Author of the publication

Efficient pricing of Bermudan options using recombining quadratures.

, , and . J. Comput. Appl. Math., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

De-identification and restoration methods for protecting privacy in off-line documents., , and . ICTC, page 1543-1545. IEEE, (2020)Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters., , , , , , , and . EuroSys, page 575-588. ACM, (2017)Early Wildfire Detection Using Convolutional Neural Network., , , and . IW-FCV, volume 1212 of Communications in Computer and Information Science, page 18-30. Springer, (2020)Security policy specification for home network., , , and . Int. J. Ad Hoc Ubiquitous Comput., 4 (6): 372-378 (2009)Security model for video surveillance system., and . ICTC, page 100-104. IEEE, (2012)Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing., , , and . PDCAT, volume 931 of Communications in Computer and Information Science, page 84-89. Springer, (2018)Extraction of Meta-Data for Recommendation Using Keyword Mapping., , , and . IEEE Access, (2024)Efficient pricing of Bermudan options using recombining quadratures., , and . J. Comput. Appl. Math., (2014)A Secret Key Updating Method between Devices for Secure Smart Services., and . ICTC, page 946-948. IEEE, (2018)Security Framework for Home Network: Authentication, Authorization, and Security Policy., , , , and . PAKDD Workshops, volume 4819 of Lecture Notes in Computer Science, page 621-628. Springer, (2007)