{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:18:05Z","timestamp":1740140285782,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T00:00:00Z","timestamp":1458345600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11171095, 71371065"],"award-info":[{"award-number":["11171095, 71371065"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Manag Sci"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s10287-016-0251-8","type":"journal-article","created":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T06:35:59Z","timestamp":1458369359000},"page":"393-422","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Penalized sample average approximation methods for stochastic programs in economic and secure dispatch of a power system"],"prefix":"10.1007","volume":"13","author":[{"given":"X. J.","family":"Tong","sequence":"first","affiliation":[]},{"given":"H.","family":"Xu","sequence":"additional","affiliation":[]},{"given":"F. F.","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Z.","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,19]]},"reference":[{"key":"251_CR1","unstructured":"Anderson E, Xu H, Zhang D (2014) Confidence levels for CVaR risk measure and minimax limits. http:\/\/ses.library.usyd.edu.au\/handle\/2123\/9943"},{"issue":"2","key":"251_CR2","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1109\/TPWRS.2008.919318","volume":"23","author":"F Bouffard","year":"2008","unstructured":"Bouffard F, Galiana FD (2008) Stochastic security for operations planning with significant wind power generation. IEEE Trans Power Syst 23(2):306\u2013316","journal-title":"IEEE Trans Power Syst"},{"key":"251_CR3","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s10287-015-0228-z","volume":"12","author":"I Bremer","year":"2015","unstructured":"Bremer I, Henrion R, Moller A (2015) Probabilistic constraints via SQP solver: application to a renewable energy management problem. Comput Manag Sci 12:435\u2013459","journal-title":"Comput Manag Sci"},{"key":"251_CR4","doi-asserted-by":"crossref","first-page":"1731","DOI":"10.1016\/j.epsr.2011.04.003","volume":"81","author":"F Capitanescu","year":"2011","unstructured":"Capitanescu F, Martinez Ramos JL, Panciatici P, Kirschen D, Marcolini AM (2011) State-of-the-art, challenges, and future trends in security constraines optimal power flow. Elect Power Syst Res 81:1731\u20131741","journal-title":"Elect Power Syst Res"},{"key":"251_CR5","volume-title":"Optimization and nonsmooth analysis","author":"FH Clarke","year":"1983","unstructured":"Clarke FH (1983) Optimization and nonsmooth analysis. Wiley, New York 1983"},{"key":"251_CR6","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s10107-014-0809-6","volume":"148","author":"W Oliveira de","year":"2014","unstructured":"de Oliveira W, Sagasti\u017aabal C, Lemar\u00e9chal C (2014) Convex proximal bundle methods in depth: a unified analysis for inexact oracles. Math Prog Series B 148:241\u2013277","journal-title":"Math Prog Series B"},{"issue":"6","key":"251_CR7","doi-asserted-by":"crossref","first-page":"1180","DOI":"10.1080\/10556788.2013.871282","volume":"29","author":"W Oliveira de","year":"2014","unstructured":"de Oliveira W, Sagasti\u017aabal C (2014) Level bundle methods for oracles with on demand accuracy. Optim Methods Softw 29(6):1180\u20131209","journal-title":"Optim Methods Softw"},{"key":"251_CR8","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1080\/1055678021000060829a","volume":"17","author":"JL Goffin","year":"2002","unstructured":"Goffin JL, Vial JP (2002) Convex nondifferentiable optimization: a survey focused on the analytic center cutting plane method. Optim Method Softw 17:805\u2013867","journal-title":"Optim Method Softw"},{"key":"251_CR9","unstructured":"Henrion R (2012) Stability of chance constrained optimization. In: Cervinka M (ed) Variational analysis and its applications. Lecture notes of spring school in variational analysis, Paseky 2012. MatFyz press, Prague, pp 1\u201326"},{"key":"251_CR10","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1137\/060650118","volume":"18","author":"R Henrion","year":"2007","unstructured":"Henrion R, Dentcheva D, Ruszczynski A (2007) Stability and sensitivity of optimization problems with first order stochastic dominance constraints. SIAM J Optim 18:322\u2013337","journal-title":"SIAM J Optim"},{"issue":"2","key":"251_CR11","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/TEC.2007.914171","volume":"23","author":"J Hetzer","year":"2008","unstructured":"Hetzer J, Yu DC, Bhattarai K (2008) An economic dispatch model incorporating wind power. IEEE Trans Energy Conver 23(2):603\u2013611","journal-title":"IEEE Trans Energy Conver"},{"issue":"3","key":"251_CR12","first-page":"37","volume":"26","author":"Y Jiang","year":"2007","unstructured":"Jiang Y, Chen C, Wen B (2007) Economic dispatch basd on particle swarm optimization of stochastic simulation in wind power integrated system. Adv Technol Elect Eng Energy 26(3):37\u201341","journal-title":"Adv Technol Elect Eng Energy"},{"key":"251_CR13","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1137\/0108053","volume":"8","author":"JE Kelley","year":"1960","unstructured":"Kelley JE (1960) The Cutting-plane method for solving convex programs. SIAM J Appl Math 8:703\u2013712","journal-title":"SIAM J Appl Math"},{"issue":"1","key":"251_CR14","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s10107-007-0187-4","volume":"118","author":"KC Kiwiel","year":"2009","unstructured":"Kiwiel KC, Lemar\u00e9chal C (2009) An inexact bundle variant suited to column generation. Math Program 118(1):177\u2013206","journal-title":"Math Program"},{"issue":"2","key":"251_CR15","first-page":"11","volume":"4","author":"P Krokhmal","year":"2002","unstructured":"Krokhmal P, Palmquist J, Uryasev S (2002) Portfolio of optimization with conditional value-at-risk objective and constraints. J Risk 4(2):11\u201327","journal-title":"J Risk"},{"key":"251_CR16","doi-asserted-by":"crossref","unstructured":"Lemarechal C, Nemirovskii A, Nesterov Y (1995) New variants of bundle methods. Math Program 69:111\u2013147","DOI":"10.1007\/BF01585555"},{"issue":"4","key":"251_CR17","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1287\/moor.1110.0513","volume":"36","author":"Y Liu","year":"2011","unstructured":"Liu Y, Xu H, Ye JJ (2011) Penalized sample average approximation methods for stochastic mathematical programs with complementarity constraints. Math Oper Res 36(4):670\u2013694","journal-title":"Math Oper Res"},{"issue":"1\u20132","key":"251_CR18","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s10107-012-0585-0","volume":"142","author":"Y Liu","year":"2013","unstructured":"Liu Y, Xu H (2013) Stability and sensitivity analysis of stochastic programs with second order dominance constraints. Math Program 142(1\u20132):435\u2013460","journal-title":"Math Program"},{"issue":"3","key":"251_CR19","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1109\/TPWRS.2010.2070848","volume":"26","author":"P Meibom","year":"2011","unstructured":"Meibom P, Barth R, Hasche B, Brand H, Weber C, O\u2019Malley M (2011) Stochastic optimization model to study the operational impacts of high wind penetrations in Ireland. IEEE Trans Power Syst 26(3):1367\u20131379","journal-title":"IEEE Trans Power Syst"},{"key":"251_CR20","unstructured":"NERC (North American Electric Reliability Corporation) (2010) Integrated bulk power system risk assessment concepts, NERC Whitepaper"},{"key":"251_CR21","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s10957-009-9523-6","volume":"142","author":"B Pagnoncelli","year":"2009","unstructured":"Pagnoncelli B, Ahmed S, Shapiro A (2009) Sample average approximation method for chance constrained programming: theory and applications. J Optim Theory Appl 142:399\u2013416","journal-title":"J Optim Theory Appl"},{"key":"251_CR22","unstructured":"Peng J (1998) A smoothing function and its applications, in reformulation: nonsmooth, piecewise smooth, semismooth and smoothing methods. In: Fukushima M, Qi L (eds) Kluwer Academic Publisher, pp 293\u2013316"},{"issue":"19","key":"251_CR23","first-page":"8","volume":"31","author":"W Qi","year":"2011","unstructured":"Qi W, Zhang J, Liu N (2011) Model and solution for environmental\/economic dispatch considering large-scale wind power penetration. Proc CSEE 31(19):8\u201316","journal-title":"Proc CSEE"},{"key":"251_CR24","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1137\/0313015","volume":"13","author":"SM Robinson","year":"1975","unstructured":"Robinson SM (1975) An application of error bounds for convex programming in a linear space. SIAM J Control 13:271\u2013273","journal-title":"SIAM J Control"},{"key":"251_CR25","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/j.ress.2010.01.001","volume":"95","author":"RT Rockafellar","year":"2010","unstructured":"Rockafellar RT, Royset JO (2010) On buffered failure probability in design and optimization of structures. Reliab Eng Syst Safety 95:499\u2013510","journal-title":"Reliab Eng Syst Safety"},{"issue":"3","key":"251_CR26","doi-asserted-by":"crossref","first-page":"21","DOI":"10.21314\/JOR.2000.038","volume":"2","author":"RT Rockafellar","year":"2000","unstructured":"Rockafellar RT, Uryasev S (2000) Optimization of conditional value-at-risk. J Risk 2(3):21\u201341","journal-title":"J Risk"},{"key":"251_CR27","doi-asserted-by":"crossref","unstructured":"Ruszczy\u0144ski A, Shapiro A (2003) Stochastic programming, handbook in operations research and management science. Elsevier","DOI":"10.1016\/S0927-0507(03)10001-1"},{"key":"251_CR28","doi-asserted-by":"crossref","DOI":"10.1137\/1.9780898718751","volume-title":"Lectures on stochastic programming: modeling and theory","author":"A Shapiro","year":"2009","unstructured":"Shapiro A, Dentcheva D, Ruszczynski A (2009) Lectures on stochastic programming: modeling and theory. SIAM, Philadelphia"},{"issue":"1","key":"251_CR29","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TCSI.2007.910542","volume":"55","author":"XJ Tong","year":"2008","unstructured":"Tong XJ, Wu FF, Qi L (2008) Available transfer capability calculation using a smoothing pointwise maximum function. IEEE Trans Circuits Syst I 55(1):462\u2013474","journal-title":"IEEE Trans Circuits Syst I"},{"key":"251_CR30","doi-asserted-by":"crossref","first-page":"1723","DOI":"10.1016\/j.amc.2009.12.031","volume":"216","author":"X Tong","year":"2010","unstructured":"Tong X, Qi L, Wu F, Zhou H (2010) A smoothing method for solving portfolio optimization with CVaR and applications in allocation of generation asset. Appl Math Comput 216:1723\u20131740","journal-title":"Appl Math Comput"},{"key":"251_CR31","doi-asserted-by":"crossref","unstructured":"Uryasev S (2009) Derivatives of probability and integral functions: general theory and examples, 2nd edn, Springer Verlag","DOI":"10.1007\/978-0-387-74759-0_119"},{"key":"251_CR32","doi-asserted-by":"crossref","unstructured":"van Ackooij W, Henrion R (2014) Gradient formulae for nonlinear probabilistic constraints with Gaussian and Gaussian-like distributions. SIAM J Optim 24(4):1864\u20131889","DOI":"10.1137\/130922689"},{"issue":"1","key":"251_CR33","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/JPROC.2010.2080250","volume":"99","author":"P Varaiya","year":"2011","unstructured":"Varaiya P, Wu F, Bialek J (2011) Smart operation of smart grid: risk-limiting dispatch. Proc IEEE 99(1):40\u201357","journal-title":"Proc IEEE"},{"issue":"11","key":"251_CR34","first-page":"128","volume":"26","author":"X Wang","year":"2006","unstructured":"Wang X, Yang C, Wu M (2006) Short term environmental\/economic generation scheduling based on chaos genetic hybrid optimization algorithm. Proc CSEE 26(11):128\u2013133","journal-title":"Proc CSEE"},{"key":"251_CR35","doi-asserted-by":"crossref","unstructured":"Wu FF, Kumagal S (1982) Steady-state security regions of power systems. IEEE Trans Circuits Syst Cas 29 (11):703\u2013711","DOI":"10.1109\/TCS.1982.1085091"},{"issue":"4","key":"251_CR36","doi-asserted-by":"crossref","first-page":"2287","DOI":"10.1109\/TPWRS.2007.907591","volume":"22","author":"F Xiao","year":"2007","unstructured":"Xiao F, McCalley JD (2007) Risk-based security and economy tradeoff analysis for real-time operation. IEEE Trans Power Syst 22(4):2287\u20132288","journal-title":"IEEE Trans Power Syst"},{"key":"251_CR37","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1023\/A:1026446503110","volume":"108","author":"H Xu","year":"2001","unstructured":"Xu H (2001) Level function method for quasiconvex programming. J Optim Theory Appl 108:407\u2013437","journal-title":"J Optim Theory Appl"},{"key":"251_CR38","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1016\/j.jmaa.2010.03.021","volume":"368","author":"H Xu","year":"2010","unstructured":"Xu H (2010) Uniform exponential convergence of sample average random functions under general sampling with applications in stochastic programming. J Math Anal Appl 368:692\u2013710","journal-title":"J Math Anal Appl"},{"issue":"3","key":"251_CR39","doi-asserted-by":"crossref","first-page":"1568","DOI":"10.1109\/TPWRS.2009.2021202","volume":"24","author":"H Yu","year":"2009","unstructured":"Yu H, Chung CY, Wong KP, Zhang JH (2009) A chance constrained transmission network expansion planning method with consideration of load and wind farm cncertainties. IEEE Trans Power Syst 24(3):1568\u20131576","journal-title":"IEEE Trans Power Syst"}],"container-title":["Computational Management Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10287-016-0251-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10287-016-0251-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10287-016-0251-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T04:10:02Z","timestamp":1718424602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10287-016-0251-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,19]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["251"],"URL":"https:\/\/doi.org\/10.1007\/s10287-016-0251-8","relation":{},"ISSN":["1619-697X","1619-6988"],"issn-type":[{"type":"print","value":"1619-697X"},{"type":"electronic","value":"1619-6988"}],"subject":[],"published":{"date-parts":[[2016,3,19]]}}}