{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:46:38Z","timestamp":1742942798291,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642200410"},{"type":"electronic","value":"9783642200427"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20042-7_45","type":"book-chapter","created":{"date-parts":[[2011,4,15]],"date-time":"2011-04-15T12:17:36Z","timestamp":1302869856000},"page":"442-451","source":"Crossref","is-referenced-by-count":0,"title":["A Cross-Entropy Method for Value-at-Risk Constrained Optimization"],"prefix":"10.1007","author":[{"given":"Duc Manh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Hoai An","family":"Le Thi","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Pham Dinh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/PL00011399","volume":"89","author":"F. Andersson","year":"2001","unstructured":"Andersson, F., Mausser, H., Rosen, D., Uryasev, S.: Credit risk optimization with conditional value-at-risk criterion. Mathematical Programming\u00a089, 273\u2013291 (2001)","journal-title":"Mathematical Programming"},{"issue":"11","key":"45_CR2","first-page":"68","volume":"10","author":"P. Artzner","year":"1997","unstructured":"Artzner, P., Delbaen, F., Eber, J.-M., Heath, D.: Thinking coherently. Risk\u00a010(11), 68\u201371 (1997)","journal-title":"Risk"},{"key":"45_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/1467-9965.00068","volume":"9","author":"P. Artzner","year":"1999","unstructured":"Artzner, P., Delbaen, F., Eber, J.-M., Heath, D.: Coherent measures of risk. Mathematical Finance\u00a09, 203\u2013228 (1999)","journal-title":"Mathematical Finance"},{"key":"45_CR4","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.ejor.2005.07.020","volume":"176","author":"S. Benati","year":"2007","unstructured":"Benati, S., Rizzi, R.: A mixed integer linear programming formulation of the optimal mean\/value-at-risk portfolio problem. European Journal of Operational Research\u00a0176, 423\u2013434 (2007)","journal-title":"European Journal of Operational Research"},{"key":"45_CR5","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1016\/S0378-4266(00)00160-6","volume":"25","author":"R. Campbell","year":"2001","unstructured":"Campbell, R., Huisman, R., Koedijk, K.: Optimal portfolio selection in avalue-at-risk framework. Journal of Banking & Finance\u00a025, 1789\u20131804 (2001)","journal-title":"Journal of Banking & Finance"},{"key":"45_CR6","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/s10107-006-0725-5","volume":"108","author":"M.S. Cheon","year":"2006","unstructured":"Cheon, M.S., Ahmed, S., Al-Khayyal, F.: A branch-reduced-cut algorithm for the global optimization of probabilistically constrained linear programs. Mathematical Programming\u00a0108, 617\u2013634 (2006)","journal-title":"Mathematical Programming"},{"issue":"5","key":"45_CR7","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1016\/j.orl.2006.11.005","volume":"35","author":"A. Costa","year":"2007","unstructured":"Costa, A., Dafydd, O., Kroese, D.: Convergence properties of the cross-entropy method for discrete optimization. Operations Research Letters\u00a035(5), 573\u2013580 (2007)","journal-title":"Operations Research Letters"},{"key":"45_CR8","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-1-4757-3613-7_9","volume":"74","author":"M. Gilli","year":"2002","unstructured":"Gilli, M., Kellezi, E.: A global optimization heuristic for portfolio choice with VaR and expected shortfall, in Computational methods in decision-making, economics and finance. Applied Optimization\u00a074, 167\u2013183 (2002)","journal-title":"Applied Optimization"},{"key":"45_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.21314\/JOR.2006.129","volume":"8","author":"M. Gilli","year":"2006","unstructured":"Gilli, M., Kellezi, E., Hysi, H.: A data-driven optimization heuristic for downside risk minimization. The Journal of Risk\u00a08, 1\u201318 (2006)","journal-title":"The Journal of Risk"},{"key":"45_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-540-71805-5_22","volume-title":"Applications of Evolutionary Computing","author":"R. Hochreiter","year":"2007","unstructured":"Hochreiter, R.: An evolutionary computation approach to scenario-based risk-return portfolio optimization for general risk measures. In: Giacobini, M. (ed.) EvoWorkshops 2007. LNCS, vol.\u00a04448, pp. 199\u2013207. Springer, Heidelberg (2007)"},{"key":"45_CR11","volume-title":"Value at Risk: The New Benchmark for Controlling Market Risk","author":"P. Jorion","year":"2000","unstructured":"Jorion, P.: Value at Risk: The New Benchmark for Controlling Market Risk. McGraw-Hill, New York (2000)"},{"issue":"3","key":"45_CR12","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s11009-006-9753-0","volume":"8","author":"D.P. Kroese","year":"2006","unstructured":"Kroese, D.P., Porotsky, S., Rubinstein, R.Y.: The cross-entropy method for continuous multi-extremal optimization. Methodology and Computing In Applied Probability\u00a08(3), 383\u2013407 (2006)","journal-title":"Methodology and Computing In Applied Probability"},{"key":"45_CR13","first-page":"129","volume-title":"Financial Engineering, e-Commerce and Supply Chain","author":"N. Larsen","year":"2002","unstructured":"Larsen, N., Mausser, H., Uryasev, S.: Algorithms for optimization of value-at-risk. In: Pardalos, P., Tsitsiringos, V. (eds.) Financial Engineering, e-Commerce and Supply Chain, pp. 129\u2013157. Kluwer Academic Publishers, Dordrecht (2002)"},{"key":"45_CR14","unstructured":"Manh, N.D., Hoai An, L.T., Tao, P.D.: A new method for Value-at-Risk constrained Optimization using the DC programming and DCA. In: 24th Euro Conference on Operational Research, Lisbon (2010)"},{"key":"45_CR15","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1080\/10556780410001704911","volume":"19","author":"J.S. Pang","year":"2004","unstructured":"Pang, J.S., Leyffer, S.: On the global minimization of the value-at-risk. Optimization Methods and Software\u00a019, 611\u2013631 (2004)","journal-title":"Optimization Methods and Software"},{"key":"45_CR16","doi-asserted-by":"publisher","DOI":"10.1142\/6478","volume-title":"Modeling, Measuring and Managing Risk","author":"G.C. Pflug","year":"2007","unstructured":"Pflug, G.C., Romisch, W.: Modeling, Measuring and Managing Risk. World Scientific, Singapore (2007)"},{"key":"45_CR17","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-1-4757-3150-7_15","volume":"49","author":"G.C. Pflug","year":"2000","unstructured":"Pflug, G.C.: Some remarks on the Value-at-Risk and the Conditional Value-at-Risk. Probabilistic constrained optimization. Nonconvex Optimization and its Applications\u00a049, 272\u2013281 (2000)","journal-title":"Probabilistic constrained optimization. Nonconvex Optimization and its Applications"},{"key":"45_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10479-005-5724-z","volume":"134","author":"P.-T. Boer de","year":"2005","unstructured":"de Boer, P.-T., Kroese, D.P., Mannor, S., Rubinstein, R.Y.: A Tutorial on The Cross-Entropy Method. Annals of Operations Research\u00a0134, 19\u201367 (2005)","journal-title":"Annals of Operations Research"},{"key":"45_CR19","doi-asserted-by":"publisher","first-page":"21","DOI":"10.21314\/JOR.2000.038","volume":"2","author":"R.T. Rockafellar","year":"2000","unstructured":"Rockafellar, R.T., Uryasev, S.: Optimization of Conditional Value-at-Risk. The Journal of Risk\u00a02, 21\u201341 (2000)","journal-title":"The Journal of Risk"},{"key":"45_CR20","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/S0377-2217(96)00385-2","volume":"99","author":"R.Y. Rubinstein","year":"1997","unstructured":"Rubinstein, R.Y.: Optimization of cumputer simulation models with rare events. European Journal of Operation Reseach\u00a099, 89\u2013112 (1997)","journal-title":"European Journal of Operation Reseach"},{"key":"45_CR21","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1023\/A:1010091220143","volume":"2","author":"R.Y. Rubinstein","year":"1999","unstructured":"Rubinstein, R.Y.: The simulated entropy method for combinatorial and continuous optimization. Methodology and Computing in Applied Probability\u00a02, 127\u2013190 (1999)","journal-title":"Methodology and Computing in Applied Probability"},{"key":"45_CR22","first-page":"304","volume-title":"Stochastic Optimization: Algorithms and Application","author":"R.Y. Rubinstein","year":"2001","unstructured":"Rubinstein, R.Y.: Combinatorial optimization, cross-entropy, ants and rare events. In: Uryasev, S., Pardalos, P.M. (eds.) Stochastic Optimization: Algorithms and Application, pp. 304\u2013358. Kluwer, Dordrecht (2001)"},{"key":"45_CR23","first-page":"1","volume":"14","author":"S. Uryasev","year":"2000","unstructured":"Uryasev, S.: Conditional Value-at-Risk: Optimization algorithms and applications. Financial Engineering News\u00a014, 1\u20135 (2000)","journal-title":"Financial Engineering News"},{"key":"45_CR24","unstructured":"Wozabal, D., Hochreiter, R., Pflug, G.: A d. c. formulation of value-at-risk constrained optimization. Tech. Rep. TR2008-01, Department of Statistics and Decision Support Systems, University of Vienna, Vienna (2008)"},{"key":"45_CR25","unstructured":"Wozabal, D.: A new method for value-at-risk constrained optimization using the difference of convex algorithm. Tech. Rep. TR2008-03, Department of Statistics and Decision Support Systems, University of Vienna, Vienna (2008)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20042-7_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T19:01:13Z","timestamp":1548442873000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20042-7_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642200410","9783642200427"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20042-7_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}