3 code implementations • 29 Apr 2017 • Stephen Boyd, Enzo Busseti, Steven Diamond, Ronald N. Kahn, Kwangmoo Koh, Peter Nystrup, Jan Speth
The methods we describe in this paper can be thought of as good ways to exploit predictions, no matter how they are made.