

Publisher: Elsevier
ISSN: 0377-2217
Source: European Journal of Operational Research, Vol.103, Iss.1, 1997-11, pp. : 170-185
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


The axiomatic basis of risk-value models
By Schmidt U.
European Journal of Operational Research, Vol. 145, Iss. 1, 2003-02 ,pp. :


Risk-value models: Restrictions and applications
European Journal of Operational Research, Vol. 145, Iss. 1, 2003-02 ,pp. :



