{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T09:54:56Z","timestamp":1763978096602,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030243012"},{"type":"electronic","value":"9783030243029"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24302-9_17","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T08:02:51Z","timestamp":1561708971000},"page":"232-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Orthogonal Bandit Learning for Portfolio Selection Under Cardinality Constraint"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6940-7691","authenticated-orcid":false,"given":"Mahdi","family":"Moeini","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"17_CR1","volume-title":"Nonlinear Optimization with Financial Applications","author":"MC Bartholomew-Biggs","year":"2005","unstructured":"Bartholomew-Biggs, M.C.: Nonlinear Optimization with Financial Applications, 1st edn. Kluwer Academic Publishers, Dordrecht (2005)","edition":"1"},{"key":"17_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3711-7","volume-title":"Bandit Problems: Sequential Allocaton of Experiments","author":"DA Berry","year":"1985","unstructured":"Berry, D.A., Fristedt, B.: Bandit Problems: Sequential Allocaton of Experiments. University of Minnesota: Chapman and Hall Ltd., London (1985)"},{"key":"17_CR3","unstructured":"Chen, W., Wang, Y., Yuan, Y.: Combinatorial multi-armed bandit: general framework and applications. In: Proceedings of the 30th International Conference on Machine Learning, pp. 151\u2013159 (2013)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Fan, J., Fan, Y., Lv, J.: High dimensional covariance matrix estimation using a factor model (2007). \n                      http:\/\/arxiv.org\/pdf\/math\/0701124v1","DOI":"10.2139\/ssrn.957599"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1016\/j.cor.2005.06.017","volume":"34","author":"A Fern\u00e1ndez","year":"2007","unstructured":"Fern\u00e1ndez, A., G\u00f3mez, S.: Portfolio selection using neural networks. Comput. Oper. Res. 34, 1177\u20131191 (2007)","journal-title":"Comput. Oper. Res."},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.ejor.2011.09.004","volume":"217","author":"G Guastaroba","year":"2012","unstructured":"Guastaroba, G., Speranza, M.G.: Kernel search: an application to the index tracking problem. Eur. J. Oper. Res. 217(1), 54\u201368 (2012)","journal-title":"Eur. J. Oper. Res."},{"issue":"1","key":"17_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1080\/02331930903500274","volume":"59","author":"N Gulpinar","year":"2010","unstructured":"Gulpinar, N., Le Thi, H.A., Moeini, M.: Robust investment strategies with discrete asset choice constraints using DC programming. Optimization 59(1), 45\u201362 (2010)","journal-title":"Optimization"},{"key":"17_CR8","unstructured":"Hoffman, M.D., Brochu, E., de Freitas, N.: Portfolio allocation for bayesian optimization. In: The Conference on Uncertainty in Artificial Intelligence, pp. 327\u2013336 (2011)"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1469-7688\/1\/5\/301","volume":"1","author":"N Jobst","year":"2001","unstructured":"Jobst, N., Horniman, M., Lucas, C., Mitra, G.: Computational aspects of alternative portfolio selection models in the presence of discrete asset choice constraints. Quant. Finance 1, 1\u201313 (2001)","journal-title":"Quant. Finance"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s10898-004-2703-x","volume":"32","author":"H Konno","year":"2005","unstructured":"Konno, H., Yamamoto, R.: Global optimization versus integer programming in portfolio optimization under nonconvex transaction costs. J. Glob. Optim. 32, 207\u2013219 (2005)","journal-title":"J. Glob. Optim."},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/0196-8858(85)90002-8","volume":"6","author":"TL Lai","year":"1985","unstructured":"Lai, T.L., Robbins, H.: Asymptotically efficient adaptive allocation rules. Adv. Appl. Math. 6(1), 4\u201322 (1985)","journal-title":"Adv. Appl. Math."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Le Thi, H.A., Moeini, M.: Portfolio selection under buy-in threshold constraints using DC programming and DCA. In: International Conference on Service Systems and Service Management (IEEE\/SSSM 2006), pp. 296\u2013300 (2006)","DOI":"10.1109\/ICSSSM.2006.320630"},{"issue":"4","key":"17_CR13","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/s10287-009-0099-2","volume":"6","author":"HA Thi Le","year":"2009","unstructured":"Le Thi, H.A., Moeini, M., Pham Dinh, T.: Portfolio selection under downside risk measures and cardinality constraints based on DC programming and DCA. Comput. Manag. Sci. 6(4), 477\u2013501 (2009)","journal-title":"Comput. Manag. Sci."},{"issue":"3","key":"17_CR14","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1080\/02331930902741721","volume":"58","author":"HA Thi Le","year":"2009","unstructured":"Le Thi, H.A., Moeini, M., Pham Dinh, T.: DC programming approach for portfolio optimization under step increasing transaction costs. Optimization 58(3), 267\u2013289 (2009)","journal-title":"Optimization"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s10957-012-0197-0","volume":"161","author":"HA Thi Le","year":"2014","unstructured":"Le Thi, H.A., Moeini, M.: Long-short portfolio optimization under cardinality constraints by difference of convex functions algorithm. J. Optim. Theory Appl. 161(1), 199\u2013224 (2014)","journal-title":"J. Optim. Theory Appl."},{"issue":"1","key":"17_CR16","first-page":"77","volume":"7","author":"HM Markowitz","year":"1952","unstructured":"Markowitz, H.M.: Portfolio selection. J. Finance 7(1), 77\u201391 (1952)","journal-title":"J. Finance"},{"key":"17_CR17","volume-title":"Portfolio Selection","author":"HM Markowitz","year":"1959","unstructured":"Markowitz, H.M.: Portfolio Selection. Wiley, New York (1959)"},{"key":"17_CR18","volume-title":"Risk and Asset Allocation","author":"A Meucci","year":"2009","unstructured":"Meucci, A.: Risk and Asset Allocation. Springer, Dordrecht (2009)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/978-3-662-49390-8_60","volume-title":"Intelligent Information and Database Systems","author":"M Moeini","year":"2016","unstructured":"Moeini, M., Wendt, O., Krumrey, L.: Portfolio optimization by means of a \n                      \n                        \n                      \n                      $$\\chi $$\n                    -armed bandit algorithm. In: Nguyen, N.T., Trawi\u0144ski, B., Fujita, H., Hong, T.-P. (eds.) ACIIDS 2016. LNCS (LNAI), vol. 9622, pp. 620\u2013629. Springer, Heidelberg (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-662-49390-8_60"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1090\/S0002-9904-1952-09620-8","volume":"58","author":"H Robbins","year":"1952","unstructured":"Robbins, H.: Some aspects of the sequential design of experiments. Bull. Am. Math. Soc. 58, 527\u2013535 (1952)","journal-title":"Bull. Am. Math. Soc."},{"key":"17_CR21","unstructured":"Shen, W., Wang, J., Jiang, Y.-G., Zha, H.: Portfolio choices with orthogonal bandit learning. In: Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015), pp. 974\u2013980 (2015)"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1093\/biomet\/25.3-4.285","volume":"25","author":"WR Thompson","year":"1933","unstructured":"Thompson, W.R.: On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika 25, 275\u2013294 (1933)","journal-title":"Biometrika"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24302-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T01:40:17Z","timestamp":1567647617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24302-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243012","9783030243029"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24302-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}