Compromise programming: Non-interactive calibration of utility-based metrics

被引:11
|
作者
Kanellopoulos, A. [1 ,2 ]
Gerdessen, J. C. [1 ]
Claassen, G. D. H. [1 ]
机构
[1] Wageningen Univ, Operat Res & Logist Grp, NL-6706 KN Wageningen, Netherlands
[2] TI Food & Nutr, NL-6709 PA Wageningen, Netherlands
关键词
Utility optimization; Goal programming; Compromise programming; Preferential weights; Model calibration; GOAL; ACHIEVEMENT; ELICITATION;
D O I
10.1016/j.ejor.2015.01.031
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Utility functions have been used widely to support multi-objective decision-making. Expansion of a general additive utility function around the ideal results in a composite linear-quadratic metric of a compromise programming problem. Determining the unknown parameters of the composite linear-quadratic metric requires substantial interaction with the decision maker who might not always be available or capable to participate in such a process. We propose a non-interactive method that uses information on observed attribute levels to obtain the unknown parameters of the composite linear-quadratic metric and enables forecasting and scenario analysis. The method is illustrated with a small scale numerical example. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:519 / 524
页数:6
相关论文
共 50 条
  • [41] A Non-Interactive Attribute-Based Access Control Scheme by Blockchain for IoT
    Yang, Qiliang
    Zhang, Mingrui
    Zhou, Yanwei
    Wang, Tao
    Xia, Zhe
    Yang, Bo
    [J]. ELECTRONICS, 2021, 10 (15)
  • [42] Short Pairing-Based Non-interactive Zero-Knowledge Arguments
    Groth, Jens
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 321 - 340
  • [43] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080
  • [44] An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
    Youn, Taek-Young
    Lee, Changhoon
    Park, Young-Ho
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 353 - 357
  • [45] Non-interactive Security Framework for Mobile Device based Academic Monitoring System
    Muthusenthil, B.
    Vijayakumaran, C.
    Kim, Hyunsung
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 265 - 276
  • [46] Comment on “Identity-based non-interactive key distribution with forward security”
    Xi Jun Lin
    Ran Ren
    Zhengang Wei
    Lin Sun
    [J]. Designs, Codes and Cryptography, 2015, 75 : 1 - 7
  • [47] A non-interactive privacy preserved training technique based on hybrid deep learning
    Raveendran, Anju
    Dhanapal, R.
    [J]. OPTIK, 2023, 273
  • [48] NON-INTERACTIVE IDENTITY-BASED DNF SIGNATURE SCHEME AND ITS EXTENSIONS
    Lee, Kwangsu
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 743 - 769
  • [49] A non-interactive quantum deniable authentication protocol based on asymmetric quantum cryptography
    Shi, Wei-Min
    Zhang, Jan-Biao
    Zhou, Yi-Hua
    Yang, Yu-Guang
    Zhang, Xin-Lan
    [J]. OPTIK, 2016, 127 (20): : 8693 - 8697
  • [50] Non-interactive verifiable LWE-based multi secret sharing scheme
    Niloofar Kiamari
    Massoud Hadian
    Samaneh Mashhadi
    [J]. Multimedia Tools and Applications, 2023, 82 : 22175 - 22187