Professional Documents
Culture Documents
Paolo Vanini
Miret Padovani
University of Zurich
These are rough Lecture Notes which we use in the MAS in Finance at the
University of Zurich and ETH Zurich. Feedback is welcome.
iii
CHAPTER 1
1.1. References
• P. Carr and D. Madan. Option valuation using the fast Fourier transform.
Journal of Computational Finance, 2:61-73, 1999. (available on-line)
• E. Derman. Laughter in the Dark: An Introduction to the Volatility
Smile. Lecture Notes, 2008. ()
• J. Gatheral. The Volatility Surface: A Practitioner’s Guide. John Wiley
& Sons, 2006. [Amazon]
• S. Heston. A closed-form solution for options with stochastic volatil-
ity with application to bond and currency options. Review of Financial
Studies, 6:327-343, 1993. (abstract)
• C. Kahl and P. Jäckel. Not-so-complex logarithms in the Heston model.
Wilmott Magazine, 2005. (available on-line)
• R. Lee. Option pricing by transform methods: Extensions, unification,
and error control. Journal of Computational Finance, 7, 2004. (available on-line)
• A. Lewis. Option Valuation Under Stochastic Volatility. Finance Press,
2000. [Amazon]
• R. Lord and C. Kahl. Why the rotation count algorithm works. Tinbergen
Institute Discussion Paper, 2006. (available on-line)
• R. Lord and C. Kahl. Optimal Fourier inversion in semi-analytical option
pricing. Journal of Computational Finance, 10:1-30, 2007. (available on-line)
• V. Lucic, On Singularities in the Heston Model, see ()
• R. Lord, R. Koekkoek, and D. van Dijk. A comparison of biased simula-
tion schemes for stochastic volatility models. Tinbergen Institute Discus-
sion Paper, 2008. (available at SSRN)
price formula which only need a singe simulation. The volatility process has the
following properties:
(i) 0 is an attainable boundary when η 2 > 2λV̄ and the boundary is strongly
reflecting. Hence, volatility cannot become negative.
(ii) ∞ is an unattainable boundary. Hence, volatility cannot explode.
There are two standard Brownian motions Z1 , Z2 . If they are assumed to be uncor-
related, then there is no skew. Therefore, in equity markets for example one assumes
that ρ is a typically time-dependent correlation between the two Brownian motions.
(Theta) of the option and that AHe F represents the changes or sensitivities of the
option due to the dynamics of the underlying and the volatility process. Contrary
to the Black and Scholes model the volatility risk premium or market price of risk
is not specified within the model. This reflects the market incompleteness, i.e. we
have two risk sources but only one tradeable asset S. Therefore, the method is in
this respect similar to the short rate interest rate models where the short rate is
also not tradeable.
(1.4)
1 1
Ft − rF + rSFS + V S 2 FSS + η 2 V FV V + ρηV SFSV − λ(Vt − V̄ ) − θVt FV = 0.
2 2
Equation (1.4) looks similar than the Black and Scholes pricing equation - apart
that the equation is more complicated due presence of the second stochastic pro-
cess. If one steps back to constant volatility all expressions with a V -derivative
drop and the Black and Scholes equation follows.
We next Fourier transform the PDE (1.5) by applying the following rule:
We get:
(1.10)
1 1 1
− F̂τ − k 2 V F̂ − ikV F̂ + η 2 V F̂V V − ikρηV F̂V − λ(Vt − V̄ ) − θV F̂V = 0 .
2 2 2
6 1. THE HESTON MODEL
Equation (1.10) is structural similar to the Black and Scholes equation since there
are only derivatives with respect to time and one state variable.We also need to
Fourier transform the boundary condition, i.e. to transform the Call payoff
Z ∞
1
F̂ (k, V, 0) = √ eikx F (x, V, 0) dx
2π −∞
which is the Fourier transform of the option payoff expressed in log of the asset
price. We get:
Z ∞
1
F̂ (k, V, 0) = √ eikx max(ex − K, 0) dx
2π −∞
Z ∞
1
= √ eikx (ex − K)Iex ≥K dx
2π −∞
Z ∞
1
= √ eikx (ex − K) dx
2π ln K
(ik+1)x x=∞
1 e eikx
= √ −K
2π ik + 1 ik x=ln K
1 K 1+ik
(1.11) = √ , =k > 1.
2π ik − k 2
Note that the complex function eikx with k, x real numbers defines the unit circle
in the complex plain. Therefore, if say x tends to infinity, the complex function
eikx is not converging - the value is spinning on the unit circle with an increasing
velocity. This problem shows up in the second last line of the above calculation. In
order to obtain convergence and hence existence of the call Fourier transform, we
have to assume that k is a complex number. Writing k in the representation of its
real and imaginary part, i.e. k = <k + i=k the product ikx reads
ix<k − x=k .
Therefore, if the imaginary part is positive, the exponential eikx converges. In sum-
mary, the above calculation show that the Fourier transform of the call only exists
if k is a complex number with imaginary part =k > 1. So Fourier-transforming
the payoff of a call option (and of most options) requires the use of the complex
Fourier integral or equivalently the Laplace transform, see the Section ”Mathemat-
ical Tools” for details.
The following Table summarizes the Fourier transform and the regularity do-
mains for some payoff functions:
Claim Payoff Function Transform Strip of Regularity
x + K iz+1
Call Option (e − K) − z2 −iz =(z) > 1
x + K iz+1
Put Option (K − e ) − z2 −iz =(z) < 0
K iz+1
Covered Call (ex , K)− z 2 −iz 0 < =(z) < 1
iz
Arrow-Debreu Claim δ(x − ln K) K Entire C-plane
Zero Coupon Bond 1 2πδ(z) =(z) = 0
exp(−iz ln(K))
Digital Call Option χ{[K,+∞} (x) iz =(z) ∈ (0, β)
We finally consider the solution of the PDE (1.10) with the transformed bound-
ary condition (1.11) for the call. The following mathematical fact holds for such
kind of equations:
1.3. PRICING EQUATION 7
Definition 1.2. The solution F̂ (k, V, τ ) of the PDE (1.10) with the boundary
condition
F̂ (k, V, 0) = 1
is called a Fundamental SolutionFundamental Solutions are also called Green’s
functions.
Theorem 1.3. The solution of the PDE (1.10) with the transformed option
payoff (1.11) for a call is equal to the product of the transformed option payoff
and the Fundamental Solution of the PDE.
We first discuss the content of this theorem and construct in the next section
the Fundamental Solution for the Heston model.
where
1−m (m + 1)2
α= , β=−
2 4
and using the chain rule, H satisfies the heat equation
(1.12) Hτ (x, τ ) = Hxx (x, τ )
1 1
H(x, 0) = e 2 (m−1)x (ex − K)+ =: e 2 (m−1)x h(ex ).
where the last line represents the call contract. Therefore, the Black-Scholes equa-
tion is equivalent to the heat equation with the initial condition given in (1.12)
representing the transformed contracting terms: If we know H, we know F .
The Heston model is of the same type, i.e. the pricing equation is also a para-
bolic differential equation with an initial condition.
of a Fundamental Solution in theorem 1.3 is the same than above but only applied
to the Fourier case.3
To solve (1.12) with the delta function condition, we Fourier transform G w.r.t.
to x. The heat equation reads
1
(1.13) Ĥτ0 (k, τ ) = −k 2 Ĥ 0 (k, τ ), Ĥ 0 (k, 0) = √ .
2π
The first order ordinary differential equation has the solution
2 1
(1.14) Ĥ 0 (k, τ ) = e−τ k √ .
2π
Applying the inverse Fourier transform we get
1 2 1 2
(1.15) H 0 (x, τ ) = F −1 Ĥ 0 (k, τ ) = √ F −1 e−τ k = √ e−x /(4τ )
2π 4πτ
where we used the fact that
2 1 2
F −1 e−τ k = √ e−x /(4τ ) .
2πτ
Note that the Fundamental Solution is singular at (x, 0), i.e. the function
1 2
H 0 (x, τ ) = √ e−x /(4τ )
4πτ
becomes singular if τ → 0. Intuitively, the function becomes more an more peaked
about x, i.e. the delta function initial condition follows.
If H 0 (x, τ ) solve the heat equation, then for any fixed y the function H 0 (x−y, τ )
is also a solution of the heat equation. This is the main observation to obtain a
solution to the heat equation with a general function as its boundary condition,
i.e. a call contact for example and not the delta function. Since for any fixed y a
solution of the heat equation is obtained, we claim that
Z
(1.16) H(x, τ ) = H 0 (x − y, τ )H(y, 0)dy
R
solve the original Black and Scholes problem. If we can prove this, we illustrated
theorem 1.3 using the Black and Scholes model: Equation (1.16) states that the
3We check the claim about the Fourier transform of the delta function, see the Appendix
for details about the delta function. We have for an arbitrary infinitely differentiable function φ
which decays fast at infinity:
Z
hFδ, φi(k) = φ(x)Fδ(x) dx
ZR
:= F φ(x)δ(x) dx
R
= Fφ(0)
Z
1
= √ ei0x φ(x) dx
2π R
Z
1
= √ 1φ(x) dx.
2π R
Hence,
1
Fδ(k) = √ 1.
2π
This shows that the Fourier transform maps a maximally peaked function into a maximally diluted
one.
1.3. PRICING EQUATION 9
We check that (1.16) solves the Black and Scholes pricing problem. We have:
Z
∂ ∂ 0
H(x, τ ) = H (x − y, τ )H(y, 0)dy .
∂τ R ∂τ
Z
∂2 ∂2 0
H(x, τ ) = H (x − y, τ )H(y, 0)dy .
∂x2 R ∂x
2
Hence,
(1.17) Hτ (x, τ ) − Hxx (x, τ )
Z
∂ 0 ∂2
= H (x − y, τ ) − 2 H 0 (x − y, τ ) H(y, 0)dy
R ∂τ ∂x
(1.18) = 0
where we used that H 0 is a Fundamental Solution. We verify next the boundary
condition, i.e. Z
lim H(x, τ ) = lim H 0 (x − y, τ )H(y, 0)dy .
τ →0 τ →0 R
But H 0 becomes the delta function and we get
Z
lim H(x, τ ) = δ(x − y, 0)H(y, 0)dy = H(x, 0) .
τ →0 R
This shows that the general solution is a convolution of the Fundamental Solution
and the boundary condition.
Using these facts we finally compute the pricing function in Black and Scholes
model:
2
1
H(x, τ ) = F −1 e−τ k F e 2 (m−1)x h(ex )
1 2
1
= √ F −1 e−τ k ? F −1 F e 2 (m−1)x h(ex )
2π
1 2 1
= √ e−x /(4τ ) ? e 2 (m−1)x h(ex )
4πτ
Z
1 2 1
= √ e−(x−y) /(4τ ) e 2 (m−1)y h(ey ) dy
4πτ R
Z
1 2 1
= √ e−(x−y) /(4τ ) e 2 (m−1)y h(ey ) dy
4πτ R
Z
1 2 1
= √ e−(x−y) /(4τ ) e 2 (m−1)y (ey − K)+ dy
4πτ R
Z ∞
1 2 1
= √ e−(x−y) /(4τ ) e 2 (m−1)y (ey − K) dy
4πτ ln K
(1.19) → Black-Scholes,
where we inserted a call option in the last steps.
10 1. THE HESTON MODEL
Z ia+∞
Fδ (S, V, K, τ ) = e−rτ e−ik ln S F(δ(S(T ) − K))F̂ (k, V, τ )dk,
ia−−∞
with Fδ the Fundamental Solution or the Green function, i.e the solution of a
PDE with a delta function as its boundary condition: The Green’s function is the
price of an Arrow-Debreu security. This function is closely related to the risk-
neutral transition density function of the martingale process which corresponds to
the PDE, i.e. to p(S, V, S(T ), τ ) for a stochastic process with initial value S and V
will after the elapse of time τ reach the point S(T ). Hence, p(S, V, S(T ), τ )dS(T )
is the probability that after τ the process ends up in (S(T ), S(T ) + dS(T )). Since
the stock must end somewhere,
Z ∞
p(S, V, S(T ), τ )dS(T ) = 1.
0
Indeed, if the Green function is also norm preserving as the transition density is,
then the two functions are the same. There is a simple test to check whether the
Green function is norm preserving. Basically, we have to invert the option price
formula. That is, we have to express F̂ as function of the Green’s function.//
A calculation leads to the following inversion result:
Z ∞
(1.20) F̂ (k, V, τ ) = eiky Fδ (S, V, S(T ), τ ) dS(T )
0
i.e. the martingale property of the underlying process follows. In summary, the
Fundamental solution F̂ can be norm- and martingale property preserving if the
cited two conditions hold.
Example 1.4. Consider F̂ and its solution in the Heston model, i.e. (1.22)
and (1.24). k = 0 implies that d = β. But this in turn implies r− = 0. This leads
to g =. But this finally gives D = C = 0 and hence F̂ (k, V, τ ) = e0 = 1, i.e. norm
preservation. Therefore, the Green function in the Heston model is equal to the
risk-neutral transition density function.
1.4. CONSTRUCTION OF HESTON’S FUNDAMENTAL SOLUTION 11
with G the cumulative distribution function, x real number and X the underlying
state variable, i.e. for example the variable S in the Heston model. To prove this,
one has to show that (i) G is non-decreasing and (ii) that it attains the values
0 and 1 at ±∞. The proof is an exercise. The Green function (or Fundamental
Solution) in the Heston model is identical to the risk-neutral transition density of
the underlying stock process. Furthermore, the Fundamental Solution is norm -
and martingale preserving.
1.3.3. Option Price - Inverse Fourier Transform. The last step in the
calculation of the option price is given by the inverse Fourier transform:
The option price F (x, V, τ ) is given by the inverse Fourier transform of the Fourier
transformed payoff F̂ (k, V, 0) times the Fundamental Solution F̂ (k, V, τ ), i.e.
Z ia+∞
F (x, V, τ ) = e−ikx F̂ (k, V, 0)F̂ (k, V, τ )dk , =k > 1, a− < a < a+ .
ia−∞
First we recall that the integration cannot be done explicitly in the Heston case,
i.e. we use the numerical Fast Fourier Transform to solve it. This is considered
for the Variance Gamma model in the next Chapter. Second, we still do not know
the explicit form of the Fundamental Solution in Heston’s model in Fourier space.
Third we need to discuss the second restriction a− < a < a+ . This restriction
is necessary that a Fundamental Solution exists. This is a strip in the complex
number plane and is called the strip of regularity.
or
(1.26) λü + βλu̇ − αu = 0,
which is a second-order linear ODE with constant coefficients. The solution to
(1.26) is a linear superposition of
u = eµτ .
Inserting this we get a quadratic equation in the unknown parameter µ,
(1.27) λµ2 + βλµ − α eµτ = 0, ∀τ.
| {z }
=0
1.5. Singularities
The Heston model and also most other models face the problem that some
functions might be singular for some specific values. If we recall the pricing formula
in Heston’s model
Z ia+∞
F (x, V, τ ) = e−ikx F̂ (k, V, 0)F̂ (k, V, τ )dk , =k > 1, a− < a < a+ ,
ia−∞
We have seen that the Fourier transform of a call option exists only for =k > 1.
Furthermore, the transformed payoff has two singularities: Two simple poles at 0, i,
see the denominator in (1.11).
Since the dynamics are affine in ln S and V in the Heston model, the Fundamen-
tal Solution (which is equal to the characteristic function) is of the exponentially-
affine form
F̂ (k, V, τ ) = exp {C(k, τ ) + D(k, τ )V } ,
see (1.24) for the explicit formulae. There are two solutions in the literature of
the corresponding ODE system for the functions C and D. The solutions are
algebraically equivalent but the singularity structure is different.
The first formulation of the solution F̂ = eC+DV reads:
β − d 1 − e−dτ
D(k, τ ) =
η2 1 − g e−dτ
g e−dτ − 1
(1.28) C(k, τ ) = λV̄ η −2 ((β − d)τ − 2 ln Ψ) , Ψ = ,
g−1
with
p
• g = β−d
β+d , d = β 2 − 4δγ,
• δ ≡ − 2 k(i + k), β = λ − ρηki, γ = 21 η 2 .
1
First, we recall some basic facts about the complex logarithm. The solution of
the equation ew = z, w, z ∈ C, is called the complex logarithm and is defined as
4We are not very precise at this stage, i.e. we use the word singularity for discontinuities and
true singularities.
1.5. SINGULARITIES 15
Since Ψ̃(k, τ ) crosses the negative real axis for k ∈ (0, ∞), ln Ψ̃ faces at each
crossing a singularity. Singular values of Ψ̃ lead to discontinuous option prices
and, therefore, need to be avoided. Contrary, ln Ψ does not faces any singularities.
Therefore, one should work with this formulation.
16 1. THE HESTON MODEL
In summary:
• Using the principal branch of the logarithm, formulation 2 of the Heston
model has a continuous characteristic function.
• Using formulation 1, the characteristic function is not continuous using the
principal branch of the logarithm. Using the Rotation Count Algorithm
continuity is restored.
• Since formulation 2 is numerically more stable than formulation 1, use
formulation 2.
Singularity of Denominator
The Fundamental Solution given in (1.24) shows that further singularities arise
if in the function
1 − e−dτ
D(k, τ ) = r−
1 − g e−dτ
the denominator becomes zero, i.e. for
1 − g e−dτ = 0 .
The following result of Lukacs (1970) is basic for the analysis:
Theorem 1.6. If a characteristic function (Fundamental Solution) ψ(p) is an-
alytic in the neighborhood of p = 0, then it is also analytic in a horizontal strip and
it can be represented by a Fourier integral. The strip is either the whole plane or
has one or two boundary lines. The characteristic function ψ(p) is singular at the
boundary of the strip.
Therefore, for the Heston model we consider the strip of regularity ΛHe , i.e. a
strip in the complex plain such that within the strip the Fundamental Solution is
analytic. Since the strip is possibly bounded by two imaginary numbers −ia− <
0, 1 < ia+ with a−/+ ∈ R, the boundaries are given by the solution of the equation
1 − g(−ia) e−d(−ia)τ = 0 .
Then, a− is the largest solution close to 0 in the interval (−∞, y− ) and a+ is
smallest solution in the interval (y+ , ∞) with
p
η − 2ρ(λ − Θ) ± η 2 − 4ρη(λ − Θ) + 4(λ − Θ)2
y± = .
2η(1 − ρ2 )
Are there other singularities except those on the imaginary axis and are there
singularities outside of the strip of convergence? Lucic (07) proves:
Theorem 1.7. All singularities of (1.24) are pure imaginary.
Example 1.8. The characteristic exponent φ(k) , ψt (k) = etφ(k) of the variance
gamma model is given by
MG
φ (u) = C log .
(M − ik) (G + ik)
1.5. SINGULARITIES 17
For ξ 2 = τ = 1, we get
s ( (
1 1 π2 3.68 a+ (n = 0)
a± (n = 0) = ± + 2 2 = = .
2 4 ξ τ −2.68 a− (n = 0)
AX = (−2.68, 3.68) .
These bounds depends on the model parameters. Therefore, the strip where ψ̂ is
regular intersects the set =k > 1 where the call Fourier transform exist. Hence,
there exists a strip in the complex domain where both the characteristic function
is analytic and the Fourier transform of the call exists. Note that for ξ 2 → 0 or
τ → 0, i.e. either volatility is constant or time to maturity is zero, a± tends to ±∞.
In this case, the function F̂ is regular on all of C. Contrary, if ξ 2 → ∞, a± → 0, 1.
Hence, if volatility explodes, the strip which guarantees regularity of the function
F̂ and the domain where the Fourier transform payoff exist become disjoint.
We answer these question by considering a larger and more general setup than
the Heston model itself. The Heston model will be used as an example to illustrate
the general approach. The presentation very closely follows the work of Lee (04).
Lee’s approach assumes that the characteristic function of the underlying vari-
able is known. We work with an unspecified state variable or equivalently process.
It can be a diffusion, a jump-diffusion or a Lévy process. Furthermore, interest
rates can be stochastic too. We will specify the state variable in a few examples
below.
Contrary to the former approach in the last sections, the transform is now taken
with respect to the strike k, and not the underlying variable S. The underlying
abstract state variable is X is a P-martingale. This variable could have a SDE spec-
ification (S in Heston model, Bakshi-Madan, Duffie-Pan-Singleton, Lewis, Zhu) or
could follow a Lévy process (such as in Carr-Wu, Barndorff-Nielsen and Sheppard,
Eberlein-Prause, Madan-Chang-Carr, Carr-Madan-Geman-Yor).
1.6. SYNTHESIS OF OPTION PRICING 19
äG GX
6ä
LX
4ä
2ä
AX
-20 -10 10 20
-2 ä
-4 ä
-ä M
Figure 1.2. The sets ΛX , ΓX and AX for M = 4, G = 6
strike and not the state variable X. The major advantage of this approach is that
one can use numerical methods to price options with multiple strikes in this new
approach, whereas this is not possible in the X-variable transformation approach.
We know that V (k) ∈ / L1 and therefore the ordinary Fourier transform is not
defined. Therefore, we considered the complex Fourier transform. Another possi-
bility is to enforce convergence defining
Va (k) = eak V (k), a>0,
as Carr-Madan (99) proposed. The damping factor - i.e. the exponential function
- will then ensure that option prices and their Fourier transforms exist if a > 0.
But the value of a can not be chosen arbitrary, i.e. the value of a is related to the
set AX . Hence, it might be that a < 0 is a necessary choice. But then, the Fourier
transformed damped option prices do not exist. In this case we have to consider
the complex Fourier transform and the shift of integration contour technique to get
option prices for arbitrary values of a. We consider the details of these ideas next.
1.6.2.1. a > 0. For a > 0, we denote by
Z ∞
1
V̂a (k̂) = √ eik̂k Va (k) dk
2π −∞
the real Fourier transform, i.e. k, k̂ are real numbers.
Theorem 1.13. Assume that 0 ∈ AX . Then there exists a > 0 with a ∈ AX and
for any such a the Fourier transform of the damped option price exists, V̂a (k) ∈ L1
and V̂a (k) is given by:
1 ψ(k̂ − ia)
(1.34) V̂a (k) = √
2π (ik̂ + a)2
Proof. We claim that for all p > 0 and all x ∈ R
epx
(1.35) x − k ≤ pk+1
pe
holds. To prove this, we fix x0 = k + 1/p and define the functions
epx
m(x) = x − k , n(x) = pk+1 .
pe
If follows that
m(x0 ) = n(x0 ) , mx (x0 ) = nx (x0 )
and while m is zero for all derivatives greater than 1, the second derivative of n is
positive. This proves the claim. Next, we substitute x → X and take expectation
in (1.35). Finally, multiplying by e−rT implies the bound
EP [epX ]
(1.36) V (k) ≤
pepk+1
and
EP [epX ]eak
(1.37) Va (k) = V (k)eak ≤ .
pepk+1
Hence, if we assume a > 0, a necessary condition p > a > 0 follows. Under this
condition, Va (k) is exponentially decaying.
We prove the explicit formula for the Fourier transformed option price.
1.6. SYNTHESIS OF OPTION PRICING 21
Z ∞
1
(1.38) V̂a (k̂) = √ eik̂k Va (k) dk
2π −∞
Z ∞
1
= √ eik̂k eak EP [f (X, k)] dk
2π −∞
Z ∞
1
= √ EP eik̂k eak f (X, k) dk
2π −∞
Z ∞
1
= √ EP eik̂k eak (X − k)+ dk
2π −∞
1
= √ EP
2π
Z X (ik̂+a)k !
(ik̂+a)k X (ik̂+a)k X e
× e X|−∞ − e k|−∞ + dk .
−∞ (ik̂ + a)
If a > 0, the Fourier transform exists in the last line. Continuing, we get:
Z X (ik̂+a)k !
1 e
V̂a (k̂) = √ EP dk
2π −∞ (ik̂ + a)
1 EP [ e(ik̂+a)X ]
= √
2π (ik̂ + a)2
1 ψ(k̂ − ia)
(1.39) = √
2π (ik̂ + a)2
1 EP [ e(ik̂+a)X ]
|V̂a (k̂)| = |√ |
2π (ik̂ + a)2
|EP [ e(ik̂+a)X ]|
≤
|(ik̂ + a)2 |
|ψ(−ia)|
≤ .
|(k̂ + a)2 |
Given the damped Fourier prices V̂a (k̂) in last Theorem, which are in L1 , we
can recover for a > 0 the undamped option prices by simply reverting the Fourier
transform and undamping with the function e−ak . This gives at once the undamped
option price formula for a > 0:
Z ∞ Z ∞
(1.40) V (k) = e−ak e−ik̂k V̂a (k̂)dk̂ = 2e−ak < e−ik̂k V̂a (k̂) dk̂ .
−∞ 0
22 1. THE HESTON MODEL
1.6.3. General a case. For a < 0, the theory of last section breaks down. To
obtain a theory for general values of a, we define the set
Γ = {z ∈ C | − =(z) ∈ AX }
and ĝ : Γ → C
−ψ(z)
ĝ(z) = .
z2
The set ΓX is illustrated in the Figure 1.2 for the Variance Gamma model. We see,
that this set is a shift of the regularity strip ΛX parallel to the real axis. Hence, this
new set contains singularities, i.e. iG = i5 in the example. Defining this set, we can
if necessary shift the integration of the necessary complex Fourier transform below
to an axis parallel to the real axis where convergence of the Fourier prices follows.
If it is necessary to cross a singularity to obtain convergence we have to use the
residue theorem, i.e. the option price formula picks up factors if such singularities
are crossed.
If a > 0 and a ∈ AX then the formula (1.34) in Theorem 1.13 implies that
V̂a (k̂) = ĝ(k̂ − ia).
But V̂a (k̂) exists is in L1 and the option price can be expressed as in (1.40). There-
fore, in the region where z ∈ Γ and −=(z) > 0, ĝ(z) is represented by the complex
Fourier transform of the undamped option price, i.e.
Z ∞
1
(1.41) ĝ(z) = √ eizk V (k)dk .
2π −∞
Applying Theorem 1.13, we can invert the last formula along a contour −=(z) =
a > 0 i.e.
Z ∞−ia Z ∞−ia
V (k) = e−izk ĝ(z)dz = 2 < e−izk ĝ(z) dz
−∞−ia 0−ia
for a > 0, a ∈ AX . In summary, we rewrote the results for a > 0 by using the new
domain Γ and the function ĝ.
We consider now a < 0. Then the Fourier transform V̂a (k̂) does not exist or
equivalently, the integral (1.41) does not exist for −=(z) < 0: The complex Fourier
transform is not well-defined in this region. But the definition of ĝ(z) do make sense
and the integrals in (1.42) do exist for a < 0. But their value does not give us the
option values we are looking for, since the integrations paths has shifted across the
pole at z = 0. Hence, the option value is the integral (1.42) less the contribution
picked up at the pole z = 0. This contribution is easily calculated using the Residue
theorem which gives us a new option formula. Finally, for a = 0, the integral (1.42)
passes through a pole - the contribution of the residue is cut in half.
The following theorem summarizes these facts.
Theorem 1.14. Let a ∈ R {0} be any real number, such that a ∈ AX . Then
the price V (k) of a European call option is given as
Z ∞−iα
(1.42) C (k) = Rα + 2 < ĝ (z) e−ikz dz,
0−iα
1.6. SYNTHESIS OF OPTION PRICING 23
where
0, if α > 0,
Rα = 21 (−ψ 0 (0) − kψ(0)), if α = 0,
−iψ 0 (0) − kψ(0), if α < 0,
Proof. We prove a < 0. Fist, ĝ is analytic in a strip around z = 0. Choosing
a rectangular contour γ which encloses 0. The vertical integrals of the rectangle
vanish if the horizontal sides of the rectangle tend to ±∞ since the integrand decays
exponentially in the real axis direction. Therefore, we only have to calculate the
residuum at z = 0. By the general formula
d
res(z = 0) = −ψ(z)e−ikz |z=0 .
dz
Doing the derivative the a < 0 results follows. The a > 0 case is yet proved and for
the a = 0 case, we only note that if a contour crosses a pole, half of the residuum is
attributed to the interior of the contour and the other half to the exterior part.
As an example, we consider the Variance-Gamma model proposed by Madan-
Carr-Chang. The state vector X = log S has a Fourier transform
exp (−rT + iz(log S0 + µT )
ψX (z) = T /ν
1 − iνΘz + 21 νσ 2 z 2
with µ a function of r, ν, Θ and σ. The regularity bounds in AX = (a− , a+ ) are
given by the roots of the denominator, i.e.
r
Θ 2 Θ2
a± = − 2 ± 2
+ 4 .
σ νσ σ
If volatility explodes, the domain AX shrinks to zero and also the analyticity do-
main of the Fundamental Solution vanishes. The function ψX decays as ∼ 2T1/ν if
z0
we set z = z0 + iz1 . Therefore, a power decay follows if 2T /ν > 0 holds.
The answer is: as α & 0, the function Vα (k) converges (pointwise) to the
function V (k) which is non-integrable. On the other hand, the Fourier transform
V̂α (k) converges (pointwise) to the well-defined function ĝ (k). We thus see a case,
where taking limits and integration are not interchangeable:
Z ∞
ĝ (z) = lim eizk eαk V (k) dk
a&0 0
Z ∞
6= eizk lim eαk V (k) dk = undefined.
0 a&0
Since Z
V (k) = e−αk e−ikk̂ V̂a (k̂)dk̂
for all α > 0, it follows that
Z ∞
V (k) = lim e−ikk̂ V̂a k̂ dk̂,
a&0 0
24 1. THE HESTON MODEL
Z ∞
e−ikk̂ lim V̂a k̂ dk̂ = V (k) − Residuum Corrections,
0 a&0
Again, taking limits and integration are not interchangeable. Using the Fourier
symbol we can state the result more neatly as follows:
and
Which analyticity strip should one best choose when calculating option prices?
Since done correctly, the pricing is independent of the strip, other criteria matter
for this question. Because in most models, the Fourier inversion cannot be carried
out explicitly, one has to rely on numerical methods and hence, their error analy-
sis. This analysis determines the best strip for calculating the option prices. We
consider this issue for the Variance Gamma model in detail.
We conclude this section by deriving different option pricing formula for a call
option in Heston’s model.
Example 1.15. The price of a call option C(S, T ) can be written as:
Z ia+∞
K e−rT 1
(1.43) C(S, T ) = − √ e−ikX ψ(−k) dk, a ∈ (1, b),
2π ia−∞ k 2 − ik
K e−rT −ikX 1
res(0) = k − e ψ(−k) 2
2π k − ik k=0
Ke−rT 1
= − e−i0X ψ(−0)
2π 0−i
−rT
Ke 1
= .
2π i
1.6. SYNTHESIS OF OPTION PRICING 25
At k = i we have:
K e−rT −ikX 1
res(i) = (k − i) − e ψ(−k) 2
2π k − ik k=i
K e−rT 1
= − e−iik ψ(−i)
2π i
−rT
Ke 1
= e(log(S/K)+(r−q)T ) ψ(−i)
2π i
−rT
Ke 1
= S/Ke(r−q)T ψ(−i)
2π i
−rT
Se 1
= .
2π i
Therefore, if we shift α → α̃ ∈ (0, 1), we pick up the i-pole. From the residue
theorem, this means that 2πi times the residue is added to the option price, i.e.
Z
K e−rT iã+∞ −ikX 1
(1.44) C(S, T ) = S e−rT − e ψ(−k) 2 dk, ã ∈ (0, 1).
2π iã−∞ k − ik
We then shift a → ã ∈ (−c, 0), thus picking up the i- and 0-poles. Since a < 0
must hold for the Fourier transform of a put’s payoff to exist, we obtain the put-call
parity,
C = P + S e−rT − K e−rT .
CHAPTER 2
Mathematical tools
is the inverse Fourier transformation operator whenever the integrals exist. (p, x)
denotes the Euclidian scalar product in Rn .
Given this formal definition, we have (i) to analyze the function space for f
and (ii) to derive properties of the Fourier transform in the chosen function space.
Lemma 2.2. If f ∈ L1 (Rn ) then fˆ and f˜ exist and are uniformly continuous.
Furthermore the bound
Proof. Let BR the ball in Rn with radius R and χBR (x) its characteristic func-
tion. We set fR (x) := f (x)χBR (x). We have |fR (x)| ≤ |f (x)| and fR (x) converges
R
Rto f (x) pointwise. By the dominated convergence theorem we get limR→∞ fR (x)dx =
f (x)dx and for every > 0 there exists an R such that
Z
|f (x)|(1 − χBR (x))dx < .
4
27
28 2. MATHEMATICAL TOOLS
We bound
Z
1
|fˆ(p) − fˆ(q)| = 1 | (ei(p,x) − e−i(q,x) )f (x)dx|
(2π) 2 n Rn
Z
1
≤ 1 |ei(p,x) − ei(q,x) | |f (x)|dx
(2π) 2 n Rn
Z
1 (x, p − q)
= 1 2| sin( )||f (x)|dx
(2π) 2 n
BR 2
Z
+ |ei(p,x) − ei(q,x) | |f (x)|dx
Rn \BR
Z Z
1
≤ 1 2|p − q| |x| |f (x)|dx + 2|f (x)|dx
(2π) 2 n BR Rn \BR
1 1
≤ 1 |p − q| R ||f (x)||1 + ≤√
(2π) 2 n 2 2π
if |p−q| ≤ 2R||f ˆ ˜
||1 . This proves uniform convergence of f . For f the same argument
applies. The bound (2.1) is trivial.
Lemma 2.2 shows that for f ∈ L1 (Rn ) the Fourier transform is in L∞ (Rn ) and
that it is uniformly continuous. Unfortunately the operators F and F −1 do not
map L1 into itself and therefore
f = F −1 Ff
does not hold generally in L1 .
Proof. Consider an even function fe (x)2 and an odd function fo (x)3, for which
Z a Z a Z a
fe (x) dx = 2 fe (x) dx and fo (x) dx = 0, a ∈ R,
−a 0 −a
For f (x) = fe (x) the imaginary part B is zero, so fˆ(k) is real and even; for f (x) =
fo (x) the real part A is zero, so fˆ(k) is complex and odd.
We then have
Z ∞ Z ∞
1
ĥ(k) = √ eikx f (x − y )g(y) dy dx
2π −∞ −∞ | {z }
z
Z ∞ Z ∞
1
= √ eik(z+y) f (z)g(y) dy dz
2π −∞ −∞
Z ∞ Z ∞
1
= √ eikz f (z) dz eiky g(y) dy
2π −∞ −∞
√
= 2π fˆ(k)ĝ(k),
by Fubini’s theorem.
The Fourier transform maps decay properties into regularity properties of func-
tions and vice versa. The following theorem makes the ideas precise. We define
C n (X) the space of functions which are n times differentiable with continuous
derivatives. We set f (k) for the k-th derivative.
Theorem 2.10. Let f ∈ C n (R) and f (k) ∈ L1 (R) for k = 0, 1, . . . , n. Then for
all k, we have
d
(2.5) F (i )k f (p) = pk fˆ(p)
dx
and lim|p|→∞ |pn fˆ(p)| = 0. Conversely, let f be continuous and xn f ∈ L1 (R).
Then, the Fourier transform fˆ is n times continuously differentiable and for all
k = 0, 1, . . . , n:
d
(2.6) (i )k fˆ(p) = F xk fˆ (p)
dp
2.1. THE FOURIER TRANSFORM 31
Uniform convergence at the upper limit of integration requires that eτ− x−τ x decays
exponentially with x so that τ− < τ and vice versa at the integration limit −∞.
For the behavior of fˆ(p) in the strip τ− < τ < τ+ we consider the convergence of
the integral defining fˆ. Since f is analytic, we may deform according to Cauchy’s
32 2. MATHEMATICAL TOOLS
Theorem - see the Appendix on Complex Analysis - the path of integration parallel
to the x axis as a long as we remain within the strip of analyticity, i.e. as long as
y− < y < y+ . We get
Z ∞ Z ∞
fˆ(p) = (2π)− 2
1 1
f (x)eipx dx = (2π)− 2 e−σy f (x)e−τ x ei(σx−τ y) dx .
−∞ −∞
It can arise in applications that the function f which has to be transformed does
not belongs to a space where the transformation is defined. For example, the payoff
of a call option is not in L1 and we therefore had to extend the Fourier transform to
the complex numbers. Another possibility, which also leads to complex integrals,
is the insertion of a convergence enforcing factor. This approach was chosen in the
papers of Carr and Madan, see the Section ”Synthesis of Option Pricing” for details.
Setting p + iτ0 = ξ it follows that p = ξ − iτ0 and the integration over the real axis
becomes an integration over a complex line parallel to the real axis crossing the
imaginary axis at iτ0 , i.e. we get
Z ∞+iτ0
1
f (x) = √ ĝ(ξ − iτ0 )e−iξx dξ .
2π −∞+iτ0
Since also
Z ∞
1
ĝ(ξ − iτ0 ) = fˆ(ξ) , ĝ(p) = √ f (x)e−τ0 x+ipx dx
2π −∞
enforcing factor can not enforce convergence on the whole x domain. If this happens,
we proceed as follows. We define
(
f (x)e−τ0 x for x > 0 ,
f+ (x) = τ0 > 0
0 for x < 0.
0
for x
(> 0
(2.10) f− (x) = −τ x x<0 ,
f (x)e 1 for
τ1 < 0
where τ0 (τ1 ) is the minimum (maximum) possible value such that f+ (f− ) converge.
The corresponding Fourier transforms then read
Z ∞ Z ∞
1 1
fˆ+ (p) = √ f (x)eipx dx = √ f (x)eiσx−τ x dx , τ > τ0
2π 0 2π 0
Z 0 Z 0
1 1
(2.11) fˆ− (p) = √ f (x)eipx dx = √ f (x)eiσx−τ x dx , τ < τ1
2π −∞ 2π −∞
with p = σ + iτ . Applying the Fourier inversion formula and adding both resulting
expressions we obtain finally,
Z ∞+iτ0 Z ∞+iτ1
1 ˆ −ipx 1
(2.12) f (x) = √ f+ (p)e dp + √ f− (p)e−ipx dp .
2π −∞+iτ0 2π −∞+iτ1
With the same discussion as above, the analyticity of fˆ+ , fˆ− follows: For example
fˆ+ is analytic in a region in the upper half complex plane of p = σ + iτ , where the
region starts at iτ0 . fˆ− is analytic in the lower half plan τ < τ1 .
Example 2.12. Consider the function f (x) = e|x| . Clearly, this function is not
integrable. Then
( (
e|x| e−τ0 x for x > 0 ,
ex−τ0 x for x > 0 ,
f+ (x) = τ0 > 0 = τ0 > 0
0 for x < 0. 0 for x < 0.
Therefore τ0 = 1+, > 0 small, defines τ0 . Similar, τ− = −1− follows. Therefore,
fˆ+ (fˆ− ) should be analytic in the region τ > 1 + (τ < −1 − ). To see this we
calculate Z ∞
1 1 1
fˆ+ (p) = √ ex eipx dx = − √ , τ >1
2π 0 2π 1 + ip
and similar for fˆ− (p). Therefore, f+ has a singularity at p = i and is analytic
above this singularity. When we consider option pricing under time changed Lévy
processes, the Laplace transform become important.
Definition 2.13. Let f be a real value piece wise continuous function. The
Laplace transform Lf is defined by
Z ∞
(2.13) Lf (p) = f (x)e−px dx .
0
34 2. MATHEMATICAL TOOLS
We show that the Laplace transform is a special case of the Fourier transform.
Consider the Fourier transform of
(
f (x) for x > 0,
(2.14) f+ (x) = .
0 otherwise
This transform is
Z ∞
1
(2.15) fˆ+ (p) = √ f (x)eipx dx .
2π 0
Therefore
√
(2.16) 2π fˆ+ (ip) = Lf (p) .
Hence all properties of fˆ+ can be used to obtain the properties of the Laplace
transform, since the Laplace transform can be seen as a complex Fourier transform.
The inversion formula for fˆ+ for example implies for the inversion of the Laplace
transform:
Z i∞+τ0
1
(2.17) L−1 f (x) = f+ (x) = Lf (p)epx dp , <x > 0 .
2π −i∞+τ0
Example 2.14. Consider the function f (x) = eiqx . The Laplace transform
then reads
1
Lf (p) = .
p − iq
The inversion transform is
Z i∞+τ0
−1 1 epx
L f (x) = f+ (x) = dp , <x > 0 .
2π −i∞+τ0 p − iq
For the other semi circle the residuum is equal to eiqx and applying the residue
theorem we get
Consider an almost closed circle in the z-plane with arbitrary radius r. Then
starting at (−r, π+), the value f (−r, π+) is considered in the image plane. Moving
in the indicated direction along the almost closed circle, the almost semicircle in
the f (z)-plane follows. Having arrived at (−r, π + 2π − ) we next move on and
cross the negative horizontal axis, i.e. we consider the point (−r, π + 2π + ). But
the value of this point under f is not equal to the point under (−r, π + ) but
mirrored at the imaginary axis. Continuing, the second almost semicircle follows.
Having arrived at (−r, π + 4π − ) and crossing the real axis again, i.e. considering
(−r, π + 4π + ), the value of this point equals the value of (−r, π +√).
Therefore, each time we cross the real axis, the function f (z) = z is discontin-
uous and changes to one of the two possible almost semicircles. So the negative real
axis has to be excluded if we want f to be a continuous and analytic function. This
implies that −π < φ < π is a possible range for f to be single-valued and the other
one is π < φ < 3φ.√ The two independent values of f on these two sets are called
the functions of z. The line along which discontinuities occur, φ = π is called a
branch line. Since the values of (−r, π + ) and (−r, π + ) for arbitrary small are
not the same under the square root function, a singularity must be enclosed. Also,
since the radius of the semicircles was arbitrary, the singularity must be at z = 0.
Such a singularity is called a branch point.
This intuition generalizes to
z n = w = R(cos ψ + i sin ψ)
2.2. COMPLEX ANALYSIS 37
√
Figure 2.2. Illustration of f (z) = z
with n ∈ N. We set
z = r(cos φ + i sin φ).
From
rn (cos nφ + i sin nφ) = R(cos ψ + i sin ψ)
we obtain the two equations
z n = R, nφ = ψ (mod2π).
The first equation has the unique solution z = R1/n . The second equation has n
solutions
ψ 2πm
φ= + (mod2π), m = 0, . . . , n − 1.
n n
Therefore the n solutions of the original equation are
ψ 2πm ψ 2πm
z = R1/n cos( + ) + i sin + m = 0, . . . , n − 1.
n n n n
Hence, if ψ passes through an interval (a, a + 2π) and if m is fixed number in
0, . . . , n − 1, then the corresponding solution of z n = w is called the m-th branch
of the n-th root of all complex numbers w with
w = R1/n (cos ψ + i sin ψ) , R > 0, a < ψ < a + 2π.
See figure 2.3.
38 2. MATHEMATICAL TOOLS
√
To summarize, there is in fact no way to choose a so that z is continuous for
all complex values of z. There has to be a ’branch cut’ line in the complex plane
across which the function is discontinuous.
Example 2.15. Consider z = r eφ , where t ∈ [−π, π), i.e. we cut the complex
plane along the negative axis and take the power
z a = ra eaφ .
Since
eiaπ 6= e−iaπ , a ∈
/ Z;
eiπ = e−iπ ⇒
eiaπ = e−iaπ , else.
So when we cross the negative real axis, a jump follows.
The next equation is
ez = w = R(cos ψ + i sin ψ).
If z, w were real numbers, there would be a unique solution: the real logarithm.
But for z, w complex numbers, uniqueness is basically lost since
e2πin = 1.
Using ez = ex+iy = ex eiy , one obtains the two equations
ex = R , y = ψ(mod2π).
2.2. COMPLEX ANALYSIS 39
The unique solution of the first equation is x = ln R. The second equation possess
an infinite number of solutions
y = ψ + 2πm, m ∈ Z.
So the infinite solutions are
z = ln R + i(ψ + 2π m), m ∈ Z.
Hence, if ψ passes through an interval (a, a + 2π) and if m is fixed integer, then
z = log w = ln R + i(ψ + 2π m)
is the m-th branch of the logarithm of all complex numbers w with
w = R(cos ψ) + i sin(ψ)), R > 0, a < ψ < a + 2π.
The principal branch occurs at m = 0. This means that the exponential func-
tion w = ez has an inverse function on the domain
{z ∈ C : −π < =z < π}.
On this set, the exponential function is injective and the image is
{w ∈ C : =w 6= 0, <w > 0}.
The inverse function, the principal value of the logarithm, is given by
ln z = ln |z| + i arg(z), −π < arg(z) < π.
40 2. MATHEMATICAL TOOLS
Using that f is holomorphic in Ē, Green’s formula, and the Cauchy-Riemann dif-
ferential equations (2.18), we get
I Z Z
(u dx − v dy) = − (vx (x, y) + uy (x, y)) dx dy = 0
γ E
I Z Z
(v dx + u dy) = (ux (x, y) − vy (x, y)) dx dy = 0.
γ E
R
Corollary 2.19. One may deform a contour γ in the γ f (z dz without chang-
ing the value of the integral provided the contour variation does not cross any sin-
gularities of the function f .
Proof. We leave the proof as an exercise for the reader.
In Cauchy’s theorem ??Hthe simple connectivity of the domain is essential. If
this assumption is not met, γ f (z) dz is in general different from 0. To apply the
theorem in these cases, one proceeds as shown in figure 2.5. In panel B,R the contour
is in a simply-connected domain and Cauchy’s theorem applies, i.e. γ1 f (z) dz +
R
γ2
f (z) dz = 0 since the two integral over the straight lines are the same in absolute
value but they have opposite direction, thus canceling each other out.
The other two main theorem considers the case where f is holomorphic except
at the point ξ1 ∈ C, which is called a singularity. See figure 2.6, which considers
the disk with radius and center ξ and a closed curve γ = P SP QRQP .
We get from Cauchy’s theorem
I I
f (z) dz = f (z) dz
γ ∂B(ξ,−)
H
since 0 = γ f (z) dz (there are no enclosed singularities) and since the two integrals
P Q and QP are the opposite of each other and hence add to zero. Note that
42 2. MATHEMATICAL TOOLS
if all have the same orientation as γ and all disks are disjoint. Therefore, to
calculate an integral enclosing singularities, (i) choose a disk around each singularity
such that the disks are disjoint and (ii) integrate around the circles circumference.
Next assume that f has only one singularity at ξ1 = 0. Then
f (z)
w=
z−ξ
can have singularities at most at z = ξ and z = 0. Consider two non intersecting
disks B(ξ, ) ∩ B(ξ1 , 1 ) = ∅ with γ, , 1 being counter clockwise oriented. Then
(2.19) implies
I I I
f (z) f (z) f (z)
(z) dz = dz + dz.
γ z−ξ ∂B(ξ,) z − ξ ∂B(ξ1 ,1 ) z − ξ
This implies
I I 2π I 2π
f (z) f (ξ + eit )
dz = i eit dt = i f (ξ + eit ) dt.
∂B(ξ,) z−ξ 0 ξ + eit − ξ 0
so that
I I !
1 f (z) f (z)
(2.21) f (ξ) = (z) dz − dz .
2πi γ z−ξ ∂B(ξ1 ,1 ) z−ξ
This result allows us to consider two cases. First, assume that f has no singu-
larity in z = ξ1 = 0. Then (2.21) proves the second theorem of Cauchy:
Theorem 2.20 (Integral formula of Cauchy, 1831). Let E ⊂ C be simply con-
nected with a closed and positive oriented contour γ and f a holomorphic function
defined on Ē. Then, for all ξ ∈ E
I
1 f (z)
(2.22) f (ξ) = dz.
2π γ z − ξ
44 2. MATHEMATICAL TOOLS
We state and derive some useful facts from these theorems. First, one often uses
the notion of analytic functions, i.e. functions which can be represented in each
2.2. COMPLEX ANALYSIS 45
= a−1 2πi,
since all integrals with n > 1 vanish. Only the coefficient a−1 gives a non-zero
contribution to the integral. This coefficient is called the residue res(f, ξ1 ) of the
function f at the pole ξ1 . We have just proved the residue theorem.
Theorem 2.22 (Residue theorem of Cauchy, 1825). Let f be defined on the
simply connected domain Ē with a positive contour γ and with poles ξ1 , . . . , ξN as
the only singularities. Then
I N
X
(2.26) f (z) dz = 2πi res(f, ξn ).
γ n=1
where γR is a semicircle with origin (0, 0) and radius R, such that all possible poles
of Q are surrounded by the semicircle. Hence,
(1) we write the integral over the reals as a complex integral, where
(2) we introduce a closed contour in the complex plain.
(3) We then apply the residue theorem to the closed contour and
(4) make sure that the part of the contour which is not on the real axis, i.e.
the semicircle in this example, has zero contribution to the integral.
(5) This provides us then with the value of the real integral which we are
interested in.
If we can prove that the semicircle integral has zero contribution to the integral
if R → ∞, then the integral calculation is reduced to a calculation of residues.
The proof that the semicircle integral has zero contribution follows from Jordan’s
lemma.
Lemma 2.23 (Lemma of Jordan). Let f be an analytic function except at a
singularity at zero and assume that the condition
lim f (R eiφ ) = 0
R→∞
holds uniformly for all 0 ≤ φ ≤ π. Then
I
lim eiz f (z) dz = 0
R→∞ γR
semi circle integral contribution around the poles has zero contribution. There are
two poles: ±|a|i. For the one in the upper half plane, the residue is
e−k|a|
a−1 = .
2i|a|
Hence,
Z ∞ √ −k|a|
1 1 1 πe
F( )(k) = √ eikx dx = √ .
x2 + a2 2π −∞ x2 + a2 2|a|
A similar calculation can be carried out for p < 0. This then gives us the result for
k ∈ R.
2.2. COMPLEX ANALYSIS 47
where
z 2 − 2z
f (z) =
(z + 1)2 (z 2 + 4)
and γ is a circle with radius 10 and center (0, 0). The poles are z = −1 of order 2,
z = ±2i of order 1. Hence, the circle encloses all poles. Calculating the reside we
get
res(f, −1) = −14/25, res(f, 2i) = (7 + i)/25, res(f, −2i) = (7 − i)/25.
The residue theorem then implies
I X
f (z) dz = 2πi res(f, k) = 0.
γ k
R∞ xα
Figure 2.7. Contour for the integral 0 x+1 dx, 0<α<1
Splitting the contour integral in four integrals, on the other hand, implies
Z Z 2π Z 0
(Reiφ )α−1 iφ (r eiφ )α−1
f (z) dz = iRe dφ + ir eiφ dφ
γ 0 R eiφ + 1 iφ
2π r e + 1
Z R α−1 Z r
x (x e2πi )α−1
+ dx + 2πi + 1
dx = 2πi eiπ(α−1) .
r x+1 R xe
For r → 0, R → ∞, the two circle integrals vanish and we get
Z ∞ α−1 Z 0
x (x e2πi )α−1
dx + dx
0 x+1 ∞ x+1
= eiπ(α−1) .
This implies
Z ∞
xα−1 2πi eiπ(α−1) π
dx = iπ(α−1)
= .
0 x + 1 1 − e sin απ
Unlike the case when the two integrals in the opposite direction cancel out, this is
not the case here where the two integrals follow from the multi-valuedness of the
integrand.
states that a point mass is the mass concentrated at a single point. The same anal-
ogy applies to Arrow-Debreu securities. Find economic examples for the function
φ.
Besides the delta function, other prominent generalized functions are functions
with jumps or kinks, such as the maximum (as for a call option payoff) or the
heaviside function.
Why are these generalized functions meaningful? Since φ are assumed to be
nice functions, then Dirac’s delta, the max-function, the step function turn out to
be differentiable in a generalized sense. For short, we can take the derivative of a
kink! How is this possible?
where the boundary term vanishes since φ is a rapidly decreasing function. The
derivative formula generalizes to arbitrary higher order derivatives.
2.3.2. Examples.
We want to calculate
d d
f (x) = max(x − k, 0),
dx dx
which does not exist as a classical derivative at the kink x = k. We may interpret
f as a generalized function and calculate
Z
d
Q= φ(x) f (x) dx.
R dx
2.3. GENERALIZED FUNCTIONS 51
By definition,
Z
d
Q = φ(x) f (x) dx
R dx
Z
d
:= − φ(x)f (x) dx
dx
ZR
d
= − φ(x) max(x − k, 0) dx
R dx
Z ∞
d
= − φ(x)(x − k) dx
k dx
Z ∞
d
= −φ(x)(x − k)|±∞ + φ(x) (x − k) dx
k dx
Z ∞
d
= 0+ φ(x) (x − k) dx
dx
Z ∞ k
= φ(x)1 dx
k
Z
= φ(x)H(k) dx,
R
i.e.
H 0 (k) = δ(x − k).
You may also draw a figure to visualize this result.
52 2. MATHEMATICAL TOOLS
Example 2.31. Let us calculate the Fourier transform of f (x) = eiwx . Note
that f is not integrable, i.e. it is not in L1 , L2 . The proof is left as an exercise.
Z
iwx
hF e , φi(p) = φ(x)F eiwx dx
R
Z
:= Fφ(x) eiwx dx
R
Z
= F φ(x) eiwx dx
R
Z Z
1
= √ eiwx eipx φ(p) dp dx
2π R R
Z Z
1
= √ eiwx+ipx φ(p) dp dx
2π R R
Z Z
1
= √ φ(p) eiwx+ipx dx φp)
2π R R
Z
1
= √ δ(w + k)φ(x) dx,
2π R
i.e. the Fourier transform is the Dirac delta function. The expression
Z
eiwx+ipx × 1 × dx
R
is the Fourier transform of 1 for the shifted value w + p; but the Fourier transform
of delta is 1 and, similarly, it follows that the Fourier transform of 1 is delta - hence
the claim follows.
Lemma 2.32.
1
Fδ = √ 1
2π
√
F1 = 2πδ
ipx 1
Fe = √ δ(p + ·).
2π
The last property of generalized functions we want to discuss is the convolution
property, defined by Z
f ? φ(x) = f (y)φ(x − y) dy.
R
This definition is extended to the case where f is a generalized function and φ ∈ X.
In particular, the Fourier transform property
√
F(f ? φ) = 2πFf Fφ.
This is a basic property used when solving PDEs.
We finally apply the method to generalize Itô’s Formula. For S(t) a diffusion,
i.e.
dS(t) = S(t)µ(t)dt + σ(t)S(t)dW (t) , S(0) = s ,
and f a twice differentiable function Itô’s Formula reads:
1 2
df (S, t) = ∂t f (S, t)dt + ∂S f (S, t)dS + ∂SS f (S, t)(dS)2 . .
2
2.3. GENERALIZED FUNCTIONS 53
We write:
"Z # "Z #
T T 2
2 2 2
A=E δ(S(s) − K)S(s) σ (s)ds = E δ(S(s) − K)S(s) E σ (s)|S(s) ds .
0 0
Using φ(s, x) for the risk-neutral density of the stock process at time s and stock
value x, we get
"Z #
T 2
2
A = E δ(S(s) − K)S(s) E σ (s)|S(s) ds
0
"Z Z #
T ∞
= E δ(S(s) − K)S(s) E σ 2 (s)|S(s) = x φ(s, x)dxds
2
0 −∞
"Z #
T 2
2
(2.30) = E K E σ (s)|S(s) = K φ(s, K)ds .
0
Therefore,
"Z # "Z #
T T
1 1
E δ(S(s) − K)S(s)2 σ 2 (s)ds = K 2 E E σ 2 (s)|S(s) = K φ(s, K)ds .
2 0 2 0
Heat equation, 8
55