{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T03:40:12Z","timestamp":1763955612781,"version":"3.45.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Manag Sci"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10287-025-00549-y","type":"journal-article","created":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T03:36:49Z","timestamp":1763955409000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bidding in ancillary service markets: an analytical approach using extreme value theory"],"prefix":"10.1007","volume":"23","author":[{"given":"Torine Reed","family":"Herstad","sequence":"first","affiliation":[]},{"given":"Jalal","family":"Kazempour","sequence":"additional","affiliation":[]},{"given":"Lesia","family":"Mitridati","sequence":"additional","affiliation":[]},{"given":"Bert","family":"Zwart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,24]]},"reference":[{"key":"549_CR1","unstructured":"Blanchet J, Jorritsma J, Zwart B (2024) Optimization under rare events: scaling laws for linear chance-constrained programs. http:\/\/arxiv.org\/abs\/2407.11825"},{"issue":"1","key":"549_CR2","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1287\/stsy.2021.0021","volume":"14","author":"J Blanchet","year":"2024","unstructured":"Blanchet J, Zhang F, Zwart B (2024) Efficient scenario generation for heavy-tailed chance constrained optimization. Stoch Syst 14(1):22\u201346","journal-title":"Stoch Syst"},{"issue":"5","key":"549_CR3","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TAC.2006.875041","volume":"51","author":"GC Calafiore","year":"2006","unstructured":"Calafiore GC, Campi MC (2006) The scenario approach to robust control design. IEEE Trans Autom Control 51(5):742\u2013753","journal-title":"IEEE Trans Autom Control"},{"key":"549_CR4","doi-asserted-by":"publisher","first-page":"153","DOI":"10.2307\/1403464","volume":"58","author":"LL Cam","year":"1990","unstructured":"Cam LL (1990) Maximum likelihood: an introduction. Int Stat Rev 58:153\u2013171","journal-title":"Int Stat Rev"},{"key":"549_CR5","volume-title":"Extreme Value Theory in Engineering","author":"E Castillo","year":"1988","unstructured":"Castillo E (1988) Extreme value theory in engineering. Academic Press, Statistical Modeling and Decision Science"},{"issue":"4","key":"549_CR6","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1080\/00401706.1965.10490300","volume":"7","author":"AC Cohen","year":"1965","unstructured":"Cohen AC (1965) Maximum likelihood estimation in the weibull distribution based on complete and on censored samples. Technometrics 7(4):579\u2013588","journal-title":"Technometrics"},{"key":"549_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0391-3","volume-title":"Modern Mathematical Statistics with Applications","author":"JL Devore","year":"2012","unstructured":"Devore JL, Berk KN (2012) Modern mathematical statistics with applications. Springer, New York"},{"issue":"2","key":"549_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1108\/eb043443","volume":"1","author":"FX Diebold","year":"2000","unstructured":"Diebold FX, Schuermann T, Stroughair JD (2000) Pitfalls and opportunities in the use of extreme value theory in risk management. J Risk Finance 1(2):30\u201335","journal-title":"J Risk Finance"},{"key":"549_CR9","unstructured":"Dodge Y (2008) Kolmogorov-Smirnov Test. The Concise Encyclopedia of Statistics. Springer, New York, pp 283\u2013287"},{"key":"549_CR10","unstructured":"Energinet (2024a) Ancillary services to be delivered in Denmark \u2013 Tender conditions. https:\/\/en.energinet.dk\/Electricity\/Ancillary-Services\/Tender-conditions-for-ancillary-services\/"},{"key":"549_CR11","unstructured":"Energinet (2024b) Prequalification of units and aggregated portfolios. https:\/\/en.energinet.dk\/electricity\/ancillary-services\/prequalification-and-test\/"},{"key":"549_CR12","doi-asserted-by":"crossref","unstructured":"Gade PAV, Bindner HW, Kazempour J (2024) Leveraging P90 requirement: Flexible resources bidding in Nordic ancillary service markets. In IEEE SmartGridComm 2024, Oslo, Norway","DOI":"10.1109\/SmartGridComm60555.2024.10738114"},{"key":"549_CR13","doi-asserted-by":"crossref","unstructured":"Haynes W (2013) Bonferroni Correction. Springer New York, New York, NY pp 154\u2013154","DOI":"10.1007\/978-1-4419-9863-7_1213"},{"key":"549_CR14","unstructured":"Herstad TR (2025) Github repository. https:\/\/github.com\/torine-dtu\/EV-bidding-EVT-2024"},{"issue":"2","key":"549_CR15","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1023\/A:1024505701928","volume":"5","author":"J H\u00fcsler","year":"2003","unstructured":"H\u00fcsler J, Cruz P, Hall A, Fonseca CM (2003) On optimization and extreme value theory. Methodol Comput Appl Probab 5(2):183\u2013195","journal-title":"Methodol Comput Appl Probab"},{"issue":"2","key":"549_CR16","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1287\/msom.2022.0154","volume":"26","author":"D Lauinger","year":"2024","unstructured":"Lauinger D, Vuille F, Kuhn D (2024) Reliable frequency regulation through vehicle-to-grid: encoding legislation with robust constraints. Manuf Serv Oper Manag 26(2):722\u2013738","journal-title":"Manuf Serv Oper Manag"},{"issue":"2","key":"549_CR17","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1137\/070702928","volume":"19","author":"J Luedtke","year":"2008","unstructured":"Luedtke J, Ahmed S (2008) A sample approximation approach for optimization with probabilistic constraints. SIAM J Optim 19(2):674\u2013699","journal-title":"SIAM J Optim"},{"key":"549_CR18","doi-asserted-by":"crossref","unstructured":"Lunde GA, Damm EV, Gade PAV, Kazempour J (2025) Aggregator of electric vehicles bidding in Nordic FCR-D markets: a chance-constrained program. IEEE Trans Power Syst (forthcoming)","DOI":"10.1109\/TPWRS.2025.3558868"},{"issue":"11","key":"549_CR19","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.ejor.2011.11.006","volume":"219","author":"A Nemirovski","year":"2012","unstructured":"Nemirovski A, Stewart HM (2012) On safe tractable approximations of chance constraints. Eur J Oper Res 219(11):707\u2013718","journal-title":"Eur J Oper Res"},{"key":"549_CR20","doi-asserted-by":"crossref","unstructured":"Pr\u00e9kopa A (1970) On probabilistic constrained programming. In Proc Princeton Sympos Math Program Princeton, NJ pp 113\u2013138","DOI":"10.1515\/9781400869930-009"},{"issue":"2","key":"549_CR21","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1137\/20M1382490","volume":"32","author":"S Tong","year":"2022","unstructured":"Tong S, Subramanyam A, Rao V (2022) Optimization under rare chance constraints. SIAM J Optim 32(2):930\u2013958","journal-title":"SIAM J Optim"}],"container-title":["Computational Management Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10287-025-00549-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10287-025-00549-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10287-025-00549-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T03:36:50Z","timestamp":1763955410000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10287-025-00549-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,24]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["549"],"URL":"https:\/\/doi.org\/10.1007\/s10287-025-00549-y","relation":{},"ISSN":["1619-697X","1619-6988"],"issn-type":[{"value":"1619-697X","type":"print"},{"value":"1619-6988","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,24]]},"assertion":[{"value":"28 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"3"}}