LEADER 01007nam a22002411i 4500 001 991001906699707536 005 20030407105323.0 008 030925s1965 xxu|||||||||||||||||eng 035 $ab12214425-39ule_inst 035 $aARCHE-026207$9ExL 040 $aBiblioteca Interfacoltà$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 100 1 $aBaron, Salo Wittmayer$0177712 245 10$aOn the empire's periphery /$cby Salo Wittmayer Baron 250 $a2. ed. rev. and enlarged 260 $aNew York :$bColumbia University Press,$c1965 300 $a432 p. ;$c24 cm 440 2$aA social and religious history of the Jews.$pLate Middle Ages and Era of european expansion ;$v10 907 $a.b12214425$b02-04-14$c08-10-03 912 $a991001906699707536 945 $aLE002 St. VI G 1/X$cV. 10$g1$iLE002-22733$lle002$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i12594246$z08-10-03 996 $aOn the empire's periphery$9155361 997 $aUNISALENTO 998 $ale002$b08-10-03$cm$da $e-$feng$gxxu$h0$i1 LEADER 06899nam 2201585 450 001 9910786777403321 005 20230803203840.0 010 $a1-4008-5051-7 024 7 $a10.1515/9781400850518 035 $a(CKB)3710000000204272 035 $a(EBL)1680802 035 $a(OCoLC)885122066 035 $a(SSID)ssj0001290892 035 $a(PQKBManifestationID)11722461 035 $a(PQKBTitleCode)TC0001290892 035 $a(PQKBWorkID)11245465 035 $a(PQKB)11006836 035 $a(MiAaPQ)EBC1680802 035 $a(StDuBDS)EDZ0001756160 035 $a(DE-B1597)447402 035 $a(OCoLC)888550795 035 $a(OCoLC)979630034 035 $a(OCoLC)984676792 035 $a(OCoLC)987942185 035 $a(OCoLC)992455040 035 $a(OCoLC)999360571 035 $a(DE-B1597)9781400850518 035 $a(Au-PeEL)EBL1680802 035 $a(CaPaEBR)ebr10901474 035 $a(CaONFJC)MIL633490 035 $a(EXLCZ)993710000000204272 100 $a20140812h20142014 uy 0 101 0 $aeng 135 $aur|nu---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aHidden Markov processes $etheory and applications to biology /$fM. Vidyasagar 205 $aCourse Book 210 1$aPrinceton, New Jersey ;$aOxford, England :$cPrinceton University Press,$d2014. 210 4$d©2014 215 $a1 online resource (303 p.) 225 1 $aPrinceton Series in Applied Mathematics 300 $aDescription based upon print version of record. 311 0 $a0-691-13315-8 320 $aIncludes bibliographical references and index. 327 $tFront matter --$tContents --$tPreface --$tPART 1. Preliminaries --$tChapter One. Introduction to Probability and Random Variables --$tChapter Two. Introduction to Information Theory --$tChapter Three. Nonnegative Matrices --$tPART 2. Hidden Markov Processes --$tChapter Four. Markov Processes --$tChapter Five. Introduction to Large Deviation Theory --$tChapter Six. Hidden Markov Processes: Basic Properties --$tChapter Seven. Hidden Markov Processes: The Complete Realization Problem --$tPART 3. Applications to Biology --$tChapter Eight. Some Applications to Computational Biology --$tChapter Nine. BLAST Theory --$tBibliography --$tIndex --$tBack matter 330 $aThis book explores important aspects of Markov and hidden Markov processes and the applications of these ideas to various problems in computational biology. The book starts from first principles, so that no previous knowledge of probability is necessary. However, the work is rigorous and mathematical, making it useful to engineers and mathematicians, even those not interested in biological applications. A range of exercises is provided, including drills to familiarize the reader with concepts and more advanced problems that require deep thinking about the theory. Biological applications are taken from post-genomic biology, especially genomics and proteomics. The topics examined include standard material such as the Perron-Frobenius theorem, transient and recurrent states, hitting probabilities and hitting times, maximum likelihood estimation, the Viterbi algorithm, and the Baum-Welch algorithm. The book contains discussions of extremely useful topics not usually seen at the basic level, such as ergodicity of Markov processes, Markov Chain Monte Carlo (MCMC), information theory, and large deviation theory for both i.i.d and Markov processes. The book also presents state-of-the-art realization theory for hidden Markov models. Among biological applications, it offers an in-depth look at the BLAST (Basic Local Alignment Search Technique) algorithm, including a comprehensive explanation of the underlying theory. Other applications such as profile hidden Markov models are also explored. 410 0$aPrinceton series in applied mathematics. 606 $aComputational biology 606 $aMarkov processes 610 $aBLAST theory. 610 $aBaum?elch algorithm. 610 $aBayes' rule. 610 $aCramr's theorem. 610 $aGENSCAN algorithm. 610 $aGLIMMER algorithm. 610 $aHankel matrix. 610 $aHankel rank condition. 610 $aHoeffding's inequality. 610 $aKullback?eibler divergence. 610 $aMarkov chain. 610 $aMarkov process. 610 $aMarkov property. 610 $aMonte Carlo simulation. 610 $aPerron?robenius theorem. 610 $aProbability theory. 610 $aSanov's theorem. 610 $aViterbi algorithm. 610 $aalignment. 610 $aalpha-mixing process. 610 $aamino acids. 610 $acanonical form. 610 $acomplete realization problem. 610 $acomputational biology. 610 $aconcave function. 610 $aconditional entropy. 610 $aconvex function. 610 $aentropy function. 610 $aentropy. 610 $aergodicity. 610 $aexpected value. 610 $afinite alphabet. 610 $agene-finding problem. 610 $agenomics. 610 $ahidden Markov model. 610 $ahidden Markov processes. 610 $ahitting probability. 610 $ainformation theory. 610 $airreducible matrices. 610 $alarge deviation property. 610 $alarge deviation theory. 610 $alikelihood estimation. 610 $alikelihood. 610 $alower semi-continuous function. 610 $alower semi-continuous relaxation. 610 $amaximal segmental score. 610 $amaximum likelihood estimate. 610 $amean hitting time. 610 $amoment generating function. 610 $anonnegative matrices. 610 $anucleotide. 610 $aoptimal gapped alignment. 610 $aperiodic irreducible matrices. 610 $apost-genomic biology. 610 $aprimitive matrices. 610 $aprobability distribution. 610 $aprobability. 610 $aprotein classification. 610 $aproteomics. 610 $aquasi-realization. 610 $arandom variable. 610 $arate function. 610 $arecurrent state. 610 $arelative entropy rate. 610 $arelative entropy. 610 $asequence alignment. 610 $asequence. 610 $astate transition matrix. 610 $astationary distribution. 610 $atotal variation distance. 610 $atransient state. 610 $aultra-mixing process. 615 0$aComputational biology. 615 0$aMarkov processes. 676 $a570.285 686 $aSK 820$2rvk 700 $aVidyasagar$b M$g(Mathukumalli),$f1947-$08077 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910786777403321 996 $aHidden Markov processes$93733147 997 $aUNINA LEADER 05349nam 22006494a 450 001 9910830231403321 005 20230617024708.0 010 $a1-118-67332-8 010 $a1-280-26933-2 010 $a9786610269334 010 $a0-470-09266-1 035 $a(CKB)111087027097486 035 $a(EBL)175033 035 $a(OCoLC)475880141 035 $a(SSID)ssj0000183413 035 $a(PQKBManifestationID)11170614 035 $a(PQKBTitleCode)TC0000183413 035 $a(PQKBWorkID)10195216 035 $a(PQKB)10202749 035 $a(MiAaPQ)EBC175033 035 $a(EXLCZ)99111087027097486 100 $a20031006d2004 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInvestment risk management$b[electronic resource] /$fYen Yee Chong 210 $aChichester, West Sussex, England ;$aHoboken, NJ $cJohn Wiley & Sons$dc2004 215 $a1 online resource (222 p.) 225 1 $aWiley finance series 300 $aDescription based upon print version of record. 311 $a0-470-84951-7 320 $aIncludes bibliographical references and index. 327 $aInvestment Risk Management; Contents; 1 Introduction to Investment Risk; Dream versus rude awakening; Book structure; 2 The Beginning of Risk; Risk and business; Case study: The shark and its risk; Case study: The ruin of Cre?dit Lyonnais (CL); Case study: ABB engineering; Investment scams; Banking risk and sharks; Risk management as a discipline; Humans and risk; Case study: High-street retail store losses; Case study: Allied Irish Bank (AIB); The state of the investment game; Risk types; Reputation risk; Case study: Equitable Life; Credit risk; Market risk; Operational risk; Risk and damage 327 $aViable alternatives3 Investing under Risk; Human behaviour and investment choice; Portfolio management; Value-at-Risk (VaR); Monte Carlo simulation; Collective use of mathematical tools; Position keeping; Investment managerial control; The treasurer's role; Trading and risk management; Investment risk experts; Case study: A large UK PLC defined benefits pension fund; Who controls whom; 4 Investing under Attack; Investor disenchantment; Risk-bearers and risk-takers; Professional investor/shareholder; Investment companies/fund managers; Investment banks; Auditors; A look in the risk mirror 327 $aRisk-averseRisk-neutral; Risk-takers; Investor analysis; Types of CEO - birds of a feather; The CEO eagle - The M&A addict; The CEO dodo - Risk-phobic; The CEO ostrich - Risk-ignorant; The CEO owl - Risk-acceptable; The CEO magpie - Risk-seeking; Company structure and risks; Case study: The executive background check; Risk vanities; Pensions mis-selling; Case study: Boo.com; Corporate misgovernance; Accuracy of corporate losses; Classes of instruments and their risk components; Derivatives; Bonds; Equities; Investment as a project; 5 Investing under Investigation; Instinct versus ability 327 $aChecking corporate fundamentalsFormulate a business plan; Due diligence; Risk support and methodology; Investor cynicism; Case study: LTCM; 6 Risk Warning Signs; Prevailing risk attitudes; Reputational risk; Case study: Enron; Airborne early warning (AEW); International accounting standards (IAS); Credit ratings; The ratings procedure; Business lines; Law and risk management; Case study: the UK Football League; What the law covers; Completeness of contract; Case study: Merrill Lynch versus Unilever pension fund; Sarbanes-Oxley Act for audit control; Insurance; Risk retention: self-insurance 327 $aCase study: Insuring big oil projectsCase study: the Names and Lloyds, London; Sharing, transferring or mitigating risk; Search for risk management; Alternative theories; Causality and managing investment risk; Value-added chain; Risk management to pick up the pieces; Scenario analysis; Case study: Business Continuity, lessons from September 11(th); Case study: Guaranteed annuity payments; Stress testing; Bayesian probability; Artificial intelligence (AI) and expert systems; Case study: Anti-money laundering; Risk maps; 7 The Promise of Risk Management Systems; Current state of systems 327 $aRisk management methodology - RAMP 330 $aRisk has two sides: underestimating it harms the investor, while overestimating it prevents the implementation of bold business projects. This book explains, from the point of view of the practitioner, the analysis of investment risk - a proper account of adequate risk management strategies - and offers an objective and readable account of the most common investment risk management procedures. It will not be highly mathematical, although mathematical formulae and technical graphs will be used where necessary, and will not rely on excessive technical jargon.The author also covers guidel 410 0$aWiley finance series. 606 $aInvestment analysis 606 $aRisk management 615 0$aInvestment analysis. 615 0$aRisk management. 676 $a332.6 676 $a658.15/5 676 $a658.155 700 $aChong$b Yen Yee$01638515 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830231403321 996 $aInvestment risk management$93981002 997 $aUNINA