed j 1, 2, ..., J 1 we set up an I +1 dimensional linear
system to solve for U
n+
1
2
.,j
. The system consists of two boundary conditions at i = 0
and i = I respectively as well as I 1 equations for inner points. The specication of
equations of inner points is straightforward. Here we need to gure out the boundary
conditions for the ADI middle step points U
n+
1
2
. For i = 0, it follows from the the
Dirichlet boundary condition that
U
n+
1
2
0,j
= (1 /
2
)U
n+1
0,j
+ /
2
U
n
0,j
= 0.
However, at i = I we operate 1 /
2
on both sides of the Neumann boundary
condition
U
n+1
I,j
U
n+1
I1,j
= s.
Thus, we nd the implied boundary condition for the ADI middle step as
U
n+
1
2
I,j
U
n+
1
2
I1,j
= /
2
U
n
I,j
/
2
U
n
I1,j
+
_
1 +
rt
2jv
_
s.
171
Detailed ADI Scheme 172
Hence the rst iteration of the ADI scheme (5.12) is translated to a tri-diagonal linear
system which can be solved eciently by the Thomas algorithm of linear complexity.
_

_
U
n+
1
2
0,j
= 0,
(1 /
1
)U
n+
1
2
1,j
= [1 + A
0
+ (1 )/
1
+/
2
]U
n
1,j
,
.
.
.
(1 /
1
)U
n+
1
2
I1,j
= [1 + A
0
+ (1 )/
1
+/
2
]U
n
I1,j
,
U
n+
1
2
I,j
U
n+
1
2
I1,j
= /
2
U
n
I,j
/
2
U
n
I1,j
+
_
1 +
rt
2jv
_
s,
(45)
i.e.
_
_
_
_
_
_
_
_
_
_
_
_
1
a
1,j
b
1,j
c
1,j
.
.
.
.
.
.
.
.
.
a
I1,j
b
I1,j
c
I1,j
1 1
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
U
n+
1
2
0,j
U
n+
1
2
1,j
.
.
.
U
n+
1
2
I1,j
U
n+
1
2
I,j
_
_
_
_
_
_
_
_
_
_
_
_
=
_
_
_
_
_
_
_
_
_
_
_
_
_
0
[1 + A
0
+ (1 )/
1
+/
2
]U
n
1,j
.
.
.
[1 + A
0
+ (1 )/
1
+/
2
]U
n
I1,j
/
2
U
n
I,j
/
2
U
n
I1,j
+
_
1 +
rt
2jv
_
s
_
_
_
_
_
_
_
_
_
_
_
_
_
.
where
a
i,j
=
rit
2jv

i
2
t
2
, b
i,j
= 1 +
rt
2jv
+ i
2
t, c
i,j
=
rit
2jv

i
2
t
2
.
Similarly we handle the second iteration of the ADI scheme (5.12) as follows. We
x i 0, 1, 2, ..., I and set up a linear equation system for solving U
n+1
i,.
. We also
impose the boundary conditions at v = 0 and v = . It follows that
Detailed ADI Scheme 173
_

v
(U
n+1
i,1
U
n+1
i,0
) + ri(U
n+1
i,0
U
n+1
i1,0
) rU
n+1
i,0
= 0,
(1 /
2
)U
n+1
i,1
= U
n+
1
2
/
2
U
n
i,1
,
.
.
.
(1 /
2
)U
n+1
i,J1
= U
n+
1
2
/
2
U
n
i,J1
,
U
n+1
i,J
= max(is K, 0),
(46)
i.e.
_
_
_
_
_
_
_
_
_
_
_
_
r

v

v
e
1,j
f
1,j
g
1,j
.
.
.
.
.
.
.
.
.
e
I1,j
f
I1,j
g
I1,j
1
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
U
n+1
i,0
U
n+1
i,1
.
.
.
U
n+1
i,J1
U
n+1
i,J
_
_
_
_
_
_
_
_
_
_
_
_
=
_
_
_
_
_
_
_
_
_
_
_
_
ri(U
n+1
i,0
U
n+1
i1,0
)
U
n+
1
2
/
2
U
n
i,1
.
.
.
U
n+
1
2
/
2
U
n
i,J1
max(is K, 0)
_
_
_
_
_
_
_
_
_
_
_
_
,
where
e
i,j
=

2
v
t
2v
2
+

2
(

jv
1)
t
v
, f
i,j
= 1+

2
v
t
v
2
+
rt
2jv
, g
i,j
=

2
v
t
2v
2

2
(

jv
1)
t
v
.
Consideration of Jump Combined
with Stochastic Volatility
In this appendix, we outline some ideas on pricing timer call options under stochastic
volatility models with jumps (see Bates [4] and Due, Pan and Singleton [37]). Unlike
the case of Hestons model, the stochastic volatility with jump models might not
render semi-closed form formulae for the valuation of timer options. However, we
may still propose a conditional Black-Scholes-Merton formula and implement it via
Monte Carlo simulation.
Under the risk neutral probability measure, Bates [4] stochastic volatility with jump
model is specied as
dS
t
S
t
= (r )dt +
_
V
t
(dW
(1)
t
+
_
1
2
dW
(2)
t
) + d
_
Nt

i=1
(
s
i
1)
_
,
dV
t
= ( V
t
)dt +
v
_
V
t
dW
(1)
t
,
(47)
where (W
(1)
t
, W
(2)
t
) is a two dimensional standard Brownian motion; r is assumed
to be the constant instantaneous interest rate; N
t
is a Poisson process with constant
intensity ;
s
i
is the relative jump size in the stock price. At time t
i
, when jump
174
Jump SV and Timer Option 175
occurs, we have that
S
t
i
= S
t
i

s
i
.
Let us assume that
s
follows a lognormal distribution with mean
s
and variance
2
s
,
i.e.

s
L^(
s
,
2
s
).
Because
= E
s
i
1 = Ee
s+sZ
1,
where Z ^(0, 1), the parameter
s
and are related to each other by the equation

s
= log(1 + )
1
2

2
s
.
Under Bates model (47), the theoretical realized variance consists of not only the
diusion part but also the compounded Poisson part (see Carr and Wu (2006) [22]).
PROPOSITION 16. Under Bates model (47), we have that, for t = mt,
lim
t0
m

j=1
_
log
S
t
j
S
t
j1
_
2
= I
J
t
:=
_
t
0
V
s
ds +
Nt

i=1
[log(
s
i
)]
2
, a.s. (48)
In the continuous-time setting, we consider the rst-passage-time:

J
=
_
u 0,
_
u
0
V
s
ds +
Nt

i=1
[log(
s
i
)]
2
B
_
. (49)
Let us denote
T
o
= I
J

B =
_

J
0
V
s
ds +
N

i=1
[log(
s
i
)]
2
B (50)
Jump SV and Timer Option 176
the size of overshoot over the variance budget B by the total variance. Similar to
Proposition 3, we have the following conditional Black-Scholes-Merton formula for
pricing timer options under Bates stochastic volatility with jump model.
PROPOSITION 17. The timer call option with strike K and variance budget B
can be priced by the following conditional Black-Scholes-Merton formula:
C
0
=E
Q
_
S
0
N

i=1

s
i
e
d
0
(V

J
,
J
,
N

J
i=1
[log(
s
i
)]
2
,To)
N(d
1
(V

J ,
J
,
N

i=1
[log(
s
i
)]
2
, T
o
))
Ke
r
J
N(d
2
(V

J ,
J
,
N

i=1
[log(
s
i
)]
2
, T
o
))
_
,
(51)
where
N(x) =
1

2
_
x

u
2
2
du,
and
d
0
(v, , p, q) =

v
(v V
0
+ (B p + q))
1
2

2
(B p + q),
d
1
(v, , p, q) =
1
_
(1
2
)(B p + q)
_
log
_
S
0
K
_
+ r +
1
2
(B p + q)(1
2
) + d
0
(v, , p, q)
_
,
d
2
(v, , p, q) =
1
_
(1
2
)(B p + q)
_
log
_
S
0
K
_
+ r
1
2
(B p + q)(1
2
) + d
0
(v, , p, q)
_
.
(52)
Proof. First, we express (S
t
, V
t
) as
S
t
= S
0
exp
_
rt
1
2
_
t
0
V
s
ds +
_
t
0
_
V
s
dW
(1)
s
+
_
1
2
_
t
0
_
V
s
dW
(2)
s
_
Nt

i=1

s
i
,
V
t
= V
0
+ t
_
t
0
V
s
ds +
v
_
t
0
_
V
s
dW
(1)
s
.
(53)
By conditioning on the variance budget consumption time
J
, the variance V

J , the
total number of Poisson jumps N

J , the jump sizes (


s
i
)
N

J
i=1
, the total quadratic varia-
Jump SV and Timer Option 177
tion contributed by jumps

J
i=1
[log(
s
i
)]
2
and the overshoot size of the total variation
T
o
, we nd the conditional distribution of S

J . We note that all the conditions are


based on the variance process and the jump part of the asset dynamics, which are
both independent of the Brownian motion W
(1)
t
. Similar argument to the proof of
Proposition 3 yields that
_
_
S

J
= t, V

J = v, N

J = n, (
s
i
)
N

J
i=1
= (
i
)
n
i=1
,
N

i=1
[log(
s
i
)]
2
= p, T
o
= q
_
_
=
law
_
S
0
Nt

i=1

s
i
exp
_
r
J

1
2
(B p + q) +

v
(V

J V
0

J
+ (B p + q))
+
_
1
2
_

J
0
_
V
s
dW
(2)
s
_

J
= t, V

J = v, N

J = n, (
s
i
)
N

J
i=1
= (
i
)
n
i=1
,
N

i=1
[log(
s
i
)]
2
= p, T
o
= q
_
=
law
S
0
n

i=1

i
exp
_
N
_
rt
1
2
(B p + q) +

v
(v V
0
t + (B p + q)),
(1
2
)(B p + q)
__
.
(54)
Therefore, by conditioning and further computation based on the standard normal
distribution, we obtain that
C
0
=E
Q
_
_
_
E
Q
_
_
e
r
J
max(S

J K, 0)

(
s
i
)
N

J
i=1
, N

J ,
J
, V

J ,
N

i=1
[log(
s
i
)]
2
, T
o
_
_
_
_
_
=E
Q
_
S
0
N

i=1

s
i
e
d
0
(V

J
,
J
,
N

J
i=1
[log(
s
i
)]
2
,To)
N(d
1
(V

J ,
J
,
N

i=1
[log(
s
i
)]
2
, T
o
))
Ke
r
J
N(d
2
(V

J ,
J
,
N

i=1
[log(
s
i
)]
2
, T
o
))
_
.
(55)
Jump SV and Timer Option 178
A conditional Monte Carlo simulation scheme can be implemented based on Propo-
sition 17. Similar to Algorithm 1, we perform the exact simulation of the path
of variance process V
t
and the jump components in (48). By the denition of

J
in (49), we simulate it by a time-checking algorithm (see 1). Meanwhile, we
record the size of overshoot T
o
and the quadratic variation contributed by jumps, i.e.

J
i=1
[log(
s
i
)]
2
. Based on all these steps, we calculate the estimator:
S
0
N

i=1

s
i
e
d
0
N(d
1
) Ke
r
J
N(d
2
),
(56)
where d
0
, d
1
, d
2
are evaluated as in Proposition 17.
The Malliavin-Watanabe-Yoshida
Theory: A Primer
In recent years, various researches on the applications of Malliavin calculus in quan-
titative nance are vividly carried out. For example, Fournie et al. (1999) [45] pro-
posed to use Malliavin integration by parts formula to derive Monte Carlo simulation
estimator for computing price sensitivities. Among many other applications, Malli-
avin calculus provides researchers a powerful tool to justify asymptotic expansion of
derivative security payos and thus its no-arbitrage price approximation. Some ex-
amples applied to interest rates modeling can be found in Kunitomo and Takahashi
(2001) [70] and Osajima (2007) [82], etc. More topics on the applications of Malliavin
calculus in nance can be found in Malliavin and Thalmaier (2006) [78].
.1 Basic Setup of the Malliavin Calculus Theory
The Malliavin calculus, also known as the stochastic calculus of variations, is an
innite-dimensional dierential calculus on the Wiener space. It was originally tai-
lored to investigate regularity properties of the law of Wiener functionals such as
solutions of stochastic dierential equations. The theory was initiated by Malliavin
179
The Malliavin-Watanabe-Yoshida Theory 180
and further developed by Stroock, Bismut, Watanabe, et al. Roughly speaking, the
Malliavin calculus theory consists of two parts. First is the theory of the dieren-
tial operators dened on Sobolev spaces of Wiener functionals. The second part of
the theory establishes general criteria for a given random vector to possess a smooth
density.
Instead of making an exhaustive survey of the Malliavin calculus theory, we briey
list some terminologies related to the asymptotic expansion theory of Malliavin-
Watanabe-Yoshida. To learn more about the fundamentals of Malliavin calculus,
readers are referred to Nualart (2006) [80], Malliavin (1997) [77], Kusuoka and Stroock
(1991) [72] and Fritz (2005) [46], etc.
Let us denote (, P, T, T
t
) the d-dimensional ltered Wiener space, where =
C
0
([0, T], R
d
). The coordinate process w(t) is a d-dimensional Brownian motion
under the Wiener measure P. Let H be the Cameron-Martin subspace of , i.e.
H =
_
h =
__

0

h
1
(s)ds, ...,
_

0

h
d
(s)ds
_
;

h L
2
[0, T]
_
.
The inner product of Hilbert space H is dened as
h
1
, h
2
)
H
=
d

k=1
_
T
0

h
k
1
(s)

h
k
2
(s)ds,
for any h
1
, h
2
H. The norm is equipped with
[[h[[
H
=
_
d

k=1
_
T
0
[

h
k
(t)[
2
dt
_
1
2
,
for h H. Let F : R be an T
T
measurable random variable, which is also called
Wiener functional. We further assume that F L
p
(), where p > 1. Given h H,
The Malliavin-Watanabe-Yoshida Theory 181
we dene the directional derivative of F as
D
h
F(w) :=
d
d

=0
F (w + h) = lim
0
1

[F (w + h) F(w)] . (57)
Thus, D

F(w) is dened as a linear functional on Hilbert space H. By Riesz represen-


tation theory, there exists an element D
s
F(w) := (D
1
F(w), D
2
F(w), ..., D
d
F(w))
H such that
D
h
F(w) =

h, DF(w))
H
=
d

k=1
_
T
0

h
k
(s)D
k
s
F(w)ds. (58)
Denote L
p
( : H) the collection of measurable map f from to H such that
[[f[[
H
L
p
(). If DF L
p
( : H), DF is dened as the Malliavin derivative
of F. It can be regarded as an H-valued random variable or a d-dimensional stochas-
tic process. Consequently we are able to dene higher order Malliavin derivatives.
Let P denote the collection of polynomials on the Wiener space . Let us dene the
s-times Malliavin norm [[ [[
s,p
as
|F|
s,p
=
_
E|F|
p
+
s

j=1
E|D
(j)
F|
p
H
j
_1
p
. (59)
By completing P (in L
p
()) according to norm [[ [[
s,p
, we construct a Banach space
denoted by D
s
p
, which collects all s-times Malliavin dierentiable variables.
It is well known that, for s N, norm (59) is equivalent to the one dened as follows.
For any Wiener functional g, let
[[[g[[[
s,p
=| (I L)
s
2
g |
L
p
()
, (60)
where L is the Ornstein-Uhlenbeck operator. However, using norm (60), we can obtain
The Malliavin-Watanabe-Yoshida Theory 182
space D
s
p
for any arbitrary real number s R by completing the Wiener polynomial
space P. For any s N, the equivalence ensures that the completion using norm
[[[ [[[
s,p
also generates the space D
s
p
. It is well known that the dual space of D
s
p
is
D
s
q
, i.e. (D
s
p
)

= D
s
q
, where
1
p
+
1
q
= 1.
If s < 0 the elements in D
s
p
may not be ordinary random variables and they are
usually interpreted as distributions on the Wiener space. If F D
s
p
and G D
s
q
,
we denote the paring F, G) by E(FG). Thus, we interpret norm [[ [[
s,q
as
[[G[[
s,q
= sup E(FG),
where the sup is taken over set
F D
s
p
: [[F[[
s,p
< 1.
Consider the intersection
D

:=

p>1

k>1
D
k
p
, D

:=

p>1
_
k>1
D
k
p
.
Here, D

is the set of Wiener functionals. D

is the set of generalized Wiener


functionals.
The original motivation of the Malliavin calculus theory has been to give a proba-
bilistic proof of Hormanders sum of squares theorem. The key task in this regard
is to establish general criteria in terms of the Malliavin covariance matrix for a given
random vector to possess a smooth density. In the applications of Malliavin calculus
to specic examples, one usually tries to nd sucient conditions for these general cri-
The Malliavin-Watanabe-Yoshida Theory 183
teria to be satised. To apply the Malliavin-Watanabe-Yoshida thoery of asymptotic
expansion, it is crucial for us to justify the validity through the Malliavin covariance
of the underlying variables.
Let G be a m-dimensional random variable G = (G
1
, G
2
, ..., G
m
) and denote
DG = (D
j
G
i
)
md
,
which appears as a md-matrix of H-valued random variable. The Malliavin covari-
ance matrix is dened as
(G) = ((G)
ij
)
mm
, (61)
where
(G)
ij
= DG
i
, DG
j
)
H
=
d

k=1
D
k
G
i
, D
k
G
j
)
H
.
REMARK 15. The analog of Malliavin derivative operator in nite dimensional
space R
n
is the gradient operator. Given a (
1
-function f : R
n
R, the derivative
along direction

n can be computed as
f

n
= f

n .
The resemblance to (58) convinces us that the Malliavin calculus generalizes the
ordinary nite dimensional calculus to innite dimensional settings. For more such
analogies between the Malliavin calculus and the ordinary nite dimensional calculus,
see Friz (2002) [46].
The Malliavin-Watanabe-Yoshida Theory 184
.2 The Malliavin-Watanabe-Yoshida Theory of Asymp-
totic Expansion
Suppose the random variable G() admits the asymptotic expansion in D

, i.e.
G() = G
0
+ G
1
+
2
G
2
+ +
n
G
n
+O(
n+1
), in D

. (62)
In other words,
limsup
0
1

n+1
_
_
G() [G
0
+G
1
+
2
G
2
+ +
n
G
n
]
_
_
D
s
p
< +, for any p > 1, s > 0,
(63)
where G
i
D

for i = 0, 1, 2, 3, ....
Let o be the real Schwartz space of rapidly decreasing C

-functions. Denote o

the
space of Schwartz tempered distribution, which is the dual space of o. Now, for
T o

, the question is under what condition we have that


E[T(G())] = E
0
+ E
1
+
2
E
2
+ +
n
E
n
+O(
n+1
), (64)
where

0
= T(G
0
),
1
=
T
x
(G
0
)G
1
,
2
=
1
2

2
T
x
2
(G
0
)G
2
1
+
T
x
(G
0
)G
2
, ... . (65)
It is sucient to answer under what condition we have the asymptotic expansion for
generalized Wiener functional T(G()), i.e.
T(G()) =
0
+
1
+
2

2
+ +
n

n
+O(
n+1
), in D

. (66)
The Malliavin-Watanabe-Yoshida Theory 185
In other words, there exists s > 0 such that, for all p > 1
limsup
0
1

n+1
_
_
T(G()) [
0
+
1
+
2

2
+ +
n

n
]
_
_
D
s
p
< +, (67)
where
i
D
s
p
, for i = 0, 1, 2, 3, ... .
Watanabe (1987) successfully interpreted the composition functional T(G()) as gen-
eralized Wiener functionals (i.e. the Schwartz distribution on the probability space.)
He justied that the asymptotic expansion in (66) and (64) is valid if the Malliavin
covariance of G() is uniformly non-degenerated in the sense that
limsup
0
E[det((G()))
p
] < , for all p (0, +). (68)
A crucial step to apply this successful theory is to verify the non-degeneracy of the
Malliavin covariance. This is even not easy to do for some simple cases where the
underlying Malliavin covariance is expressed by an integration of some adaptive pro-
cesses. Yoshida (1992, 1993) [93, 92, 94] not only successfully applies the theory to
statistical inference, but also gives a truncated version of the asymptotic expansion
theory, in which verication of the uniform non-degeneracy of Malliavin covariance
becomes easier. According to Yoshida (1992, 1993) [93, 92, 94], the validity of the
expansion can be obtained if there exists a random sequence

such that
the following two conditions are veried.
Condition.1: Uniform Non-degeneracy under Truncation
sup
[0,1]
E[1

1(det((G())))
p
] < +; (69)
The Malliavin-Watanabe-Yoshida Theory 186
Condition.2: Negligible Probability of Truncation
lim
0
1

n
P
_
[

[ >
1
2
_
= 0, for any n = 1, 2, 3, ... (70)
By reasonably modifying Watanabe (1987), Yoshida (1992, 1993) [93, 92, 94] es-
tablishes that the generalized Wiener functional (

)T(G()) admits the following


expansion
(

)T(G()) =
0
+
1
+
2

2
+ , in D

, (71)
where : R R is a smooth function such that 0 (x) 1 for x R,
(x) = 1, for [x[ < 1/2 and (x) = 0, for [x[ 1. Thus, (64) follows directly.
Interested readers are also referred to Uchida and Yoshida (2004) [89], Kunitomo
and Takahashi (2001) [70, 71] for the development and application of the Malliavin-
Watanabe-Yoshida theory in the valuation of contingent claims.
Implementation Source Code
In this appendix, we document some source code of our numerical implementation.
Listing 1: C++ Code: Asymptotic Expansion Formula for the Valuation of Options
on VIX
1 //This routine runs the asymptotic expansion formula for pricing VIX options
2 //under Gatherals double meanreverting model
3 //Author: Chenxu Li
4 //Date: May 1st, 2010
5
6
7
8
9
10
11 #include <stdio.h>
12 #include <math.h>
13 #include <stdlib.h>
14 #include <iostream>
15
16 #includenormal.h
17
18
19 void DMR MC Formula four(double dRate,
20 double dStrike,
21 double dRho,
22 double dRhoOne,
23 double dRhoTwo,
24 double dVZero,
25 double dUZero,
26 double dKappa,
27 double dC,
28 double dXiOne,
29 double dXiTwo,
30 double &dVIXOptionValue,
31 double dA 1,
187
Implementation Source Code 188
32 double dA 2,
33 double dA 3,
34 double dZ3,
35 double dMat)
36 {
37 const double PI = 3.1415926;
38
39
40 double dEpsilon=dXiTwosqrt(dMat);
41
42 double dF0=dA 1dVZero+dA 2dUZero+dA 3dZ3;
43 double dX0=sqrt(dF0);
44
45 double dXi=(1/dXiTwo)sqrt(dA 1dA 1dXiOnedXiOnedVZerodVZero+dA 2dA 2dXiTwodXiTwodUZerodUZero
46 +2dRhodA 1dA 2dXiOnedXiTwodVZerodUZero)/(2dX0);
47 double dY=(dStrikedX0)/(dEpsilondXi);
48
49
50 double dZeta = dA 1dXiOnedVZero/(2dX0dXi);
51 double dEta = dA 2dXiTwodUZero/(2dX0dXi);
52 double dAlpha = dA 1dXiOnedXiOnedVZero/(4dXidX0);
53 double dBeta = dA 2dXiTwodXiTwodUZero/(4dXidX0);
54 double dGamma = (1/(dXiTwodXiTwo))(2dA 1dKappa(dUZerodVZero)dA 1dXiOnedXiOnedVZero+2dA 2dC
55 (dZ3dUZero)dA 2dXiTwodXiTwodUZero)/(4dXidX0);
56 double dDelta = 0.5dXi/dX0;
57
58 double Omega1 = (dZeta+dRhodEta)/(dZetadZeta+dEtadEta+2dRhodZetadEta);
59 double Omega2 = (dEta+dRhodZeta)/(dZetadZeta+dEtadEta+2dRhodZetadEta);
60
61 double mu1 = dYOmega1;
62 double mu2 = dYOmega2;
63 double sigma1 = sqrt(1/(dXiTwodXiTwo)(1dRhodRho)dEtadEta/(dZetadZeta+dEtadEta+2dRhodZetadEta));
64 double sigma2 = sqrt(1/(dXiTwodXiTwo)(1dRhodRho)dZetadZeta/(dZetadZeta+dEtadEta+2dRhodZetadEta));
65
66 double mu1 2 = mu1mu1;
67 double mu2 2 = mu2mu2;
68 double sigma1 2 = sigma1sigma1;
69 double sigma2 2 = sigma2sigma2;
70
71
72 double theta1 = (6dA 1dKappadXiOnedVZero3dA 1dVZerodXiOnedXiOnedXiOne)/(dXiTwodXiTwo);
73 double theta2 = (6dA 1dKappadXiTwodUZero+dA 2(6dCdXiTwodUZero3dXiTwodXiTwodXiTwodUZero))
74 /(dXiTwodXiTwo);
75 double theta3 = dA 1dXiOnedXiOnedXiOnedVZero;
76 double theta4 = dA 2dXiTwodXiTwodXiTwodUZero;
77 double theta5 = 6dA 1dKappadXiOnedUZero;
78 double theta6 = 6dA 2dXiTwodCdZ36dA 1dKappadXiTwodUZero;
79
80 double dLambda0 = dAlphasigma1 2+dBetasigma2 2+dGamma;
81 double dLambda1 = dAlphaOmega1Omega1+dBetaOmega2Omega2+dDelta;
82
83 double omega0 = dLambda1dYdY+dGamma;
Implementation Source Code 189
84 double omega1 = (2dAlphasigma1Omega12dBetasigma2Omega2)dY;
85 double omega2 = dLambda0dGamma;
86
87
88
89 double theta7 = dXidLambda0/dX0;
90 double theta8 = dXidLambda1/dX0;
91
92
93
94 double dLambda2 = 3omega2omega2+omega1omega1+omega0omega0+2omega2omega0;
95
96 double dLambda3 = theta7+1/(12dXidX0)(theta1Omega1+theta2Omega2+3theta3Omega1sigma1 2+3theta4
97 Omega2sigma2 2+0.5theta5Omega1/(dXiTwodXiTwo)+0.5theta6Omega2/(dXiTwodXiTwo));
98
99 double dLambda4 = theta8+1/(12dXidX0)(theta3Omega1Omega1Omega1+theta4Omega2Omega2Omega2);
100
101
102 double dPhiY = exp(dYdY/2)/sqrt(2PI);
103 double dNY = CumNormal(dY);
104
105 double dTheta1 = dPhiYdY(1dNY); //1st Correction
106 double dTheta2 = (dLambda0+dLambda1)(1dNY)+dLambda1dYdPhiY; //2nd Correction
107 double dTheta3 = 0.5dLambda2dPhiY+dPhiY(dLambda3+(2+dYdY)dLambda4); //3rd Correction
108
109 //Implement the fourth order correctin, April 26th, 2010
110
111 double c = dC;
112 double t = 1/(dXiTwodXiTwo);
113 double y = dY;
114 double dRhoOneThree =(dZeta + dEtadRho)/sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho);
115 double dRhoTwoThree =(dEta + dZetadRho)/sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho);
116
117 double dTheta4 = dA 1((pow(t,2)pow(dKappa,2)(dUZero + dVZero))/(8dX0) + (cpow(t,2)dKappa
118 (dUZero + dZ3))/(8dX0) +
119 (tdKappadUZero(2pow(dXiOne,2)pow(dRhoOneThree,2) + pow(dXiTwo,2)pow(dRhoTwoThree,2)))
120 /(24(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dX0) +
121 (dVZeropow(dXiOne,4)pow(t + sigma1 2 + pow(Omega1,2),2))/(32dX0) +
122 (tdKappa(3dVZeropow(dXiOne,2)(t sigma1 2 pow(Omega1,2)) +
123 dUZero((tpow(dXiTwo,2)pow(dRhoTwoThree,2)) + pow(dXiOne,2)(3t + 3sigma1 2 +
124 2tpow(dRhoOneThree,2) + 3pow(Omega1,2))
125 dXiOnedXiTwoOmega1(tdEta + tdZetadRho Omega2))))/(24dX0))
126 (pow(dXi,2)(pow(dGamma,2) + 3pow(dAlpha,2)pow(sigma1 2,2) + 3pow(dBeta,2)pow(sigma2 2,2)
127 + 2dGammadLambda1 + 3pow(dLambda1,2) + 2dLambda3 + 6dLambda4 +
128 2dAlphasigma1 2(dGamma + 3dBetasigma2 2 + dLambda1 + 2dAlphapow(Omega1,2))
129 8dAlphadBetasqrt(sigma1 2)sqrt(sigma2 2)Omega1Omega2 +
130 2dBetasigma2 2(dGamma + dLambda1 + 2dBetapow(Omega2,2))))/(4dX0) +
131 dA 2((pow(c,2)pow(t,2)(dUZero dZ3))/(8dX0) (ctdZ3pow(dXiTwo,2)pow(dRhoTwoThree,2))
132 /(12(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dX0) +
133 (dUZeropow(dXiTwo,4)pow(t + sigma2 2 + pow(Omega2,2),2))/(32dX0) +
134 (ctpow(dXiTwo,2)(3dUZero(t sigma2 2 pow(Omega2,2)) + dZ3(3t + 3sigma2 2 + 2t
135 pow(dRhoTwoThree,2) + 3pow(Omega2,2))))/(24dX0)) +
Implementation Source Code 190
136 (2dNY1)(dA 1((pow(t,2)pow(dKappa,2)(dUZero dVZero))/(8dX0) + (cpow(t,2)dKappa
137 (dUZero dZ3))/(8dX0) +
138 (tdKappadUZero(2pow(dXiOne,2)pow(dRhoOneThree,2) pow(dXiTwo,2)pow(dRhoTwoThree,2)))
139 /(24(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dX0)
140 (dVZeropow(dXiOne,4)pow(t + sigma1 2 + pow(Omega1,2),2))/(32dX0) +
141 (tdKappa(3dVZeropow(dXiOne,2)(t + sigma1 2 + pow(Omega1,2)) +
142 dUZero(tpow(dXiTwo,2)pow(dRhoTwoThree,2) pow(dXiOne,2)(3t + 3sigma1 2 + 2t
143 pow(dRhoOneThree,2) + 3pow(Omega1,2)) +
144 dXiOnedXiTwoOmega1(tdEta + tdZetadRho Omega2))))/(24dX0)) +
145 (pow(dXi,2)(pow(dGamma,2) + 3pow(dAlpha,2)pow(sigma1 2,2) + 3pow(dBeta,2)
146 pow(sigma2 2,2) + 2dGammadLambda1 + 3pow(dLambda1,2) + 2dLambda3 + 6dLambda4 +
147 2dAlphasigma1 2(dGamma + 3dBetasigma2 2 + dLambda1 + 2dAlphapow(Omega1,2))
148 8dAlphadBetasqrt(sigma1 2)sqrt(sigma2 2)Omega1Omega2 +
149 2dBetasigma2 2(dGamma + dLambda1 + 2dBetapow(Omega2,2))))/(4dX0) +
150 dA 2((pow(c,2)pow(t,2)(dUZero + dZ3))/(8dX0) + (ctdZ3pow(dXiTwo,2)
151 pow(dRhoTwoThree,2))/(12(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dX0)
152 (dUZeropow(dXiTwo,4)pow(t + sigma2 2 + pow(Omega2,2),2))/(32dX0) +
153 (ctpow(dXiTwo,2)(3dUZero(t + sigma2 2 + pow(Omega2,2)) dZ3(3t + 3sigma2 2
154 + 2tpow(dRhoTwoThree,2) + 3pow(Omega2,2))))/(24dX0))) +
155 ((pow(y,7)pow(dLambda1,3))/(6sqrt(2PI)) + pow(y,5)((pow(dA 1,2)pow(dVZero,2)
156 pow(dXiOne,5)pow(Omega1,5))/(48sqrt(2PI)pow(dXi,2)pow(dX0,2)) +
157 (pow(dA 2,2)pow(dUZero,2)pow(dXiTwo,5)pow(Omega2,5))/(48sqrt(2PI)pow(dXi,2)
158 pow(dX0,2)) +
159 (dA 1dA 2dUZerodVZeropow(dXiOne,2)pow(dXiTwo,2)pow(Omega1,2)pow(Omega2,2)
160 (dXiOneOmega1 + dXiTwoOmega2))/
161 (48sqrt(2PI)pow(dXi,2)pow(dX0,2)) + (dXitheta8 + (2dXi + (dGamma +
162 dAlphasigma1 2 + dBetasigma2 2)dX0)pow(dLambda1,2) 2dX0pow(dLambda1,3)
163 dXidLambda4 +
164 4dX0dLambda1pow(dAlphasqrt(sigma1 2)Omega1 dBetasqrt(sigma2 2)Omega2,2))
165 /(2sqrt(2PI)dX0)) +
166 pow(y,3)((dA 2dUZeropow(dXiTwo,4)pow(Omega2,4))/(48sqrt(2PI)dX0) +
167 pow(dA 2,2)((ctdUZero(8dUZero + 5dZ3)pow(dXiTwo,3)pow(Omega2,3))
168 /(48sqrt(2PI)pow(dXi,2)pow(dX0,2)) +
169 ((2t + 5sigma2 2)pow(dUZero,2)pow(dXiTwo,5)pow(Omega2,3))/(24sqrt(2PI)
170 pow(dXi,2)pow(dX0,2))) +
171 pow(dA 1,2)(((2t + 5sigma1 2)pow(dVZero,2)pow(dXiOne,5)pow(Omega1,3))
172 /(24sqrt(2PI)pow(dXi,2)pow(dX0,2)) +
173 (tdKappadVZeropow(dXiOne,2)pow(Omega1,2)(8dVZerodXiOneOmega1 +
174 dUZero(5dXiOneOmega1 + 3dXiTwoOmega2)))/
175 (48sqrt(2PI)pow(dXi,2)pow(dX0,2))) + (dXitheta7 (pow(dXi,2) + 4(dGamma
176 + dAlphasigma1 2 + dBetasigma2 2)dX0)pow(dLambda1,2) dXidLambda3
177 2pow(dXi,2)dLambda4
178 8pow(dAlpha,2)dXisigma1 2pow(Omega1,2) + 4pow(dAlpha,2)dGammasigma1 2
179 dX0pow(Omega1,2) + 16dAlphadBetadXisqrt(sigma1 2)sqrt(sigma2 2)Omega1Omega2
180 8dAlphadBetadGammasqrt(sigma1 2)sqrt(sigma2 2)dX0Omega1Omega2 8pow(dBeta,2)
181 dXisigma2 2pow(Omega2,2) + 4pow(dBeta,2)dGammasigma2 2dX0pow(Omega2,2) +
182 dLambda1(3pow(dAlpha,2)pow(sigma1 2,2)dX0 + 3pow(dBeta,2)pow(sigma2 2,2)dX0
183 + dGamma(4dXi + dGammadX0) +
184 2dAlphasigma1 2(2dXi + dX0(dGamma + 3dBetasigma2 2 8dAlphapow(Omega1,2)))
185 + 32dAlphadBetasqrt(sigma1 2)sqrt(sigma2 2)dX0Omega1Omega2
186 2dBetasigma2 2(2dXi dX0(dGamma 8dBetapow(Omega2,2)))))/(2sqrt(2PI)dX0) +
187 dA 1((dVZeropow(dXiOne,4)pow(Omega1,4))/(48sqrt(2PI)dX0) +
Implementation Source Code 191
188 dA 2((ctdVZeropow(dXiOne,2)pow(Omega1,2)(2dUZero(dXiOneOmega1 + 3dXiTwo
189 Omega2) +
190 dZ3(2dXiOneOmega1 + 3dXiTwoOmega2)))/(48sqrt(2PI)pow(dXi,2)pow(dX0,2)) +
191 (tdKappadUZeropow(dXiTwo,2)pow(Omega2,2)(2dVZero(3dXiOneOmega1 + dXiTwo
192 Omega2) + dUZero(3dXiOneOmega1 + 5dXiTwoOmega2)))/
193 (48sqrt(2PI)pow(dXi,2)pow(dX0,2)) (dUZerodVZeropow(dXiOne,2)pow(dXiTwo,2)
194 (dXiTwoOmega2(3(t sigma2 2)pow(Omega1,2) + 6sqrt(sigma1 2)sqrt(sigma2 2)
195 Omega1Omega2 + (t sigma1 2)pow(Omega2,2)) +
196 dXiOneOmega1((t sigma2 2)pow(Omega1,2) + 6sqrt(sigma1 2)sqrt(sigma2 2)
197 Omega1Omega2 + 3(t sigma1 2)pow(Omega2,2))))/
198 (48sqrt(2PI)pow(dXi,2)pow(dX0,2))))) + y(dA 2((ctdZ3pow(dXiTwo,2)
199 pow(dRhoTwoThree,2))/(6sqrt(2PI)(pow(dZeta,2) + pow(dEta,2) + 2dZetadEta
200 dRho)dX0) +
201 (ct(dUZero + dZ3)pow(dXiTwo,2)pow(Omega2,2))/(4sqrt(2PI)dX0) +
202 (dUZeropow(dXiTwo,4)pow(Omega2,2)(2t + 2sigma2 2 + pow(Omega2,2)))/(16sqrt(2PI)dX0)) +
203 (6pow(dGamma,2)dXi + pow(dGamma,3)dX0 + 15pow(dAlpha,3)pow(sigma1 2,3)dX0 +
204 15pow(dBeta,3)pow(sigma2 2,3)dX0 9pow(dBeta,2)pow(sigma2 2,2)(2dXi
205 dX0(dGamma 2dLambda1))
206 9pow(dAlpha,2)pow(sigma1 2,2)(2dXi dX0(dGamma + 5dBetasigma2 2 2dLambda1))
207 6dGammapow(dXi,2)dLambda1 6pow(dGamma,2)dX0dLambda1 9pow(dXi,2)pow(dLambda1,2)
208 6pow(dXi,2)dLambda3 18pow(dXi,2)dLambda4 3dAlphasigma1 2(15pow(dBeta,2)
209 pow(sigma2 2,2)dX0 + 6dBetasigma2 2(2dXi dX0(dGamma 2dLambda1)) +
210 dGammadX0(dGamma + 4dLambda1 + 8dAlphapow(Omega1,2)) + 2dXi(2dGamma +
211 dXidLambda1 + 2dAlphadXipow(Omega1,2))) +
212 24dAlphadBetasqrt(sigma1 2)sqrt(sigma2 2)(pow(dXi,2) + 2dGammadX0)Omega1Omega2
213 3dBetasigma2 2(dGammadX0(dGamma + 4dLambda1 + 8dBetapow(Omega2,2)) +
214 2dXi(dXidLambda1 + 2(dGamma + dBetadXipow(Omega2,2)))))/(6sqrt(2PI)dX0) +
215 pow(dA 2,2)(((pow(t,2) 4tsigma2 2 + 5pow(sigma2 2,2))pow(dUZero,2)pow(dXiTwo,5)
216 Omega2)/(16sqrt(2PI)pow(dXi,2)pow(dX0,2)) +
217 (pow(c,2)pow(t,2)(dUZero dZ3)dXiTwo(2sqrt(pow(dZeta,2) + pow(dEta,2) +
218 2dZetadEtadRho)dUZeroOmega2 + dZ3(dRhoTwoThree 2sqrt(pow(dZeta,2) +
219 pow(dEta,2) + 2dZetadEtadRho)Omega2)))/
220 (8sqrt(2PI)pow(dXi,2)sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)pow(dX0,2)) +
221 (ctdUZeropow(dXiTwo,3)(4sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)
222 (t 2sigma2 2)dUZeroOmega2 +
223 dZ3(tdRhoTwoThree + sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)Omega2
224 (8sigma2 2 + t(7 + 3(dEta + dZetadRho)Omega2)))))/
225 (16sqrt(2PI)pow(dXi,2)sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)pow(dX0,2))) +
226 pow(dA 1,2)(((pow(t,2) 4tsigma1 2 + 5pow(sigma1 2,2))pow(dVZero,2)pow(dXiOne,5)
227 Omega1)/(16sqrt(2PI)pow(dXi,2)pow(dX0,2))
228 (pow(t,2)pow(dKappa,2)(dUZero dVZero)(2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)
229 dVZerodXiOneOmega1 +
230 dUZero((dXiTwodRhoTwoThree) + dXiOne(dRhoOneThree 2sqrt(pow(dZeta,2) + pow(dEta,2)
231 + 2dZetadEtadRho)Omega1))))/(8sqrt(2PI)pow(dXi,2)sqrt(pow(dZeta,2) + pow(dEta,2)
232 + 2dZetadEtadRho)pow(dX0,2)) +
233 (tdKappadVZeropow(dXiOne,2)(4sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)
234 (t 2sigma1 2)dVZerodXiOneOmega1 +
235 dUZero(dXiOne(tdRhoOneThree + sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)
236 Omega1(8sigma1 2 + t(7 + 3(dZeta + dEtadRho)Omega1)))
237 tdXiTwo(dRhoTwoThree + sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)(Omega2
238 + Omega1(2dRho + 3(dZeta + dEtadRho)Omega2))))))/
239 (16sqrt(2PI)pow(dXi,2)sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)pow(dX0,2))) +
Implementation Source Code 192
240 dA 1((tdKappadUZero(2pow(dXiOne,2)pow(dRhoOneThree,2) + pow(dXiTwo,2)
241 pow(dRhoTwoThree,2)))/(12sqrt(2PI)(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dX0) +
242 (dVZeropow(dXiOne,4)pow(Omega1,2)(2t + 2sigma1 2 + pow(Omega1,2)))/(16sqrt(2PI)dX0) +
243 (tdKappadXiOneOmega1(3dVZerodXiOneOmega1 + dUZero(3dXiOneOmega1 + dXiTwoOmega2)))
244 /(12sqrt(2PI)dX0) +
245 dA 2((dUZerodVZeropow(dXiOne,2)pow(dXiTwo,2)
246 (dXiTwo(2sqrt(sigma1 2)(t sigma2 2)sqrt(sigma2 2)Omega1 sigma1 2(t 3sigma2 2)Omega2
247 + t(t sigma2 2)Omega2) +
248 dXiOne(((sigma1 2(t 3sigma2 2)) + t(t sigma2 2))Omega1 + 2(t sigma1 2)sqrt(sigma1 2)
249 sqrt(sigma2 2)Omega2)))/
250 (16sqrt(2PI)pow(dXi,2)pow(dX0,2)) + (tdKappadUZeropow(dXiTwo,2)
251 (2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dVZero((t sigma2 2)dXiTwoOmega2 +
252 dXiOne((t sigma2 2)Omega1 + 2sqrt(sigma1 2)sqrt(sigma2 2)Omega2)) +
253 dUZero(dXiTwo((tdRhoTwoThree) + sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)Omega2
254 (t + 2sigma2 2 3t(dEta + dZetadRho)Omega2)) +
255 dXiOne(tdRhoOneThree + sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)(2(tdRho +
256 2sqrt(sigma1 2)sqrt(sigma2 2))Omega2 + Omega1(2sigma2 2 + 3t(1 + (dEta + dZetadRho)Omega2)))))))/
257 (16sqrt(2PI)pow(dXi,2)sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)pow(dX0,2)) +
258 c((pow(t,2)dKappa(dVZerodZ3(2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dXiOneOmega1
259 + dXiTwo(dRhoTwoThree 2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)Omega2)) +
260 pow(dUZero,2)(dXiOne(dRhoOneThree 2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)Omega1)
261 dXiTwo(dRhoTwoThree + 2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)Omega2)) +
262 dUZero(2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dVZero(dXiOneOmega1 + dXiTwoOmega2) +
263 dZ3((dXiOne(dRhoOneThree 2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)Omega1)) +
264 2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dXiTwoOmega2))))/
265 (8sqrt(2PI)pow(dXi,2)sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)pow(dX0,2)) +
266 (tdVZeropow(dXiOne,2)(2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)dUZero
267 ((t sigma1 2)dXiOneOmega1 + dXiTwo(2sqrt(sigma1 2)sqrt(sigma2 2)Omega1 + tOmega2
268 sigma1 2Omega2)) +
269 dZ3(2sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)(t + sigma1 2)dXiOneOmega1 +
270 dXiTwo(tdRhoTwoThree + sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)((3t + 2sigma1 2)
271 Omega2 + Omega1(4sqrt(sigma1 2)sqrt(sigma2 2) + t(2dRho + 3(dZeta + dEtadRho)Omega2))))))
272 )/(16sqrt(2PI)pow(dXi,2)sqrt(pow(dZeta,2) + pow(dEta,2) + 2dZetadEtadRho)pow(dX0,2)))))))
273 sqrt(2PI)dPhiY;
274
275
276
277 //Compute up to the 4th term
278 dVIXOptionValue =dXiexp(dRatedMat)(dEpsilondTheta1+dEpsilondEpsilondTheta2
279 +dEpsilondEpsilondEpsilondTheta3+dEpsilondEpsilon
280 dEpsilondEpsilondTheta4);
281
282 //Multiply By 100 to obtain the VIX option price
283 dVIXOptionValue = dVIXOptionValue100;
284
285 }
Listing 2: C++ Code: Benchmark Monte Carlo Simulation for Pricing VIX Option
under Gatherals Double Lognormal SV Model
1 //This routine runs the Monte Carlo simulation for pricing VIX options under
Implementation Source Code 193
2 //Gatherals double meanreverting model. We employ Euler discretisation with
3 //LKV partial truncation.
4
5
6 #include <stdio.h>
7 #include <math.h>
8 #include <stdlib.h>
9 #include <iostream>
10 #includenormal.h
11 #includemt19937ar.h
12
13 using std::cout;
14
15 void DMR Simulation(double dRate,
16 double dStrike,
17 double dRho,
18 double dRhoOne,
19 double dRhoTwo,
20 double dVZero,
21 double dUZero,
22 double dKappa,
23 double dC,
24 double dXiOne,
25 double dXiTwo,
26 long lSimTrial,
27 long lSteps,
28 double dDeltaT,
29 double &dSimVal,
30 double &dStdErr,
31 double dA 1,
32 double dA 2,
33 double dA 3,
34 double dZ3,
35 double dMat)
36
37 {
38
39 double dV;
40 double dU;
41 double dSqrt=sqrt(dDeltaT);
42
43 double dConst1=dKappadDeltaT;
44 double dConst2=dCdDeltaT;
45 double dConst3=dSqrtdXiOne;
46 double dConst4=dSqrtdXiTwodRho;
47 double dConst5=dSqrtdXiTwosqrt(1dRhodRho);
48 double dConst6=dA 3dZ3;
49
50 double dTempNormal1;
51 double dTempNormal2;
52
53 double dOptVal; //The Option Valve computed from each simulation trial
Implementation Source Code 194
54 double dSum=0.0;
55 double dSumSq=0.0; //the sum of squares
56
57
58 for (int i=1;i<=lSimTrial;i++)
59 {
60 dV=dVZero;
61 dU=dUZero;
62
63 for (int j=1;j<=lSteps;j++)
64 {
65 //save normal variables to implement a 2dimensional Brownian motion;
66 //we use Mersense Twister RN generator;
67 dTempNormal1=CumNormalInv(genrand real3());
68 dTempNormal2=CumNormalInv(genrand real3());
69
70 //Euler Scheme
71 dV+=dConst1(dUdV)+dVdConst3dTempNormal1;
72 dU+=dConst2(dZ3dU)+dU(dConst4dTempNormal1+dConst5dTempNormal2);
73
74 //LKV partial truncation
75 if (dV<0)
76 {
77 dV=0;
78 }
79 if (dU<0)
80 {
81 dU=0;
82 }
83
84 }
85
86 double dTemp = sqrt(dA 1dV+dA 2dU+dConst6)dStrike;
87
88
89 if (dTemp>0)
90 {
91 dOptVal=dTemp;
92 }
93 else
94 {
95 dOptVal=0;
96 }
97
98 if(i%1000 == 0)
99 {
100 cout<<dOptVal<<\n;
101 }
102 dSum+=dOptVal;
103 dSumSq+=dOptValdOptVal;
104
105 }//end of for
Implementation Source Code 195
106
107 dSimVal=exp(dRatedMat)dSum/lSimTrial;
108 dStdErr=sqrt((dSumSqdSumdSum/lSimTrial)/((lSimTrial1.0)lSimTrial));
109
110 //Multiply by 100 to obtain the VIX option value
111 dSimVal = 100dSimVal;
112
113 }
Listing 3: MATLAB Code: Computing Timer Option Price via the Black-Scholes-
Merton Type Formula
1 % This routine computes the timer option price via the BlackScholesMerton
2 % type formula.
3 S0 = 100;
4 K = 100;
5 r = 0.04;
6 rho = 0.5;
7 V0 = 0.0625;
8 kappa = 2;
9 theta = 0.0324;
10 sigmav = 0.1;
11
12 B = 0.0265;
13
14 nu = kappa theta / (sigmavsigmav) 0.5;
15 X0 = V0 / sigmav;
16
17 maxrealdouble = realmax(double);
18 %% Main Routine
19
20 tic;
21
22 u = 0.01:0.01:0.99;
23 z = 0.90:0.01:0.99;
24
25 n u = length(u);
26 n z = length(z);
27
28
29 integrand value = zeros(n u, n z);
30
31 for l = 1:n z
32 for k = 1: n u
33 integrand value(k,l) = integrand(u(k),z(l),nu,X0,B,S0,K,r,rho,V0,kappa,...
34 theta,sigmav,maxrealdouble);
35 [k,l]
36 end
37 end
38
39 mesh(u,z,integrand value);
Implementation Source Code 196
40
41 xlabel(xuaxis),ylabel(tzaxis),zlabel(integrand valueaxis);
42
43 %%
44 %Compute the Integral
45 trap weight u = linspace(0,0,n u);
46 trap weight u(1) = 0.5;
47 for k = 2 : (n u1)
48 trap weight u(k)=1;
49 end
50 trap weight u(n u) = 0.5;
51
52 trap weight z = linspace(0,0,n z);
53 trap weight z(1) = 0.5;
54 for k = 2 : (n z1)
55 trap weight z(k)=1;
56 end
57 trap weight z(n z) = 0.5;
58
59 grid = 0.01;
60
61 trap weight uintegrand valuetrap weight zgridgrid
62
63 toc
Listing 4: MATLAB Code: Computing the Integration Kernel of the Timer Option
Valuation Formula
1 %This routine evaluates the integrand of the BlackScholesMerton type formula for
2 %pricing timer option. It implements the Bessel joint density and the
3 %rotation couting algorithm for Laplace transform inversion.
4
5 function e = integrand(u,z,nu,X0,B,S0,K,r,rho,V0,kappa,theta,sigmav,maxrealdouble)
6
7 x = log(u);
8 t = log(z);
9
10 %% Compute the joint density via Trapezoidal Rule
11
12 % select the total number of steps,
13 N = 10000;
14 %choose gamma for computing the Bromwich integral
15 gamma = 1000;
16
17 h = pi/B;
18
19 y = linspace(0,0,N+1);
20 y(1) = 0;
21 for l = 2:(N+1)
22 y(l) = y(l1)+h;
23 end
Implementation Source Code 197
24 %% Compute the density
25
26 %nd the square root of lambda
27 lambda = gamma+iy;
28 rootLambda = sqrt(lambda);
29
30 p = real(rootLambda);
31 q = imag(rootLambda);
32
33 argRoot = 0.5angle(lambda);
34
35 %Replace a frequently computed quantity
36 E = exp(tp/sqrt(2));
37 Esquare = exp(sqrt(2)tp);
38
39
40 %Rotation couting algorithm for nonoverowed case
41 if (Esquare<maxrealdouble)
42 %compute the phase and radius of the numerator
43 rN = 4sqrt(2X0x)sqrt(p.2+q.2).E;
44 argN = argRoot+tq/sqrt(2);
45
46 %compute the phase and radius of the denominator
47
48 %rD = sqrt(E.42E.2.cos(sqrt(2)tq)+1);
49 rD = abs(Esquare.exp(isqrt(2)tq)1);
50
51 %rotation counting number
52 m = oor((sqrt(2)tq+pi)/(2pi));
53
54 %compute the phase of the denominator
55 argD = angle(Esquare.exp(isqrt(2)tq)1);
56
57 %rotation number of the bessel argument
58 ArgA = argNargD2mpi;
59 n = oor((ArgA+pi)/(2pi));
60
61 %principal phase of the argument
62 argA = ArgA2npi;
63
64 %evaluation of Bessel
65 MYBESSEL = besseli(2nu,(rN./rD).exp(iargA)).exp(4nnupii);
66
67 %evaluation of the function value
68 SIN H = 0.5(E.exp(itq/sqrt(2))(1./E).exp(itq/sqrt(2)));
69 COS H = 0.5(E.exp(itq/sqrt(2))+(1./E).exp(itq/sqrt(2)));
70
71 f = real(sqrt(2)(p+iq)x(nu+1)./((X0nu)SIN H).exp((X0+x)sqrt(2)(p+iq)....
72 COS H./SIN H).MYBESSEL);
73
74 else
75 %overowed case
Implementation Source Code 198
76 %radius of the bessel argument
77 rA = 4sqrt(2X0x)sqrt(p.2+q.2).exp(tp/sqrt(2));
78 ArgA = argRoottq/sqrt(2);
79
80 %rotation number
81 n = oor((ArgA+pi)/(2pi));
82
83 %principal phase
84 argA = ArgA2npi;
85
86 %corrected Bessel value;
87 MYBESSEL = besseli(2nu,rA.exp(iargA)).exp(4nnupii);
88
89 %function value of this case
90 %Q: do we need to use dot product before exp
91
92 f = real(2sqrt(2)sqrt(p.2+q.2)x(nu+1)/(X0nu).exp(tp/sqrt(2)+i(argRoottq/sqrt(2))...
93 (X0+x)sqrt(2)(p+iq)).MYBESSEL);
94 end
95
96 %% Compute density by trapezoidal rule
97
98
99 %the trapezoidal weight
100
101 weight = linspace(0,0,N+1);
102 weight(1) = 0.5;
103 weight(2) = 1;
104 for k = 3:(N+1)
105 weight(k) = weight(k1);
106 end
107
108 %computation of the density
109 d = exp(gammaB)/B(weightf);
110
111 %%
112 %An Alternative Way of Computing BS with change of measure
113 v = sigmavx;
114 xi = t/sigmav;
115
116 d0 = (rho/sigmav)(vV0kappathetaxi+kappaB)0.5rhorhoB;
117 d1 = (1/sqrt((1rhorho)B))(log(S0/K)+rxi+0.5B(1rhorho)+d0);
118 d2 = (1/sqrt((1rhorho)B))(log(S0/K)+rxi0.5B(1rhorho)+d0);
119
120 bs change measure = (S0exp(d0)normcdf(d1)Kexp(rxi)normcdf(d2))exp(kappa(V0v)/...
121 (sigmavsigmav)+kappakappathetaxi/(sigmavsigmav)0.5kappakappaB/(sigmavsigmav));
122
123 %%
124 %evaluation of the integrand
125 e = bs change measured/(uz);

Вам также может понравиться