16.11.2014 Views

McGraw-Hill

McGraw-Hill

McGraw-Hill

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

360 Expanding Opportunities<br />

N<br />

H = Chi =O.<br />

i=l<br />

(14.5)<br />

This condition is independent of h,, the fraction of wealth held<br />

in the risky portfolio. Applying the condition given in Eq. (14.5) to<br />

the optimal weights from Eq. (14.4), together with a simplifying assumption<br />

regarding the covariance matrix, it be can shown that the<br />

dollar-neutral portfolio is equal to the minimally constrained optimal<br />

portfolio when?<br />

(14.6)<br />

where oi is the standard deviation of the return of stock i, ti =l/ bi<br />

is a measure of the stability of the return of stock i, and 6 is the average<br />

return stability of all stocks in the investor's u@verse. The term<br />

ri /oi is a risk-adjusted return, and the term ti - 6 can be regarded<br />

as an excess stability, or a stability weighting. Highly volatile stocks<br />

will have low stabilities, so their excess stabilities will be negative.<br />

Conversely, low-volatility stocks will have high stabilities, so their<br />

excess stabilities will be positive.<br />

The condition shown in Eq. (14.6) states that the optimal net<br />

holding of risky securities is proportional to the universe's net stability-weighted<br />

risk-adjusted expected return. If this quantity is<br />

positive, the net holding should be long; if it is negative, the net<br />

holding should be short. The optimal risky portfolio will be dollarneutral<br />

only under the relatively unlikely condition this that quantity<br />

is zero.<br />

Beta-Neutral Portfolios<br />

We next consider the conditions under which a beta-neutral portfo<br />

lio maximizes the minimally constrained utility function. Once the<br />

investor has chosen a benchmark, each security can be modeled in<br />

terms of its expected excess return a and its beta pi with respect to<br />

that benchmark. Specifically, if r, is the expected return of the<br />

benchmark, then the expected return of the ith security is<br />

ri=ai+pirB. (14.7)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!