Skip to main content

Showing 1–4 of 4 results for author: Reesor, M

.
  1. arXiv:2105.11892  [pdf, other

    econ.EM stat.AP

    Measuring Financial Advice: aligning client elicited and revealed risk

    Authors: John R. J. Thompson, Longlong Feng, R. Mark Reesor, Chuck Grace, Adam Metzler

    Abstract: Financial advisors use questionnaires and discussions with clients to determine a suitable portfolio of assets that will allow clients to reach their investment objectives. Financial institutions assign risk ratings to each security they offer, and those ratings are used to guide clients and advisors to choose an investment portfolio risk that suits their stated risk tolerance. This paper compares… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

    Comments: 36 pages, 17 figures, 5 tables

    MSC Class: 91G70 (Primary) 91C05; 91-10 (Secondary)

  2. arXiv:2005.03625  [pdf, other

    econ.EM stat.AP stat.ML

    Know Your Clients' behaviours: a cluster analysis of financial transactions

    Authors: John R. J. Thompson, Longlong Feng, R. Mark Reesor, Chuck Grace

    Abstract: In Canada, financial advisors and dealers are required by provincial securities commissions and self-regulatory organizations--charged with direct regulation over investment dealers and mutual fund dealers--to respectively collect and maintain Know Your Client (KYC) information, such as their age or risk tolerance, for investor accounts. With this information, investors, under their advisor's guid… ▽ More

    Submitted 14 May, 2020; v1 submitted 7 May, 2020; originally announced May 2020.

    Comments: 38 pages, 12 figures

  3. arXiv:1107.4016  [pdf

    cs.SE stat.AP

    Metrics of Risk Associated with Defects Rediscovery

    Authors: Andriy V. Miranskyy, Matthew Davison, Mark Reesor

    Abstract: Software defects rediscovered by a large number of customers affect various stakeholders and may: 1) hint at gaps in a software manufacturer's Quality Assurance (QA) processes, 2) lead to an over-load of a software manufacturer's support and maintenance teams, and 3) consume customers' resources, leading to a loss of reputation and a decrease in sales. Quantifying risk associated with the redisc… ▽ More

    Submitted 20 July, 2011; originally announced July 2011.

  4. Using entropy measures for comparison of software traces

    Authors: A. V. Miranskyy, M. Davison, M. Reesor, S. S. Murtaza

    Abstract: The analysis of execution paths (also known as software traces) collected from a given software product can help in a number of areas including software testing, software maintenance and program comprehension. The lack of a scalable matching algorithm operating on detailed execution paths motivates the search for an alternative solution. This paper proposes the use of word entropies for the clas… ▽ More

    Submitted 25 April, 2012; v1 submitted 26 October, 2010; originally announced October 2010.

    Comments: Extended version appears in Information Sciences

    MSC Class: 94A17 ACM Class: D.2.5; G.2.3; H.1.1

    Journal ref: Information Sciences 203 (2012) pp. 59-72