LEADER 02275nam 2200577Ia 450 001 9910438087403321 005 20200520144314.0 010 $a3-642-36376-8 024 7 $a10.1007/978-3-642-36376-4 035 $a(CKB)2550000001045686 035 $a(EBL)1206125 035 $a(SSID)ssj0000878690 035 $a(PQKBManifestationID)11560810 035 $a(PQKBTitleCode)TC0000878690 035 $a(PQKBWorkID)10837005 035 $a(PQKB)11301304 035 $a(DE-He213)978-3-642-36376-4 035 $a(MiAaPQ)EBC1206125 035 $a(PPN)16913928X 035 $a(EXLCZ)992550000001045686 100 $a20130418d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCredibilistic programming $ean introduction to models and applications /$fXiang Li 205 $a1st ed. 2013. 210 $aHeidelberg ;$aNew York $cSpringer$dc2013 215 $a1 online resource (144 p.) 225 0 $aUncertainty and operations research 300 $aDescription based upon print version of record. 311 $a3-642-42717-0 311 $a3-642-36375-X 320 $aIncludes bibliographical references and index. 327 $aPreface -- Credibility Theory -- Credibilistic Programming -- Mathematical Programming -- Expected Value Model -- Chance-Constrained Programming -- Entropy Maximization Model -- Cross-Entropy Minimization Model -- Regret Minimization Model. 330 $aIt provides fuzzy programming approach to solve real-life decision problems in fuzzy environment. Within the framework of credibility theory, it provides a self-contained, comprehensive and up-to-date presentation of fuzzy programming models, algorithms and applications in portfolio analysis. 410 0$aUncertainty and Operations Research,$x2195-996X 606 $aProgramming languages (Electronic computers) 606 $aComputer programming 615 0$aProgramming languages (Electronic computers) 615 0$aComputer programming. 676 $a006.3 700 $aLi$b Xiang$0375426 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910438087403321 996 $aCredibilistic Programming$92544769 997 $aUNINA