Compromise programming: Non-interactive calibration of utility-based metrics

被引:11
|
作者
Kanellopoulos, A. [1 ,2 ]
Gerdessen, J. C. [1 ]
Claassen, G. D. H. [1 ]
机构
[1] Wageningen Univ, Operat Res & Logist Grp, NL-6706 KN Wageningen, Netherlands
[2] TI Food & Nutr, NL-6709 PA Wageningen, Netherlands
关键词
Utility optimization; Goal programming; Compromise programming; Preferential weights; Model calibration; GOAL; ACHIEVEMENT; ELICITATION;
D O I
10.1016/j.ejor.2015.01.031
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Utility functions have been used widely to support multi-objective decision-making. Expansion of a general additive utility function around the ideal results in a composite linear-quadratic metric of a compromise programming problem. Determining the unknown parameters of the composite linear-quadratic metric requires substantial interaction with the decision maker who might not always be available or capable to participate in such a process. We propose a non-interactive method that uses information on observed attribute levels to obtain the unknown parameters of the composite linear-quadratic metric and enables forecasting and scenario analysis. The method is illustrated with a small scale numerical example. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:519 / 524
页数:6
相关论文
共 50 条
  • [1] Disagreement and Epistemic Utility-Based Compromise
    Staffel, Julia
    [J]. JOURNAL OF PHILOSOPHICAL LOGIC, 2015, 44 (03) : 273 - 286
  • [2] Disagreement and Epistemic Utility-Based Compromise
    Julia Staffel
    [J]. Journal of Philosophical Logic, 2015, 44 : 273 - 286
  • [3] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    ChunMing Tang
    DingYi Pei
    XiaoFeng Wang
    ZhuoJun Liu
    [J]. Science in China Series F: Information Sciences, 2008, 51 : 128 - 144
  • [4] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    Tang ChunMing
    Pei DingYi
    Wang XiaoFeng
    Liu ZhuoJun
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (02): : 128 - 144
  • [5] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    TANG ChunMing~1+ PEI DingYi~(1
    2 State Key Laboratory of Information Security
    3 School of Mathematics and Computational Mathematics of Shenzhen University
    [J]. Science China(Information Sciences), 2008, (02) : 128 - 144
  • [6] Compromise programming: A utility-based linear-quadratic composite metric from the trade-off between achievement and balanced (non-corner) solutions
    Ballestero, Enrique
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 182 (03) : 1369 - 1382
  • [7] On the Size of Pairing-Based Non-interactive Arguments
    Groth, Jens
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 305 - 326
  • [8] Identity-based Encryption with Non-Interactive Opening
    范佳
    唐小虎
    康立
    路献辉
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 670 - 674
  • [9] Attribute-based non-interactive key exchange
    Fei TANG
    Rui ZHANG
    Hongda LI
    [J]. Science China(Information Sciences), 2017, 60 (01) : 208 - 210
  • [10] Non-interactive deniable authentication protocol based on factoring
    Lu, RX
    Cao, ZF
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (04) : 401 - 405