Abstract
This survey offers a succinct overview of the General Framework of Portfolio Theory (GFPT), consolidating Markowitz portfolio theory, the growth optimal portfolio theory, and the theory of risk measures. Central to this framework is the use of convex analysis and duality, reflecting the concavity of reward functions and the convexity of risk measures due to diversification effects. Furthermore, practical considerations, such as managing multiple risks in bank balance sheets, have expanded the theory to encompass vector risk analysis. The goal of this survey is to provide readers with a concise tour of the GFPT’s key concepts and practical applications without delving into excessive technicalities. Instead, it directs interested readers to the comprehensive monograph of Maier-Paape, Júdice, Platen, and Zhu (2023) for detailed proofs and further exploration.
Keywords:
general framework of portfolio theory; convex programming; financial mathematics; risk measures; utility functions; efficient frontier; Markowitz portfolio theory; capital market asset pricing model; growth optimal portfolio; fractional Kelly allocation MSC:
52A41; 90C25; 91G99
1. Introduction
This survey offers a concise overview of the General Framework of Portfolio Theory (GFPT). Developed in the 1950s, portfolio theories primarily followed two schools of thought. The first, championed by Markowitz (1959), emphasizes portfolio selection as a trade-off between reward and risk. The second focuses on seeking the optimal portfolio for maximum growth (see Kelly 1956; Lintner 1965; MacLean et al. 2011). However, as portfolio theories evolved, it became evident that Markowitz’s use of variance as a risk measure was not entirely satisfactory. The single-minded pursuit of portfolio returns without adequately addressing risk posed its own set of dangers. Consequently, the analysis of risk measures gained prominence among researchers and practitioners, leading to a fruitful area of financial analysis, cf. Artzner et al. (1999); Carr and Zhu (2018). The GFPT unifies these three areas of research, and establishes a robust mathematical foundation. It is noteworthy that the concavity of the reward management function, driven by risk aversion, and the convexity of the risk measure, attributed to the risk-reducing effects of diversification, make convex analysis and duality central to this framework (see Carr and Zhu 2018; Maier-Paape et al. 2023).
Furthermore, practical problems, such as bank balance sheet management dealing with multiple risks of different properties, necessitate the extension of the theory to encompass the analysis of vector risks. Our goal here is to provide readers with a quick guided tour of the most important results from the General Framework of Portfolio Theory and demonstrate its practical applications. We aim to emphasize key ideas without delving into excessive technical details, refraining from providing proofs. Instead, we highlight selected proof concepts and direct interested readers to the monograph (Maier-Paape et al. 2023) for in-depth details.
Forerunner of this monograph with respect to laying the basic ideas of the General Framework of Portfolio Theory has been the work of Maier-Paape and Zhu (2018a), followed by Maier-Paape and Zhu (2018b) and Maier-Paape et al. (2019), the latter two including drawdown risk and multi-period markets. Furthermore, Platen (2018) contributed significantly to the GFPT by his modular approach, before lastly Maier-Paape et al. (2023) picked up all these ideas, brought them together and crucially extended them by allowing vector risk.
To limit the length of the paper, we have chosen to focus on the main ideas and results of GFPT, necessitating the omission of several important related topics. These include portfolio theory for continuous stochastic market models (cf. Fouque et al. 2017; Merton 1992), as well as issues related to hedging and replicating financial derivatives. Additionally, we have not covered strategies for limiting the risk of growth-optimal portfolios over a finite time horizon, which involves analyzing nonconcave reward functions (see Dewasurendra et al. 2019; Lopez de Prado et al. 2019; Vince and Zhu 2015).
In the next section, we embark on a detailed exploration of the historical underpinnings of the GFPT. We then turn our attention into the simpler case, which involves scalar risk alone. Section 3 will elucidate the efficient frontier, while Section 4 will examine the associated efficient portfolios. Additionally, Section 5 will analyze the behavior of the efficient frontier at its boundaries. Moving forward to Section 6, we will explore the broader scope of portfolio theory, incorporating vector risk. Our survey culminates in Section 7. To aid readers, two appendices have been included, offering reviews on semi-continuity and financial markets for added clarity and convenience.
2. Historic Remarks on Portfolio Theory
The overarching General Framework of Portfolio Theory expands and integrates Markowitz portfolio theory, growth optimal portfolio theory, and the theory of risk measures. This section aims to elucidate the correlation between this general framework and its roots.
2.1. Markowitz Portfolio Theory
Markowitz portfolio theory, pioneered in Markowitz (1959), is grounded in the innovative concept of balancing trade-offs between reward and risk. Using the one-period financial market model laid out in Definition A3 in Appendix A, the Markowitz portfolio problem can be stated as, for a given ,
where signifies the standard deviation, is the risky part of a portfolio, and is the payoff of after one period (cf. Notation 1 and Notation A1 in Appendix A). Our general framework encompasses the classical Markowitz portfolio theory, detailed in Example 1 (see also Example A1 in Appendix A). While Markowitz’s concept of balancing reward and risk has been enduringly influential, criticisms have arisen regarding the inadequacy of his chosen reward and risk measures in various situations. Furthermore, the original Markowitz framework’s exclusive focus on risky assets has proven overly restrictive, particularly in applications related to the Capital Asset Pricing Model (CAPM); see Sharpe (1964). Addressing these concerns, our generalized framework of portfolio theory incorporates a broader perspective by considering the trade-off between a general concave reward function and a convex risk measure/function.
Viewing problem (1) in the lens of convex duality offers additional insights. The Lagrangian associated with problem (1) is
Let be the Lagrange multiplier and be the solution to problem (1). It is well known that is the solution to the dual problem of (1); cf. Borwein and Zhu (2016). Note that , where is the covariant matrix; cf. (A2). The optimality condition for the Lagrangian is
Multiplying from the right yields
This implies that the reciprocal of the dual solution to the Markowitz portfolio problem is precisely the Sharpe ratio introduced in Sharpe (1966)—a widely employed measure for evaluating the effectiveness of investment strategies.
2.2. Growth Optimal Portfolio Theory
The Growth Optimal Portfolio (GOP) theory is designed to optimize the log utility of a portfolio, :
This can also be considered a special case in the General Framework of Portfolio Theory when the risk is ignored (see Example A2 in Appendix A). We can see that GOP relies solely on the concavity of the log utility to reflect the investor’s risk aversion. Due to the strict concavity of the log utility, the growth optimal portfolio is unique, resulting in an efficient frontier with only one point; see Maier-Paape and Zhu (2018a).
The history of GOP is intriguing. A precursor to GOP appeared in Kelly (1956), addressing a horse race betting problem with inside information transmitted through a noisy communication channel. Kelly’s motivation was to provide an intuitive interpretation of Shannon’s information rate in information theory; cf. Shannon and Weaver (1949). Subsequent developments by Thorp (1962), as well as Thorp and Kassouf (1967), applied Kelly’s result to gambling and trading problems. Concurrently, Lintner (1965) independently developed the general Growth Optimal Portfolio theory. Kelly’s early work reveals a close connection between GOP and information theory. When applied to historical data of a strategy for trading or constructing a portfolio, the optimal gain derived from growth portfolio theory serves as a measure of the true information contained in the strategy, termed the efficiency index; see Zhu (2007). It may be treated as a measure of the information in an investment strategy.
However, the lack of explicit risk restrictions in GOP makes it overly risky in practice, as demonstrated by MacLean et al. (2011). Research in Vince and Zhu (2015) identifies two important underlying assumptions contributing to this excess risk: (1) assuming an infinite investment horizon, and (2) relying on the concavity of the log utility to adequately address risk aversion. Remedies are proposed in Vince and Zhu (2015) and the subsequent paper Lopez de Prado et al. (2019).
The log utility ansatz in (5), is related to the log Terminal Wealth Relative (TWR) utility, which goes back to Vince (1995) and Vince (2009). These ideas of Vince were extended by Platen (2018) to multi-period markets (cf. also Maier-Paape et al. (2019) and Maier-Paape et al. (2023), sct. 2.2).
Also worth noting is that the dual solution of GOP coincides with the risk-neutral measure for pricing financial derivatives related to the financial market (cf. Carr and Zhu 2018; Zhu 2012). This provides a novel perspective on the fundamental theorem of asset pricing.
2.3. Risk Measures
The concept of risk measurement has long been fundamental in portfolio theory. However, the formal study of risk measurement emerged later, primarily in the 1990s. The first widely analyzed and utilized risk measure was the Value at Risk (VaR); see Jorion (1997). Despite its widespread adoption in financial institutions, VaR has a notable limitation: it lacks convexity, which contradicts the established principle that diversification reduces risk. A remedy for this disconnect was proposed in Rockafellar and Uryasev (2000); Rockafellar et al. (2006), where Conditional Value at Risk (CVaR) was introduced as a replacement for VaR, along with a more general deviation measure in risk analysis. More recent developments can be found in Righi (2019). These developments, alongside the axiomatic framework of coherent risk measures introduced in Artzner et al. (1999), have solidified risk measurement as an independent discipline.
Definition 1
(Coherent risk measure). Let (see Definition A3 in Appendix A) represent the payoff space. We say a lower semi-continuous function is a coherent risk measure if, for any , ρ has the following properties:
- (c1)
- (Positive homogeneity) for any ;
- (c2)
- (Subadditivity) ;
- (c3)
- (Translation property) for all and ;
- (c4)
- (Monotonicity) for any .
A coherent risk measure is convex. Any lower semi-continuous convex function on a finite-dimensional Banach space has the dual representation
where and is the Fenchel conjugate of . It is evident that when a risk measure satisfies (c1) and (c2), must be an indicator function, i.e., for some convex closed set C, and thus , where is the support function of the set C defined by .
Properties (c3) and (c4) further constrain the support set C of this indicator function: (c4) implies that and (c3) implies (see Carr and Zhu 2018, sct. 2.4.1).
Coherent risk measures are motivated by practical trading account risk control problems and offer clear financial interpretations (cf. Artzner et al. 1999). The set represents standardized losses. Essentially, a coherent risk measure selects a specific ‘test’ set of typical losses represented by to determine the level of cash reserve requirement for a trading account. There are infinitely many possibilities for choosing C, thereby determining particular coherent risk measures. The larger the set C, the more conservative the risk measure, requiring higher cash reserves. In fact, this notion was the original motivation behind defining coherent risk measures. Examples include the margin system of the Chicago Mercantile Exchange and stress tests performed by regulatory agencies, both utilizing finite sets C. In practice, the diversification of elements in C holds significance.
It is worth noting that the coherent risk measure is defined on the space of random variables of payoffs, distinct from the risk function in Assumption 1, which is defined on the portfolio space. We can relate a risk function on the portfolio space to by . Clearly, properties (c1) and (c2) imply that a coherent risk measure (and its induced ) is convex and positive homogeneous. However, translating properties (c3) and (c4) requires a more careful consideration. Assume that the financial market in Appendix A Definition A3 has no nontrivial riskless portfolio, as in Appendix A Definition A5. We then observe easily that the linear mapping is a bijection from the portfolio space to its image in . Furthermore, using the induced inner product for the portfolio space, the above defined mapping is by definition a linear isometry.
It preserves angles and, therefore, partial order through the cone that defines the partial order. Thus, mapping property (c4) into the portfolio space can be performed by defining the partial order on the portfolio space using the cone . To describe (c3), we can use the induced inner product. Thus, if is a coherent risk measure that induces , then for some .
The financial significance and elegant dual representation of coherent risk measures make them a preferred framework for risk measurement. While several popular risk measures such as standard deviation, drawdown, and value at risk are not inherently coherent, they can all be modified naturally to become coherent. For detailed explanations, readers are referred to (Carr and Zhu 2018, sct. 2.4.4). In GFPT, we choose to work with a more general convex risk measure, of which the coherent risk measure is a special case.
3. The Efficient Frontier within the General Framework of Portfolio Theory for Scalar Risk
In this and the following two sections, we outline the basics of the General Framework of Portfolio Theory (GFPT) for scalar risk. Our exposition is based on the recent book of Maier-Paape et al. (2023). Here, however, we restrict ourselves to presenting the main results and some main ideas of proofs. Central to this theory are so-called “admissible” portfolios with components, :
Definition 2
(Admissible portfolios; Maier-Paape et al. 2023, Definition 2.7). We say that is a set of admissible portfolios, provided that A is
- Non-empty;
- Closed;
- Convex.
Notation 1
(Risky parts of portfolios; Maier-Paape et al. 2023, Notation 2.8). We define the risky parts of the admissible portfolios as
The theory will always deal with portfolios from the admissible set , where we distinguish for the component , which stands for a risk-free investment, and , which stands for M risky investments. This models a financial market consisting of a scalar risk-free bond and M risky assets (see Definition A3 in Appendix A).
The other two ingredients for the General Framework of Portfolio Theory are risk and utility functions, both of which are defined on the set of admissible portfolios. Hence, we continue with the abstract definition of a risk function and include some relevant properties, before we follow up with the definition of a utility function.
Assumption 1
(Risk functions; Maier-Paape et al. 2023, Assumption 2.20). Consider an extended-valued risk function on the admissible portfolios (cf. Definition 2). We always assume risk functions to be lower semi-continuous (see Definition A1 in Appendix A). Furthermore, we will often use some of the following properties:
- (r1)
- (Riskless asset contributes no risk) The risk function is a function of only the risky part of the portfolio, where , i.e., (cf. Notation 1).
- (r1n)
- (Non-negativity and normalization) The risk function is non-negative, i.e., for all , and there is at least one portfolio of purely bonds in A. Furthermore, if and only if contains only a riskless bond, i.e., for some .
- (r2)
- (Diversification reduces risk) The risk function is proper convex.
- (r2s)
- (Diversification strictly reduces risk) The risk function is strictly convex on its .
Remark 1
(Usual assumptions regarding risk functions in GFPT). For a valid risk function in terms of the GFPT, it has to satisfy either (r2) or (r2s). However, the conditions (r1) and (r1n) are not necessary for the theory presented here to hold, although they are often satisfied in applications.
Assumption 2
(Utility functions; Maier-Paape et al. 2023, Assumption 2.29). Consider an extended-valued utility function on the admissible portfolios A (cf. Definition 2). We will always assume utility functions to be upper semi-continuous (see Remark A2 in Appendix A). Furthermore, we often use some of the following properties:
- (u2)
- (Diminishing marginal utility) The utility function is proper concave.
- (u2s)
- (Strict diminishing marginal utility) The utility function is strictly concave on its domain .
Example 1
(Markowitz risk and utility). The probably most well-known utility function is expected return from Markowitz,
where is the risky part of the payoff of a one-period financial market (cf. Definitions A3 and A4 in Appendix A). Note that is linear in x, such that (u2) is satisfied, but not (u2s). On the other hand, using Notation A1 in Appendix A, we define
which is known as Markowitz volatility. It satisfies (r1) and (r2). However, under further assumptions on the financial market, such as the so-called “no nontrivial riskless portfolio” condition (cf. Definition A5 in Appendix A), and with from (7), even (r1n) is satisfied, and satisfies (r2s) on its domain (see Example A1 in Appendix A for more details). We provide further examples of utility and risk functions in Examples A2 and A3 in Appendix A, respectively.
Using a set of admissible portfolios A (cf. Definition 2), as well as an extended-valued risk function and an extended-valued utility function , the following compactness assumption is essential for most of the results of the GFPT (see also Assumption 4).
Assumption 3
(Compact level sets; Maier-Paape et al. 2023, Assumption 2.56). We assume
- (a)
- ;
- (b)
- For all , the setsare compact in .
Points , which may be represented as
contribute to the so-called “risk–utility space” defined in (10) below. We continue with some basic properties of .
Proposition 1
(Basic properties of ; Maier-Paape et al. 2023, Proposition 2.58). Assume that is a set of admissible portfolios, as in Definition 2. Moreover, assume the risk function satisfies (r2) in Assumption 1, and assume the utility function satisfies (u2) in Assumption 2. We claim:
- (a)
- The setis convex.
- (b)
- In addition,
- (c)
- Assume furthermore that Assumption 3(b) holds. Then, the set is closed.
Investors generally prefer portfolios either with lower risk for a given utility value, or with higher utility for a given risk value. Thus, portfolios which cannot be “improved” are called efficient.
Definition 3
(Efficient portfolios; Maier-Paape et al. 2023, Definition 2.59). We say that a portfolio with and is Pareto efficient (for the risk function , the utility function , and admissible portfolios A), provided that there does not exist any , such that either
or
holds.
Definition 4
(Efficient frontier; Maier-Paape et al. 2023, Definition 2.60). We call the set of images of all efficient portfolios in the two-dimensional risk–utility space, i.e.,
the efficient frontier.
Analogously as in standard portfolio theory, the efficient frontier is essential in the GFPT as well. We continue with some basic and straight forward properties of the efficient frontier , and some relations to the risk–utility space .
Theorem 1
(Efficient frontier properties; Maier-Paape et al. 2023, Theorem 2.61). Assume again the situation of Proposition 1. Then, the following holds true:
- (a)
- Efficient portfolios represented in the two-dimensional risk–utility space all lie on the boundary of .
- (b)
- cannot contain vertical or horizontal line segments (of positive length).
- (c)
- In the case where furthermore Assumption 3(b) holds, then has the following representation:
The so-called “standing assumptions” below collect these assumptions on and , which are necessary for the main results on the efficient frontier to come.
Assumption 4
(Standing assumptions for and ; Maier-Paape et al. 2023, Assumption 2.64). We assume the following properties:
- (a)
- is a set of admissible portfolios, according to Definition 2.
- (b)
- is a lower semi-continuous extended-valued risk function satisfying (r2) in Assumption 1.
- (c)
- is an upper semi-continuous extended-valued utility function satisfying (u2) in Assumption 2.
- (d)
- Assumption 3, concerning compact level sets, holds for and .
The following proposition states that, under the standing assumptions, the risk–utility space and the efficient frontier are non-empty. It furthermore defines and investigates some auxiliary functions and . These will become very important, since parts of the graphs of and will lead to a representation of the efficient frontier below in Theorem 2.
Proposition 2
(Auxiliary functions and ; Maier-Paape et al. 2023, Proposition 2.68). Assume, for a set of admissible portfolios, as well as for extended-valued risk and utility functions and , that Assumption 4 is given. Then, the following holds true:
- (a)
- .
- (b)
- The functionis well-defined, increasing, lower semi-continuous, and convex, andis well-defined, increasing, upper semi-continuous, and concave.
- (c)
- .
Proof.
We just give some ideas; for details, see Maier-Paape et al. (2023). Obviously, , because by Assumption 4(d). Similarly, using a point from and improving it until improvement is no longer possible, yields (see also Lemma 1 for a detailed proof). Furthermore, some of the properties of and are more or less easy to obtain. For instance, the increasing property follows immediately from the definitions of and . Moreover, for instance convexity of is a consequence of
so that the epigraph of is a convex set by Proposition 1(a). Hence, is convex as well. □
Next, we define the projections of to the r- and -axes, and investigate these sets.
Corollary 1
(Projection of to the axes; Maier-Paape et al. 2023, Corollary 2.71). Assume, for a set of admissible portfolios, as well as for extended-valued risk and utility functions and , that Assumption 4 is given. Then, we define the projections of to the axes, i.e.,
and
Then, the following holds true:
- (a)
- .
- (b)
- .
Corollary 2
(Topological structure of ; Maier-Paape et al. 2023, Corollary 2.73). Assume, for a set of admissible portfolios, as well as for extended-valued risk and utility functions and , that Assumption 4 holds. Then, the efficient frontier is a single point or a path-connected continuous curve (one-sided continuous at finite endpoint(s)).
Thus, is a path-connected continuous curve, unless it is just a single point. In particular, the proof of the path-connectedness is by no means trivial, and therefore, we refer the reader to consult Maier-Paape et al. (2023) for more details. However, with the path-connectedness of at hand, it follows easily that the sets I and J, defined in (13) and (14), respectively, are intervals.
Corollary 3
(I and J are intervals; Maier-Paape et al. 2023, Corollary 2.74). Assume, for a set of admissible portfolios, as well as for extended-valued risk and utility functions and , that Assumption 4 is given. Then, the following holds true:
With all these notations and properties at hand, we may conclude this section with the main theorem on the parameterizations of as graphs of on I, as well as on J.
Theorem 2
(Parameterization of as graphs on I and J; Maier-Paape et al. 2023, Theorem 2.76). Assume, for a set of admissible portfolios, as well as for extended-valued risk and utility functions and , that Assumption 4 holds. Then, for I and J, defined in (13) and (14), as well as ν and γ, defined in (12) and (11), respectively, that the following holds true:
- (a)
- and are continuous (one-sided continuous at finite endpoints).
- (b)
- Furthermore, and are strictly increasing, bijective, and inverse to each other, i.e.,
- (c)
- has the representationwhere the “exchange operator” is defined asusing .
We note that, with Theorem 2, the properties of restricted to J, as well as restricted to I, improve significantly compared to and defined on the whole set , as in Proposition 2. For instance, we obtain here continuity versus semi-continuity beforehand. Similarly, the increasing property beforehand improves to strictly increasing, and, most importantly, and are inverse to each other, and their graphs represent . Observe that, since the graphs of and represent , it is evident from Theorem 1(b) that and have to increase strictly.
A typical situation of Theorem 2 may be viewed in Figure 1, where I and J are both bounded and closed. Notice that, in this example, the graph of and do not coincide.
Figure 1.
as graph of and (see (Maier-Paape et al. 2023), fig. 2.2).
Figure 2.
examples for a risk function with non-negative values (see (Maier-Paape et al. 2023), fig. 2.4).
With the “endpoints” of I and J being included or not, it appears that there should be at least sixteen different possibilities for the tuple , and thus for . In reality, however, we will see in Corollary 4(e) that there are only four different options for concerning the endpoints of I and J.
4. Efficient Portfolios within the General Framework of Portfolio Theory for Scalar Risk
Having investigated the efficient frontier in detail in Section 3, we now turn our focus to related efficient portfolios granted within the GFPT.
Theorem 3
(Continuous efficient portfolio map; Maier-Paape et al. 2023, Theorem 2.79). Assume, for a set of admissible portfolios, as well as for extended-valued risk and utility functions and , that Assumption 4 holds. Suppose additionally that either is strictly concave on , i.e., (u2s) in Assumption 2 holds, or is strictly convex on , i.e., (r2s) in Assumption 1 holds. Then, the following holds true:
- (a)
- Each point , with from Definition 4, corresponds to a unique efficient portfolio realizing the risk–utility values .
- (b)
- The mappingis injective and continuous (one-sided continuous at finite endpoint(s) of ). Therefore, the efficient portfolios lie on a continuous curve with no self-intersections. Furthermore, X is surjective onto the set of efficient portfolios in A.
- (c)
Under the standing assumptions from Assumption 4, a direct consequence of Definition 4 is that the existence part in Theorem 3(a) is obvious. Uniqueness, however, follows from the strictness conditions of either or .
Apparently, with Theorem 3, all efficient portfolios lie on a (path-connected) curve. This is essential for applications. It guarantees that little changes in for the minimum risk optimization problem
lead to minor adaptions of the corresponding efficient portfolio solving (18) (cf. the representation (17), as well as the continuity of due to Theorem 2(a), and the continuity of X on due to Theorem 3(b)). Thus, fund managers are able to adjust such strategies continuously. A similar remark applies to the efficient portfolios solving the maximum utility optimization problem for given , i.e.,
For illustration purposes, we give a simple example.
Example 2
(Case of an efficient pure bond portfolio realizing minimum risk). Let and satisfy the assumptions of Theorem 3. Furthermore, should satisfy (r1n) from Assumption 1 and A should contain only portfolios with unit initial cost (see Definition A4 in Appendix A). Then, the set contains exactly one element, which is the pure bond portfolio with a minimal possible risk value . In the case where its utility value is finite, then is in fact an efficient portfolio, so that . Hence, .
Following on from Proposition 2(c), we briefly explain here how to find an efficient portfolio for a given point , whose risk is not higher than r and whose utility is not lower than .
Lemma 1
(Construction of an efficient portfolio). Let the situation of Proposition 2 be given. Furthermore, let . Then, there exists an efficient portfolio , such that
Proof.
The proof of this lemma goes back to ideas provided in the proof of Maier-Paape et al. (2023), Proposition 2.68(c). Because of its importance, we here give the following quick argument: Since , follows. Then, by lowering r and increasing , while staying in , one finally reaches a point , which cannot be improved, so results. This is a consequence of for all and for all , according to Proposition 2(b). By construction, and is valid, and, since , there exists an efficient portfolio such that
as claimed. □
5. Endpoints of the Efficient Frontier within the General Framework of Portfolio Theory for Scalar Risk
Apparently, the sets I and J, defined in Corollary 1, are of great interest for this theory, since they may be used for parameterizations of the efficient frontier (see Theorem 2) and the efficient portfolios (cf. (16) and (17)). In this section, we investigate the “endpoints” of these intervals (cf. Corollary 3).
Definition 5
The above defined values may or may not lie in , because I or J might be unbounded. Notice that all above representations are evident using the definitions in (13) and (14), as well as Corollary 1(a) and (b). The next proposition, however, is a bit more involved (cf. Maier-Paape et al. 2023).
Proposition 3
(Alternative representations of “endpoints” of I and J; Maier-Paape et al. 2023, Proposition 2.82). Assume, for a set of admissible portfolios, as well as extended-valued risk and utility functions and , that Assumption 4 holds. Then, using , the following holds true:
With these representations at hand, and using some technical argumentation, it is possible to show several nontrivial relations between and on the one hand, and between and on the other hand (see below).
Corollary 4
(“Endpoint” properties; Maier-Paape et al. 2023, Corollary 2.83). In the situation of Proposition 3 with and , defined in (13) and (14), we have:
- (a)
- , if and only if .
- (b)
- If , then and .
- (c)
- , if and only if .
- (d)
- If , then and .
- (e)
- (i)
- If and , then and .
- (ii)
- If and , then and .
- (iii)
- If and , then and .
- (iv)
- If and , then and .
In particular, as already noted at the end of Section 3, according to Corollary 4(e), we obtain only four different possibilities for the tuple , and thus for .
Thus, Maier-Paape et al. (2023) have examined the behavior and properties of and on J and I, respectively, (cf., e.g., Theorem 2) as well as the intervals J and I themselves (cf., e.g., Corollary 4) in detail. We will conclude with a brief look at how and behave outside J and I, respectively (cf. Figure 1 for an illustration). Although the respective graphs outside J and I do not contribute to the efficient frontier, the behavior of and there is often of technical value.
Lemma 2
(Behavior of or outside of J or I). In the situation of Proposition 3, with and defined in (13) and (14), the following holds:
- (a)
- If , then and for all .
- (b)
- If , then and for all .
- (c)
- (i)
- If , then for all .
- (ii)
- If and , then for all .
- (d)
- (i)
- If , then for all .
- (ii)
- If and , then for all .
Proof.
We only have to consider (a) and (c) because (b) and (d) are symmetric statements.
ad(a). Let . Then, by Corollary 4(c), (d), with follows. Furthermore, since
holds, and is increasing by Proposition 2(b), we obtain for all .
6. Generalizations of the General Framework of Portfolio Theory for Vector Risk
In this section, the risk function is assumed to be vector-valued, while the utility function remains to be scalar and, as before, is a set of admissible portfolios. The results of the General Framework of Portfolio Theory (GFPT) for this case are taken from Maier-Paape et al. (2023, chap. 3). However, in contrast to the theory developed there for dimensional risk vectors, we restrain ourselves here for simplicity and visualization reasons to .
Assumption 5
(Conditions on the vector risk functions; see Assumption 1 and Maier-Paape et al. 2023, Assumption 3.1). Consider a vector risk function , with lower semi-continuous components and , where is a set of admissible portfolios according to Definition 2. We say that:
- (a)
- satisfies one (or more) of the conditions (r1), (r1n), or (r2) if and satisfy (r1), (r1n), or (r2) from Assumption 1, respectively;
- (b)
- satisfies (r2s) if or satisfies (r2s) from Assumption 1.
In the following we simplify notation by using ≤ and ≥ componentwise; i.e., for two vectors , we have , if and only if for (analogously for the other operator).
Remark 2
(Risk–utility as row vectors; see Maier-Paape et al. 2023, Remark 3.3). Here, and in the following, it is convenient to have risk vectors as row vectors. Similarly, the risk–utility vectors are assumed to be row vectors, which is in contrast to our portfolio vectors , which are always column vectors.
Similarly to Assumption 3, for the scalar risk case, we rely here on compactness assumptions as well.
Assumption 6
The next proposition lifts Proposition 1 to the vector risk case.(Compact level sets in vector risk case; see Maier-Paape et al. 2023, Assumption 3.4). We assume for a vector-valued risk function , as in Assumption 5, and a scalar-valued utility function , as in Assumption 2, that:
- (a)
- ;
- (b)
- For all , the setsare compact.
Proposition 4
(Properties of ; cf. Maier-Paape et al. 2023, Proposition 3.6). Assume that is a set of admissible portfolios, as in Definition 2. In addition, assume that the vector risk function satisfies (r2) in Assumption 5, and the utility function satisfies (u2) in Assumption 2. We then have:
- (a)
- The set of valid risk and utility valuesis convex.
- (b)
- implies that, for any , we have and .
- (c)
- Assume furthermore that Assumption 6(b) holds. Then, is closed.
With all that notation at hand, we can now define efficient portfolios and the efficient frontier in the vector risk case.
Definition 6
(Efficient portfolios in vector risk case; see Maier-Paape et al. 2023, Definition 3.7). We say that a portfolio with finite risk and utility values is Pareto efficient (for given vector risk function , scalar utility function , and admissible portfolios A), provided that there does not exist any portfolio such that either
or
holds.
For better understanding, it is worthwhile to compare Definition 6 with the one of the scalar risk case; see Definition 3.
Definition 7
(Efficient frontier in vector risk case; see Definition 4 and Maier-Paape et al. 2023, Definition 3.8). We call the set of (risk–utility) images of all efficient portfolios in the three-dimensional risk–utility space the efficient frontier, and denote it by .
Similarly to some of the properties of the efficient frontier for the scalar risk case given in Theorem 1, we obtain the following for the vector risk case.
Theorem 4
(Efficient frontier properties in vector risk case; confer Theorem 3.9 in Maier-Paape et al. 2023). Efficient portfolios represented in the three-dimensional risk–utility space are all located on the boundary of the set . In case the boundary of contains a line segment parallel to any of the three coordinate axes, on such a line segment lies, at most, one efficient portfolio.
The analog of the “standing” Assumption 4 for the scalar risk case is given for the vector risk case next.
Assumption 7
(Standing assumptions for efficient trade-off in vector risk case; see Maier-Paape et al. 2023, Assumption 3.11). We assume the following properties:
- (a)
- is a set of admissible portfolios, according to Definition 2.
- (b)
- is a lower semi-continuous extended-valued vector risk function satisfying (r2) in Assumption 5.
- (c)
- is an upper semi-continuous extended-valued scalar utility function satisfying (u2) in Assumption 2.
- (d)
- Assumption 6 concerning compact level sets holds for , and .
From now on, we use the following notations for risk values :
i.e., we have .
While we only had two auxiliary functions and for the scalar risk case (see Proposition 2), we now obtain three auxiliary functions for two-dimensional vector risk.
Proposition 5
(Auxiliary functions related to the efficient frontier in vector risk case; see Maier-Paape et al. 2023, Proposition 3.12). Assume, for a set of admissible portfolios, as well as for extended-valued vector risk and scalar utility functions and , that Assumption 7 holds. Then, the following holds true:
- (a)
- .
- (b)
- The functions , defined byand , defined byfor , are well-defined extended-valued functions. Moreover, the function is decreasing in , increasing in μ, and lower semi-continuous as well as proper convex. The function ν is increasing (coordinate-wise), upper semi-continuous, and proper concave.
- (c)
- .
In the following, using the definitions in (26), we define the projections
for and
as well as some kind of permutation mappings
for .
We now shift our focus to projections of the efficient frontier from the three-dimensional risk–utility space to planes built by two of the three variables . This result is along the lines of Corollary 1 and Theorem 2(c) for the scalar risk case. In particular, the definitions in (32) and (35) below should be compared with the definitions of the sets I and J in (13) and (14).
Theorem 5
(Representation of efficient frontier in vector risk case; see Theorem 3.14 in Maier-Paape et al. 2023). Assume, for a set of admissible portfolios, that the vector risk function and the scalar utility function satisfy Assumption 7. Then, the following holds true:
- (a)
- Settingwe haveand
- (b)
- For arbitrary but fixed , we setThen, we haveand
Note that Equations (34) and (36) provide representations of as graphs of the auxiliary functions and , respectively. In particular, we clearly obtain from (34) and (36) that
but also that the following holds true using, e.g., (33) and (34):
This can also be seen in the following example which we provide for illustration purposes.
Example 3
(Non-convex projections of ). In Figure 3, we see a wooden model to illustrate the boundary of a possible set and its efficient frontier for the vector risk case and some fixed risk and utility functions, and , as well as a fixed set of possible admissible portfolios (whose specific forms are all irrelevant for now).
Figure 3.
The efficient frontier is build by three transparent “cord” facets.
Of course, the black “ground plate” of the wooden model in Figure 3 is just there to hold the construction. The extensions of the side lines of the ground plate to the left and to the right should be viewed as - and -axis. Perpendicular to these axes and upwards directed is the μ-axis. Note that, e.g., the facets on top or to the right and to the left have to be extended in - and/or -direction to to obtain all of . Similarly, the facets below are to be extended in μ-direction to . Also, the three transparent facets in front mimicked by a cord are part of . In fact, it is easy to see that only these three cord facets build . Moreover, the reader should be able to imagine, for this example, the set , i.e., the projection of to the -plane, which is a path-connected set, but is not convex in the case. This is remarkable because it is in contrast to the scalar risk case, where the projections of the efficient frontier to the axes, i.e., the sets I and J from (13) and (14) are always convex (see Corollary 3).
It should be furthermore noted that the representations of in (34) and (36) are an analog of Theorem 2(c) for the vector risk case. An analog of Theorem 2(b) for the vector risk case holds as well (see (38) and (39) below). However, continuity of and is no longer granted unconditionally, although, for scalar risk, this was no problem (see Theorem 2(a)).
In consensus with definition (26), in the following, we use the convention that followed by is to be interpreted as a completed vector in , i.e.,
for .
Theorem 6
(Representation of efficient frontier 2 in the vector risk case; see Maier-Paape et al. 2023, Corollary 3.15). Under the same assumptions as in Theorem 5, the following holds true:
- (a)
- is strictly increasing in each component; is strictly increasing in μ and strictly decreasing in (coordinate-wise) for .
- (b)
- and are inverse to each other in the following sense:
- (c)
- and are (for fixed ) inverse to each other in the following sense:
Remark 3
(Continuity of and in the interior of their domains). As provided in Proposition 5, ν is upper semi-continuous and concave, and is lower semi-continuous and convex for . At least in the (relative) interior of their domains, both ν and are even continuous (cf. Rockafellar 1972, Theorem 10.1). Nevertheless, discontinuities on the boundary are possible (see Maier-Paape et al. 2023, Example 3.16, for a counterexample to continuity at the boundary).
Path-connectedness of the efficient frontier in the scalar risk case was already not completely obvious (cf. Corollary 2). For the vector risk case, however, path-connectedness turns out to be a really subtle question. For that result, a few more assumptions are necessary.
Assumption 8
(Standing assumptions for connectedness in the vector risk case; see Maier-Paape et al. 2023, Assumption 3.27). Assume for a set of admissible portfolios (cf. Definition 2) that the vector risk function and the scalar utility function satisfy Assumption 7. In particular, Assumption 6, concerning compact level sets, holds as well. We assume furthermore:
- (a)
- The components of the risk vector are all non-negative, i.e., , for .
- (b)
- Either (r2s) holds for all (see Assumption 1), or satisfies (u2s) in Assumption 2.
With this relatively strong assumption, the path-connectedness of follows from a quite lengthy geometric proof (cf. Maier-Paape et al. 2023, sct. 3.2).
Theorem 7
(Path-connected efficient frontier in vector risk case; see Corollary 3.41 as well as Remark 3.29 from Maier-Paape et al. 2023). Let Assumption 8 hold true, and let the components be continuous on . Then, the set is path-connected.
Finally, we report results on the uniqueness of efficient portfolios and properties of the efficient portfolio map (cf. Theorem 3 for the scalar risk case).
Theorem 8
(Uniqueness of efficient portfolios for the vector risk–utility trade-off; see Maier-Paape et al. 2023, Theorem 3.46). Let Assumption 7 be satisfied. Denote by the set of efficient portfolios corresponding to . Then, is an upper semi-continuous multifunction (cf. Definition A2 in Appendix A) on its domain .
In addition, suppose that either the vector risk function satisfies (r2s) in Assumption 5, or the scalar utility function satisfies condition (u2s) in Assumption 2. Then, is single-valued and continuous. In particular, is also injective.
Theorem 9
(Topological properties of the efficient portfolio set; see Corollary 3.47 in Maier-Paape et al. 2023). In the situation of Theorem 5 and Theorem 7, the sets from (32) and , from (35) are path-connected. Furthermore, the efficient portfolio map , from Theorem 8 is continuous in this situation and, thus, the set of efficient portfolios is path-connected as well. Moreover, the efficient portfolios can be parameterized as a graph over or , respectively, i.e., both
and
yield all efficient portfolios for given , and A. Thus, according to Remark 3, and are continuous in the relative interior of N and for , respectively.
Having the path-connectedness of at hand, it is again worthwhile to note that this enables fund managers to adjust their strategies continuously, at least when parameters from the relative interior of or are used. The corresponding optimization problems to find efficient portfolios are similar to (18) and (19): firstly, the maximum utility problem
and, secondly, the two minimum risk optimization problems
In conclusion, although the notation and proofs are a bit more involved for the vector risk case, many of the results for scalar risk remain valid for the vector risk case as well.
7. Conclusions
We have provided a concise introduction to the General Framework of Portfolio Theory. This framework not only consolidates previous efforts in portfolio optimization but also extends its applicability to encompass vector risks, which are prevalent in numerous financial scenarios. Its significance resonates in practical applications, ranging from bank balance sheet management problems involving linear and quadratic models to portfolio optimization tasks that entail modifying benchmarks with diversification constraints, as well as those concerning log drawdown and log Terminal Wealth Relative (TWR). Due to space constraints, we are unable to delve into these applications in this paper. Interested readers are directed to explore the more comprehensive monograph (Maier-Paape et al. 2023).
As is customary in research endeavors, new explorations invariably give rise to fresh inquiries. One such avenue worth pursuing is discerning the relationship between efficient portfolios derived from the trade-off between a reward and scalar risk versus those emerging from vector risk considerations. Discussion of two pertinent special cases can be found in Maier-Paape et al. (2023), namely Examples 2.85 and 3.50. In these instances, the tracking error serves to confine admissible portfolios in the former case, while it acts as an additional risk function in the latter.
In GFPT, we adopt the perspective of a portfolio manager tasked with optimizing returns within a prudent risk framework. Alternatively, another viewpoint considers portfolio risk control from the standpoint of a regulator focused on ensuring financial market stability. Research discussed in Hamel and Heyde (2010); Hamel et al. (2011); Jouini et al. (2004) explores this regulatory perspective, extending coherent risk measures to address scenarios involving multiple risk types. Investigating the interplay between these two perspectives represents an intriguing avenue for further research.
Author Contributions
All authors contributed equally to this work. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Conflicts of Interest
The authors declare no conflicts of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| CAPM | Capital Asset Pricing Model |
| GFPT | General Framework of Portfolio Theory |
| GOP | Growth Optimal Portfolio Theory |
| TWR | Terminal Wealth Relative |
| VaR | Value at Risk |
| r1, r1n, r2, r2s | Properties of risk functions, cf. Assumption 1 |
| u2, u2s | Properties of utility functions, cf. Assumption 2 |
Appendix A. Reviews
Appendix A.1. Review of Semi-Continuity
In this section, we quote a few well-known definitions and results from convex analysis, in particular on semi-continuity (see, e.g., Rockafellar 1972 or Maier-Paape et al. 2023, Appendix A).
Definition A1
(Lower semi-continuity; cf. Maier-Paape et al. 2023, Introduction to sct. A.1). Let be a finite-dimensional (real) Banach space, and let f be any extended-valued function . Then, f is called lower semi-continuous at , if
where is a ball around with radius .
- Moreover, f is called lower semi-continuous if it is lower semi-continuous for all .
Lemma A1
(Maier-Paape et al. 2023, Lemma A.2). Let be a finite-dimensional (real) Banach space, and let f be any extended-valued function . Then, f is lower semi-continuous at , if and only if
for every sequence with , and for which the limit of exists in .
Theorem A1
(Characterization of lower semi-continuity; Rockafellar 1972, Theorem 7.1). Let be a finite-dimensional (real) Banach space, and let f be any extended-valued function . Then, the following conditions are equivalent:
- (a)
- f is lower semi-continuous on the whole of , i.e., for all holds
- (b)
- Sublevel sets are closed for all .
- (c)
- The epigraph of f,is a closed set in .
Remark A1
(Maier-Paape et al. 2023, Remark A.4). A theorem similar to Theorem A1 holds true for a lower semi-continuous function when is a closed subset of a finite-dimensional (real) Banach space . To see this, just consider , defined by
which is lower semi-continuous on the whole of (e.g., by Lemma A1), and thus Theorem A1 applies. In particular, for instance, the sublevel sets are always closed subsets of .
Remark A2
(Upper semi-continuity). Similar, but symmetric, statements hold true for upper semi-continuous extended-valued functions , i.e., when is lower semi-continuous.
Definition A2
(Upper semi-continuity of multifunctions; see Borwein and Zhu 2005, sct. 5.1). Let a multifunction be given. The domain of F is defined by . We say that F is upper semi-continuous at if, whenever converges to , this implies that .
Appendix A.2. Review of Financial Markets and Related Risk and Utility Functions
Definition A3
(One-period financial market; Maier-Paape et al. 2023, Definition 2.3). Let be a probability space where Ω is a finite sample space with elements, and with for all . For fixed, we say that is a financial market in a one-period economy, provided that and . Here, represents a risk-free asset with a positive return when . The rest of the components , represent the price of the mth risky financial asset at time t.
Definition A4
(Portfolio, wealth and payoff; Maier-Paape et al. 2023, Definition 2.6). A portfolio is a column vector , whose components represent the shares of the mth asset in the portfolio. Thus, is the value of the portfolio at time t, where represents the initial investments and represents the payoff. A portfolio with is called unit initial cost portfolio.
Notation A1
(Price vector of risky assets; Maier-Paape et al. 2023, Notation 2.5). Set , , where is a random variable for .
In various scenarios, adding restrictions to the one-period financial market, as defined in Definition A3, becomes necessary to eliminate unrealistic circumstances such as arbitrage. The “no nontrivial riskless portfolio” condition, delineated below, will consistently be adopted as the standard assumption in this paper whenever financial markets are discussed.
Definition A5
(One-period financial market with no nontrivial riskless portfolio). We say that the financial market in Definition A3 has no nontrivial riskless portfolio when there does not exist any portfolio with and
We next want to investigate the Markowitz risk function from (9) more thoroughly. With the covariance matrix of the risky assets defined below, can be represented nicely.
Lemma A2
(Positive definite covariance matrix; Maier-Paape and Zhu 2018a, Corollary 1). Assume that the financial market in Definition A3 has no nontrivial riskless portfolio, as in Definition A5. Then, the covariant matrix of the risky assets
is positive definite.
This leads us to the Markowitz risk function, also known as Markowitz volatility.
Example A1
(Markowitz volatility: standard deviation of the payoff; Maier-Paape et al. 2023, Remark 2.27). Under the assumptions of Lemma A2, the standard deviation of the payoff, from (9) has the following representation:
for . It satisfies (r1) and (r2) from Assumption 1. Furthermore, in the case where from (7) is positive scaling invariant, is positive homogeneous in , i.e., for all . However, with the representation in (A3)and Σ from (A2) being positive definite, one also obtains that satisfies (r2s) on . Lastly, in the case where is a set with only unit initial cost portfolios (cf. Definition A4), using Maier-Paape et al. 2023, Lemma 2.22, satisfies (r2s) as well.
A large class of utility functions in the sense of Assumption 2 is constructed as so-called expected utility.
Definition A6
(Expected utility; Maier-Paape et al. 2023, Definition 2.31). Consider a one-period financial market , as in Definition A3. Using an auxiliary function , the function , defined on the admissible portfolios A, is called expected utility.
Example A2
(Expected utility functions). The two most prominent expected utility functions are for the so-called Markowitz utility (see Example 1) and, for (natural logarithm), the log utility occurring in Growth Optimal Portfolio Theory; see Maier-Paape and Zhu (2018a). For relevant properties guaranteeing applications within the GFPT, see (Maier-Paape et al. 2023), Lemma 2.34.
Example A3
(Drawdown risk functions). Another important set of risk functions with applications in GFPT stems from the idea of measuring the drawdown of an equity curve over a prescribed amount of time. For instance, in Maier-Paape et al. (2023), sct. 2.2.5, several drawdown risk functions were constructed on a logarithmic equity curve for a multi-period financial market.
References
- Artzner, Philippe, Freddy Delbaen, Jean-Marc Eber, and David Heath. 1999. Coherent measures of risk. Mathematical Finance 9: 203–27. [Google Scholar] [CrossRef]
- Borwein, Jonathan M., and Qiji J. Zhu. 2005. Techniques of Variational Analysis. New York: Springer. [Google Scholar] [CrossRef]
- Borwein, Jonathan M., and Qiji J. Zhu. 2016. A variational approach to Lagrange multipliers. Journal of Optimization Theory and Applications 171: 727–56. [Google Scholar] [CrossRef]
- Carr, Peter, and Qiji Jim Zhu. 2018. Convex Duality and Financial Mathematics. Cham: Springer. [Google Scholar] [CrossRef]
- Dewasurendra, Sagara, Pedro Judice, and Qiji Zhu. 2019. The optimum leverage level of the banking sector. Risks 7: 51. [Google Scholar] [CrossRef]
- Fouque, Jean-Pierre, Ronnie Sircar, and Thaleia Zariphopoulou. 2017. Portfolio optimization and stochastic volatility asymptotics. Mathematical Finance 27: 704–45. [Google Scholar] [CrossRef]
- Hamel, Andreas H., and Frank Heyde. 2010. Duality for set-valued measures of risk. SIAM Journal on Financial Mathematics 1: 66–95. [Google Scholar] [CrossRef]
- Hamel, Andreas H., Frank Heyde, and Birgit Rudloff. 2011. Set-valued risk measures for conical market models. Mathematics and Financial Economics 5: 1–28. [Google Scholar] [CrossRef]
- Jorion, Philippe. 1997. Value at Risk. The New Benchmark for Controlling Derivatives Risk. New York: McGraw-Hill. [Google Scholar]
- Jouini, Elyés, Moncef Meddeb, and Nizar Touzi. 2004. Vector-valued coherent risk measures. Finance and Stochastics 8: 531–52. [Google Scholar] [CrossRef]
- Kelly, John L. 1956. A new interpretation of information rate. Bell System Technical Journal 35: 917–26. [Google Scholar] [CrossRef]
- Lintner, John. 1965. The valuation of risk assets and the selection of risky investments in stock portfolios and capital budgets. Review of Economics and Statistics 47: 13–37. [Google Scholar] [CrossRef]
- López de Prado, Marcos, Ralph Vince, and Qiji Jim Zhu. 2019. Optimal risk budgeting under a finite investment horizon. Risks 7: 86. [Google Scholar] [CrossRef]
- MacLean, Leonard C., Edward O. Thorp, and William T. Ziemba, eds. 2011. The Kelly Capital Growth Investment Criterion: Theory and Practice. Singapore: World Scientific. [Google Scholar] [CrossRef]
- Maier-Paape, Stanislaus, and Qiji Jim Zhu. 2018a. A general framework for portfolio theory. Part I: Theory and various models. Risks 6: 53. [Google Scholar] [CrossRef]
- Maier-Paape, Stanislaus, and Qiji Jim Zhu. 2018b. A general framework for portfolio theory. Part II: Drawdown risk measures. Risks 6: 76. [Google Scholar] [CrossRef]
- Maier-Paape, Stanislaus, Andreas Platen, and Qiji Jim Zhu. 2019. A general framework for portfolio theory. Part III: Multi-period markets and modular approach. Risks 7: 60. [Google Scholar] [CrossRef]
- Maier-Paape, Stanislaus, Pedro Júdice, Andreas Platen, and Qiji Jim Zhu. 2023. Scalar and Vector Risk in the General Framework of Portfolio Theory. A Convex Analysis Approach. CMS/CAIMS Books in Mathematics. Cham: Springer, vol. 9. [Google Scholar] [CrossRef]
- Markowitz, Harry M. 1959. Portfolio Selection. Cowles Monograph. New York: Wiley, vol. 16. [Google Scholar]
- Merton, Robert C. 1992. Continuous-Time Finance. Boston: Blackwell. [Google Scholar]
- Platen, Andreas. 2018. Modular Portfolio Theory: A General Framework with Risk and Utility Measures as Well as Trading Strategies on Multi-Period Markets. Ph.D. thesis, RWTH Aachen University, Aachen, Germany. [Google Scholar] [CrossRef]
- Righi, Marcelo Brutti. 2019. A composition between risk and deviation measures. Annals of Operations Research 282: 299–313. [Google Scholar] [CrossRef]
- Rockafellar, R. Tyrrell. 1972. Convex Analysis, 2nd ed. Princeton Landmarks in Mathematics and Physics. Princeton: Princeton University Press, vol. 28. [Google Scholar]
- Rockafellar, R. Tyrrell, and Stanislav Uryasev. 2000. Optimization of conditional value-at-risk. Journal of Risk 2: 21–42. [Google Scholar] [CrossRef]
- Rockafellar, R. Tyrrell, Stan Uryasev, and Michael Zabarankin. 2006. Master funds in portfolio analysis with general deviation measures. Journal of Banking & Finance 30: 743–78. [Google Scholar] [CrossRef]
- Shannon, Claude E., and Warren Weaver. 1949. The Mathematical Theory of Communication. Urbana: University of Illinois Press. [Google Scholar]
- Sharpe, William F. 1946. Capital asset prices: A theory of market equilibrium under conditions of risk. Journal of Finance 19: 425–42. [Google Scholar] [CrossRef]
- Sharpe, William F. 1966. Mutual fund performance. Journal of Business 1: 119–38. [Google Scholar] [CrossRef]
- Thorp, Edward O. 1962. Beat the Dealer. New York: Random House. [Google Scholar]
- Thorp, Edward O., and Sheen T. Kassouf. 1967. Beat the Market. New York: Random House. [Google Scholar]
- Vince, Ralph. 1995. The New Money Management: A Framework for Asset Allocation. New York: John Wiley and Sons. [Google Scholar]
- Vince, Ralph. 2009. The Leverage Space Trading Model. Hoboken: John Wiley and Sons. [Google Scholar]
- Vince, Ralph, and Qiji Jim Zhu. 2015. Optimal betting sizes for the game of blackjack. Journal of Investment Strategies 4: 53–75. [Google Scholar] [CrossRef]
- Zhu, Qiji Jim. 2007. Mathematical analysis of investment systems. Journal of Mathematical Analysis and Applications 326: 708–20. [Google Scholar] [CrossRef]
- Zhu, Qiji Jim. 2012. Convex analysis in financial mathematics. Nonlinear Analysis: Theory Method and Applications 75: 1719–36. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).


