Multicriteria Portfolio Management

Springer Optimization and Its Applications

1
Free sample

The primary purpose in this book is to present an integrated and innovative methodological approach for the construction and selection of equity portfolios. The approach takes into account the inherent multidimensional nature of the problem, while allowing the decision makers to incorporate specified preferences in the decision processes. A fundamental principle of modern portfolio theory is that comparisons between portfolios are generally made using two criteria; the expected return and portfolio variance. According to most of the portfolio models derived from the stochastic dominance approach, the group of portfolios open to comparisons is divided into two parts: the efficient portfolios, and the dominated. This work integrates the two approaches providing a unified model for decision making in portfolio management with multiple criteria.​
Read more
5.0
1 total
Loading...

Additional Information

Publisher
Springer Science & Business Media
Read more
Published on
May 9, 2012
Read more
Pages
130
Read more
ISBN
9781461436706
Read more
Language
English
Read more
Genres
Business & Economics / Accounting / General
Business & Economics / General
Mathematics / Applied
Mathematics / Game Theory
Mathematics / Optimization
Read more
Content Protection
This content is DRM protected.
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. Other animals have stronger muscles or sharper claws, but we have cleverer brains. If machine brains one day come to surpass human brains in general intelligence, then this new superintelligence could become very powerful. As the fate of the gorillas now depends more on us humans than on the gorillas themselves, so the fate of our species then would come to depend on the actions of the machine superintelligence. But we have one advantage: we get to make the first move. Will it be possible to construct a seed AI or otherwise to engineer initial conditions so as to make an intelligence explosion survivable? How could one achieve a controlled detonation? To get closer to an answer to this question, we must make our way through a fascinating landscape of topics and considerations. Read the book and learn about oracles, genies, singletons; about boxing methods, tripwires, and mind crime; about humanity's cosmic endowment and differential technological development; indirect normativity, instrumental convergence, whole brain emulation and technology couplings; Malthusian economics and dystopian evolution; artificial intelligence, and biological cognitive enhancement, and collective intelligence. This profoundly ambitious and original book picks its way carefully through a vast tract of forbiddingly difficult intellectual terrain. Yet the writing is so lucid that it somehow makes it all seem easy. After an utterly engrossing journey that takes us to the frontiers of thinking about the human condition and the future of intelligent life, we find in Nick Bostrom's work nothing less than a reconceptualization of the essential task of our time.
Analysis, assessment, and data management are core tools required for operation research analysts. The April 2011 conference held at the Helenic Military Academy addressed these issues with efforts to collect valuable recommendations for improving analysts’ capabilities to assess and communicate the necessary qualitative data to military leaders. This unique volume is an outgrowth of the April conference and comprises of contributions from the fields of science, mathematics, and the military, bringing Greek research findings to the world. Topics cover a wide variety of mathematical methods used with application to defense and security. Each contribution considers directions and pursuits of scientists that pertain to the military as well as the theoretical background required for methods, algorithms, and techniques used in military applications. The direction of theoretical results in these applications is conveyed and open problems and future areas of focus are highlighted. A foreword will be composed by a member of N.A.T.O. or a ranking member of the armed forces. Topics covered include: applied OR and military applications, signal processing, scattering, scientific computing and applications, combat simulation and statistical modeling, satellite remote sensing, and applied informatics – cryptography and coding. The contents of this volume will be of interest to a diverse audience including military operations research analysts, the military community at large, and practitioners working with mathematical methods and applications to informatics and military science.​
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.